Lesson 2: Managing Windows Flashcards

1
Q

What does MMC stand for?

A

Microsoft Management Console

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When configuring a task, what is the function of a trigger?

a. Determines which command, script, or executable is run by the taske
b. Has no function related to Task Scheduler
c. Determines when or how the task executes
d. Determines whether the task is enabled or not

A

c. Determines when or how the task executes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

True or false? In Disk Management, it is possible to reformat the boot partition.

A

False

In Disk Management, you cannot reformat the boot partition while the system is running. The boot partition is the one that contains the operating system, and it is in use during normal system operation. Reformatting it would make the system unbootable.
To reformat the boot partition, you would need to boot from a separate disk (such as a Windows installation disk or recovery disk) and perform the reformat operation outside of the normal system environment.
Thus, Disk Management does not allow you to reformat the boot partition while the operating system is actively running.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

devmgmt.msc

A

Device Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which console allows you to view and edit the properties of installed hardware. Change hardware configuration settings, update drivers, or remove/disable devices.

A

Device Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

diskmgmt.msc

A

Disk Management console

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does Disk Management console host? (4)

A

- fixed and removable disks
- hard disk drives (HDDs)
- solid state drives (SSDs)
- optical drives—attached to the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the 3 volumes on Disk 0 (the typical disk that holds the operating system)? (3)

A

- system volume
- boot volume
- recovery partitions

The system volume contains the operating system files and is usually allocated the drive letter C:

The boot volume contains the files used to boot the OS. This typically uses a boot system called extensible firmware interface (EFI). It is not usually assigned a drive letter.

Recovery partitions contain tools to repair a damaged installation and/or return the computer to its factory state. These can either contain the PC vendor’s tool or Microsoft’s Windows Recovery Environment (WinRE). They are not usually assigned drive letters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What disk tasks does Disk Management support? (3)

A

Initializing disks, Partitioning, Formatting

Initializing disks—If you add an unformatted HDD, SSD, or thumb drive, you will be prompted to initialize it. You can choose whether to use the master boot record (MBR) or Globally Unique ID (GUID) Partition Table (GPT) partition style for the new disk. MBR and GPT refer to the way the partition information is stored on the disk.

Partitioning—Each disk must be configured with at least one partition. You can create a new partition by right-clicking on an area of unpartitioned space. A wizard will prompt you to choose how much of the unallocated space to use and to select a file system.

Formatting—A new partition must be written with a file system—typically NTFS—to allow Windows to write and read files. The simpler FAT32 file system might be used for small, removable drives. You can also reformat existing partitions. This will delete all files from the volume. Along with the file system type, you can choose a volume label and allocation unit size.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

True or False? You cannot format or delete system or boot partitions.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

During setup, what must the boot partition be formatted as? What must the system partition be formatted as?

A

During setup,
- the boot partition must be formatted as NTFS
- the system partition must be formatted as FAT32

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What feature is now the preferred method of configuring redundant disk configurations?

A

Storage Spaces

Windows feature for creating a single storage resource from multiple devices. Data can be protected against device failure by RAID-like mirroring or parity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the 3 main problems that File storage is subject to?

A

Fragmentation
Capacity
Damage

Fragmentation—On a hard disk, ideally each file would be saved in contiguous clusters on the disk. In practice, over time as files grow, they become fragmented across non-contiguous clusters, reducing read performance.

Capacity—Typically, much more file creation occurs on a computer than file deletion. This means that capacity can reduce over time. If the boot volume has less than 20% free space, performance can be impaired. When space drops below 200 MB, a Low Disk Space warning is generated.

Damage—Hard disk operations are physically intensive, and the platters of the disk are easy to damage, especially if there is a power cut. If the disk does not recognize that a sector is damaged, files can become corrupted. SSDs can suffer from degradation of the memory circuitry, resulting in bad blocks, and can be damaged by impacts, overheating, and electrical issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How can File storage problems be addressed?

A

Through use of disk maintenance tools.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

dfrgui.exe

A

Defragment and Optimize Drives tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What does Defragment and Optimize Drives tool do?

A

Runs various operations to speed up the performance of HDDs and SSDs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What does Windows automatically schedules the disk optimizer to run?

A

Task Scheduler

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

cleanmgr.exe

A

Disk Clean-up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

taskschd.msc

A

Task Scheduler

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What does Task Scheduler do?

A

Enables execution of an action (such as running a programs, commands, scripts) automatically at a pre-set time or in response to some sort of trigger.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

lusrmgr.msc

A

Local Users and Groups console

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What does Local Users and Groups console do?

A

Creating, modifying, disabling, and deleting user accounts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is a digital certificate’s purpose?

A

A digital certificate is a means of proving the identity of a subject, such as a user, computer, or service. The validity of each certificate is guaranteed by the issuing certification authority (CA).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

certmgr.msc

A

Certificate Manager console

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What does the Certificate Manager console do? (2)

A
  • Shows which certificates have been installed
  • Provides a mechanism for requesting and importing new certificates.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What are the 3 mainly used subfolders in Cert Manager? (3)

A

- The Personal folder
- Trusted Root Certification Authorities folder
- Third-party Root Certification Authorities folder

The Personal folder stores the certificates that have been issued to the user account. User certificates can be used for tasks such as authenticating to a network access server, encrypting data, and adding a digital signature to a document or message to prove its authenticity.
Trusted Root Certification Authorities contains a superset of the certificates of all issuers that are trusted, including Microsoft’s own CA root, local enterprise CAs and third-party CAs. Most of these certificates are managed via Windows Update.
Third-party Root Certification Authorities contains trusted issuers from providers other than Microsoft or a local enterprise.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

True or false? certmgr.msc manages certificates for the all users?

A

False.
certmgr.msc manages certificates for the current user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

gpedit.msc

A

Group Policy Editor console

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What does the Group policy editor do?

A

Configures detailed user and system registry settings via policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

secpol.msc

A

Local Security Policy editor

can be used to modify security settings specifically.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

regedit.exe

A

Registry Editor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

The registry is structured as a set of five root keys that contain computer and user databases. What are the 5 keys?

A

- HKEY_CLASSES_ROOT
- HKEY_CURRENT_USER
- HKEY_LOCAL_MACHINE
- HKEY_USERS
- HKEY_CURRENT_CONFIG

The HKEY_LOCAL_MACHINE (HKLM) database governs system-wide settings. The HKEY_USERS database includes settings that apply to individual user profiles, such as desktop personalization. HKEY_CURRENT_USER is a subset of HKEY_USERS with the settings for logged in user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What are the binary files called where the registry database is stored?

A

Hives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What files are hives comprised of? (3)

A
  • a single file (with no extension)
  • a .LOG file (containing a transaction log)
  • a .SAV file (a copy of the key as it was at the end of setup)

The system hive also has an .ALT backup file. Most of these files are stored in the C:\Windows\System32\Config folder, but the hive file for each user profile (NTUSER.DAT) is stored in the folder holding the user’s profile.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What are subkeys and data items called in each root key?

A

Value entries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What tool can you use to search for a key or value?

A

The Find tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What are the 3 parts a value entry has?

A
  • The name of the value
  • The data type of the value (such as string or binary value)
  • The value itself
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Review Question
True or False: SSDs cannot benefit from occasional defragmentation or optimization.

A

False
With flash drives and SSDs, while seek time is not a performance factor, the file system can still benefit from occasional defragmentation or optimization. There are several things to consider, including the lifespan of the SSD. You can read more about the technical considerations in optimizing SSDs at

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Review Question
You are supporting a user who has installed a vendor keyboard driver. The keyboard no longer functions correctly. Under Windows 10, what are the steps to revert to the previous driver?

A

Open Device Manager
Expand Keyboards, then right-click the device and select Properties.
On the Driver tab, select Roll Back Driver.

44
Q

Review Question
You are troubleshooting an issue with a wireless adapter. When you open Device Manager, you find the device’s icon is shown with a down arrow superimposed. What does this mean, and why might this configuration have been imposed?

A

The icon indicates that the device has been disabled.
It could be that there was a fault, or there may be a network configuration or security reason for disabling the adapter.

In this sort of situation, use incident logs and device documentation to establish the reason behind the configuration change.

45
Q

Review Question
In Windows, what is the difference between the boot volume and the system volume?

A

The boot volume contains the boot files
The system volume contains the system root (OS files)

The boot volume is not normally assigned a drive letter
The system volume is normally allocated the drive letter C:

46
Q

Review Question
If a single physical disk is divided into three partitions in a non-Windows environment, how many different file systems can be supported?

A

Three—each partition can use a different file system.

47
Q

msinfo32.exe

A

System Information

48
Q

What does system Information (msinfo32.exe) provide?

A

Utility that provides a report of the PC’s hardware and software configuration.

49
Q

eventvwr.msc

A

Event Viewer

50
Q

What does Event Viewer (eventvwr.msc) do?

A

A management console snap-in for viewing and managing logs on a Windows host.

51
Q

What are the default log files in Windows Logs folder? (4)

A

- System log
- Application log
- Security log
- Setup log

The System log contains information about events that affect the core OS. These include service load failures, hardware conflicts, driver load failures, network issues, and so on.
The Application log contains information regarding non-core processes and utilities and some third-party apps. For example, app installers write events to the Application log.
The Security log holds the audit data for the system.
The Setup log records events generated during installation.

52
Q

What are the different event levels? (5)

A

- Critical
- Error
- Warning
- Information
- Audit Success/Failure

Critical—An issue that should be treated as the highest priority in the context of the source application. Critical is often used to report a process that has halted or stopped responding.
Error—A less severe issue that should be investigated once critical issues have been resolved.
Warning—A state that could potentially lead to an error or critical condition if not remediated, such as the system running low on disk space.
Information—Logs an operation or state that is noteworthy but does not require remediation.
Audit Success/Failure—Events in the security log are classified as either successful, such as a user authenticating, or failed, such as a password not being entered correctly.

53
Q

A

54
Q

taskmgr.exe

A

Task Manager tool

55
Q

What can Task Manager tool be used for?

A

This tool can be used to monitor the PC’s key resources.

You can open it by pressing CTRL+SHIFT+ESC, by right-clicking the taskbar or Start, or by pressing CTRL+ALT+DEL and selecting Task Manager.

56
Q

How can you view more information about a process?

A

Via the Details tab

57
Q

How can you privilege one task over another or, conversely, set one task to have fewer resources than another?

A

You can do this by right-clicking the process and choosing an option from the Set Priority submenu.

58
Q

What does the Performance tab in Task Manager display? (5)

A

- the CPU
- memory
- disk(s)
- network
- graphics processing unit (GPU) subsystems

59
Q

What does the CPU page display in Task Manager?

A

The number of cores and logical processors (HyperThreading) The statistics show overall utilization, system uptime, and a count of the number of processes, threads, and handles.

59
Q

A

60
Q

A

60
Q

What does the Services tab monitor?

A

The Services tab monitors the state of all registered background processes

61
Q

A

62
Q

What is a Service? What do Services provide?

A

A service is a Windows process that does not require any sort of user interaction and therefore runs in the background (without a window).

Services provide functionality for many parts of the Windows OS, such as allowing logon, browsing the network, or indexing file details to optimize searches.

63
Q

How can you get to Services (services.msc) console?

A

From Task Manager, the Open Services button.

64
Q

Can you prevent a service from running at startup?

A

Yes, you can prevent a service from running at startup by setting it to Manual or prevent it from running completely by setting it to Disabled

65
Q

resmon.exe

A

Resource Monitor

66
Q

What is the Resource Monitor (resmon.exe) console used for? (3)

A

- live monitoring of resource utilization data for the CPU and GPU
- system memory
- disk/file system, and network.

67
Q

perfmon.msc

A

Performance Monitor

68
Q

What is the Performance Monitor (perfmon.msc) used for? (3)

A

- Tracks system performance in real-time,
- Logs data for analysis,
- Helps troubleshoot issues
like slowdowns or resource bottlenecks.

69
Q

In Performance Monitor, you can create log files, referred to as Data Collector Sets, to record information for viewing later. What are the 2 types of logs?

A
  • Counter logs
  • Trace logs

Counter logs allow you to collect statistics about resources, such as memory, disk, and processor. These can be used to determine system health and performance.

Trace logs can collect statistics about services, providing you with detailed reports about resource behavior. In essence, trace logs provide extensions to the Event Viewer, logging data that would otherwise be inaccessible.

70
Q

What does msconfig.exe do?

A

Utility for configuring Windows startup settings. (Used to modify various settings and files that affect the way the computer boots and loads Windows)

70
Q

msconfig.exe

A

System Configuration Utility

71
Q

In the General tab of System Configuration, what are the 3 startup options?

A
  • Normal startup (load all device drivers and services)
  • Diagnostic startup (load basic devices and services only)
  • Selective startup (load system services, or load startup items, or use original boot configuration)
72
Q

What does BCD stand for?

A

Boot Configuration Data

73
Q

What is the command to add boot paths?

A

the bcdedit command

74
Q

Review Question
You are monitoring CPU Usage and notice that it often jumps to 100% and then falls back. Does this indicate a problem?

A

Probably not—CPU Usage usually peaks and falls. If it stays over 80–90%, the system could require a faster CPU, or if it spikes continually, there could be a faulty application.

74
Q

Review Question
You are monitoring system performance and notice that a substantial number of page faults are occurring. Does this indicate that a memory module is faulty?

A

No—it shows the system is using the pagefile intensively and could benefit from more system RAM being installed.

75
Q

Review Question
You have a computer with two SATA disks. You want to evaluate the performance of the primary disk. How would you select this in Performance Monitor, and what might be appropriate counters to use?

A

Select the Physical Disk object, select the counter, and then select the 0 C: instance.

Counters that are useful for evaluating performance include % Disk Time and Average Disk Queue Length.

76
Q

Review Question
You take a support call where the user doesn’t understand why a program runs at startup when the Startup folder is empty. What is the likely cause, and how could you verify this?

A

The program has added a registry entry to run at startup. You could check this (and optionally disable the program) by using Task Manager.

77
Q

What two key combinations allow you to go into Task Manager?

A

Ctrl+Alt+Del
Ctrl+Shift+Esc

78
Q

How do you perform a scan to identify file system errors in read-only mode?

A

run chkdsk command without any switches

Note that sfc is not the correct answer as this verifies the integrity of protected system files rather than checks the file system on a drive.

79
Q

You are attempting to run a command but receive the message “The requested operation requires elevation.” What must you do to run the command?

A

Open a new command prompt window with sufficient privileges. You can right-click the Command Prompt icon and select Run as administrator or press CTRL+SHIFT+ENTER to execute the icon or cmd.exe command.

80
Q

Which Windows command is probably best suited for scripting file backup operations?

A

The robocopy command offers more options than those offered by the xcopy command, so it will usually be the better choice.

The copy command is quite basic and probably not suitable.

81
Q

Why might you run the shutdown command with the /t switch?

A

To specify a delay between running the command and shutdown starting. You might do this to give users a chance to save work or to ensure that a computer is restarted overnight.

81
Q

A server administrator is writing a script that will help administer their servers. The administrator saves the script to the Desktop folder. Instead of typing out the full path to the script in the command prompt, the administrator wants to change the directory to the desktop to make it easier to run the script. Which of the following commands should the server administrator use?

A.dir C:\Users\user\Desktop
B.cd C:\Users\user\Desktop
C.Desktop:
D.C:\Users\user\Desktop help

A

B. cd C:\Users\user\Desktop
The cd command sets the focus to a different working directory. The administrator can change to any directory by entering the full path, such as cd C:\Users\user\Desktop.

Use the dir command to list the files and subdirectories from either the working drive and directory or from a specified path. For example, running dir C:\Users\user\Desktop will display the contents of Desktop.

Running Desktop: will attempt to change to the root of a drive named Desktop: which will fail. For example, D: changes to the D drive.

Running C:\Users\user\Desktop help will error out as it is not a valid command.

82
Q

Is the command format d: /fs:exfat /q valid? If so, what is its effect, and what precaution might you need to take before running it?

A

Yes, it is valid. It formats drive D with the exFAT file system by using a quick format (does not scan for bad sectors).

This will delete the file table on the drive so existing data files can be overwritten—the formatted drive will appear to be empty in Explorer. If there are existing files that need to be preserved, they should be backed up before running the format command.

83
Q

A user experiences issues with large files and wants to run diagnostics to help figure out what might be the issue. Which of the following commands should the user try?

A.format
B.diskpart
C.chkdsk
D.winver

A

C. chkdsk
The chkdsk scans the file system and/or disk sectors for faults and attempts to repair any problems detected.

The format command writes a new file system to a drive. This process deletes any data existing on the drive. The basic command is format X: /fs:SYS, where X is a drive letter, and SYS is the file system, such as NTFS, FAT32, or EXFAT.

The command diskpart is the interface underlying the Disk Management tool. The Disk Management tool prevents users from completing destructive actions, like deleting the system or boot volume. However, it does not have restrictions in this way, so users should use it with care.

The winver command reports version information. Users will often need to use this for support.

83
Q

A user starts experiencing a blue screen of death (BSoD) on start up. Where should the user check for changes after getting back on the computer?

A.WSL
B.devmgmt.msc
C.taskschd.msc
D.services.msc

A

B. devmgmt.msc
Most blue screens of death (BSoD), especially those that occur during startup, are caused by faulty hardware or hardware drivers. Device Manager (devmgmt.msc) allows users to view and edit the properties of installed hardware.

Windows Subsystem for Linux (WSL) allows the installation of a Linux distribution and the use of Linux applications. This is different from the Windows management utilities.

The Task Scheduler (taskschd.msc) runs commands and scripts automatically. Many of Windows’s processes come with predefined schedules.

The Services console (services.msc) starts, stops, and pauses processes running in the background.

84
Q

A security administrator revisits the security of client machines and wants to push out configuration changes to users. What is the best way to do this?

A.regedit.exe
B.services.msc
C.lusrmgr.msc
D.gpedit.msc

A

D. gpedit.msc
The Group Policy Editor (gpedit.msc) provides a more robust means of configuring many of these Windows settings than editing the registry directly.

The Registry Editor (regedit.exe) makes manual edits to the database of Windows configuration settings. The registry is structured as a set of five root keys that contain computer and user databases.

The Services console (services.msc) starts, stops, and pauses processes running in the background. The services console could be used to disable nonessential services to improve performance or security.

The Local Users and Groups (lusrmgr.msc) console provides an advanced interface for creating, modifying, disabling, and deleting user accounts.

85
Q

A server administrator performs a statistical analysis on server operations to provide optimized resources. For example, the administrator wants to see resource performance graphs and key statistics, such as threads started by a process or hard page faults/second. What is the best tool to use?

A.taskmgr.exe
B.services.msc
C.msconfig.exe
D.resmon.exe

A

D. resmon.exe
Resource Monitor (resmon.exe) shows an enhanced version of the type of snapshot monitoring provided by the Task Manager.

The Task Manager (taskmgr.exe) tool can monitor key resources of personal computers (PCs). Use Task Manager to determine if any resources are at 90–100% utilization, and then note which process is most active.

The Open Services button links to the Services (services.msc) console from the Task Manager. The Open Services button can disable nonessential services to improve performance or security.

The System Configuration Utility (msconfig.exe) modifies various settings and files that affect the way the computer boots and loads Windows.

86
Q

A Windows server administrator wants to use a scheduled local script to transfer logs from that server to a central security incident and event monitoring platform. Copying the logs over and ingesting them locally saves on the licensing. Which command should the script use?

A.xcopy Source [Destination] [Switches]
B.md Source [Destination] [Switches]
C.robocopy Source [Destination] [Switches]
D.rmdir Source [Destination] [Switches]

A

C. robocopy Source [Destination] [Switches]
The robocopy command (or “robust copy”) is another file copy utility. Microsoft now recommends using robocopy rather than xcopy. For example, robocopy works better with long file names and New Technology File System (NTFS) attributes.

Microsoft now recommends using robocopy rather than xcopy. robocopy is designed to work better with long file names and NTFS attributes.

To create a directory, use the md command. For example, to create a directory called Data in the current directory, type md Data.

To delete an empty directory, enter rd Directory or rmdir Directory. If the directory is not empty, users can remove files and subdirectories from it using the /s switch.

87
Q

A computer technician wants to optimize the input/output operations performance of HDDs. What should the technician utilize?

A.devmgmt.msc
B.dfrgui.exe
C.resmon.exe
D.secpol.msc

A

B. dfrgui.exe
The Defragment and Optimize Drives tool (dfrgui.exe) runs various operations to speed up the performance of hard disk drives (HDDs).

Device Manager (devmgmt.msc) allows users to view and edit the properties of installed hardware. Users can change hardware configuration settings, update drivers, or remove/disable devices.

The Resource Monitor (resmon.exe) and Performance Monitor (perfmon.msc) view and log performance statistics. The Resource Monitor shows an enhanced version of the sort of snapshot monitoring provided by Task Manager.

The Local Security Policy (secpol.msc) views and edits the security settings. The Local Security Policy editor can be used to modify security settings specifically.

87
Q

A user wants to learn and grow with different versions of Windows operating systems, so the user installs dual versions of Windows OS on their computer. The computer currently boots to Windows 10, but the user wants to change the default operating system to another version. What should the user utilize to do this?

A.msconfig.exe
B.resmon.exe
C.taskschd.msc
D.gpedit.msc

A

A. msconfig.exe
The System Configuration Utility (msconfig.exe) modifies various settings and files that affect the way the computer boots and loads Windows. For example, users can change the default OS, add boot options (such as Safe Mode boot) with minimal drivers and services, and set the timeout value.

Resource Monitor (resmon.exe) shows an enhanced version of the snapshot monitoring provided by Task Manager.

The Task Scheduler (taskschd.msc) runs commands and scripts automatically. Many of Windows’s processes come with predefined schedules.

The Group Policy Editor (gpedit.msc) provides a more robust means of configuring many of the Windows settings than editing the registry directly.

87
Q

A security analyst is investigating a possible incident where an alert showed a possible indicator of malware. The malware has a tactic of replacing system files with its own version, which also runs the malware code. Which of the following commands has the best chance of helping the security analyst?

A.sfc
B.chkdsk
C.winver
D.shutdown

A

A. sfc
The Windows Resource Protection mechanism prevents damage to, or malicious use, of system files and registry keys and files. In addition, the System File Checker utility (sfc) provides a manual interface for verifying system files and restoring them from the cache if found corrupt or damaged.

The chkdsk scans the file system and/or disk sectors for faults and can attempt to repair any problems detected.

The winver command reports version information. Users will often need to use this for support.

The shutdown command can safely halt the system or log out.

88
Q

An incident handler is reviewing a possible cryptomining infection on one of the corporate servers. What should the handler use first to investigate?

A.eventvwr.msc
B.taskmgr.exe
C.regedit.exe
D.taskschd.msc

A

B. taskmgr.exe
The Task Manager (taskmgr.exe) tool can monitor the PC’s key resources. Cryptomining software will use resources heavily, so this would be the first place to look.

The Event Viewer (eventvwr.msc) is a management console snap-in for viewing and managing logs on a Windows host. The default page summarizes system status, with recent error and warning events collected for viewing.

The Registry Editor (regedit.exe) makes manual edits to the database of Windows configuration settings. The registry’s structure is a set of five root keys that contain computer and user databases.

The Task Scheduler (taskschd.msc) runs commands and scripts automatically. Many of Windows’s processes come with predefined schedules.

89
Q

A helpdesk operator wants to use a set of tools that will help them during troubleshooting. What can help the operator customize their toolset?

A.mmc
B.gpedit.msc
C.lusrmgr.msc
D.taskschd.msc

A

A. mmc
The mmc command allows the operator to perform MMC customization and create a console with a personal selection of snap-ins. The console can be saved to the Administrative Tools folder as a file with an MSC extension.

The Group Policy Editor (gpedit.msc) provides a more robust means of configuring many of the Windows settings than editing the registry directly.

The Local Users and Groups (lusrmgr.msc) console provides an advanced interface for creating, modifying, disabling, and deleting user accounts.

The Task Scheduler (taskschd.msc) runs commands and scripts automatically. Many of Windows’s processes come with predefined schedules.

90
Q

A security analyst is investigating a possible incident and wants to view the logs on a remote computer. What should the security analyst use to accomplish this?

A.msinfo32.exe
B.gpedit.msc
C.services.msc
D.eventvwr.msc

A

D. eventvwr.msc
The Event Viewer (eventvwr.msc) is a management console snap-in for viewing and managing logs on a Windows host. The default page summarizes system status, with recent error and warning events collected for viewing.

The System Information (msinfo32.exe) tool produces a comprehensive report about the system’s hardware and software components. Running the tool produces an inventory of system resources, firmware, OS versions, driver file locations, and more.

The Group Policy Editor (gpedit.msc) provides a more robust means of configuring many of the Windows settings than editing the registry directly.

The Services console (services.msc) starts, stops, and pauses processes running in the background. The services console could disable nonessential services to improve performance or security.

91
Q

A software technician is working on a help ticket for a Windows-based computer that appears to have performance issues. What provides a console that offers live monitoring of resource utilization data for the CPU, system memory, disk/file system, and network?

A.certmgr.msc
B.taskschd.msc
C.resmon.exe
D.gpedit.msc

A

C. resmon.exe
The Resource Monitor (resmon.exe) provides a console for live monitoring of resource utilization data for the CPU, system memory, disk/file system, and network and shows an enhanced version of the sort of snapshot monitoring provided by Task Manager.

The Certificate Manager provides a console for managing digital certificates for the current user and trusted root certification authority certificates.

The Task Scheduler (taskschd.msc) is an administrative tool that runs software and scripts according to calendar or event triggers.

The Group Policy Editor (gpedit.msc) is a console for configuring detailed user and system registry settings via policies.

92
Q

A vulnerability manager has significantly improved patching in the environment and now wants to focus on system security. Which of the following options will directly support the manager’s intent of making the system more secure?

A.msinfo32.exe
B.resmon.exe
C.services.msc
D.dfrgui.exe

A

C. services.msc
From Task Manager, the Open Services button links to the Services (services.msc) console. This can disable nonessential services to improve performance or security.

The System Information (msinfo32.exe) tool produces a comprehensive report about the system’s hardware and software components. For example, running the tool produces an inventory of system resources, firmware, OS versions, driver file locations, etc.

Resource Monitor (resmon.exe) shows an enhanced version of the snapshot monitoring provided by Task Manager.

The Defragment and Optimize Drives tool (dfrgui.exe) runs various operations to speed up the performance of HDDs and SSDs.

93
Q

Lesson 2 - Summery

A

Lesson 2
Summary
You should be able to use management consoles and command-line utilities to manage Windows users, devices, apps, and performance.

Guidelines for Managing Windows

Document standard procedures and work instructions to make best use of Windows management consoles and command-line utilities for different tasks:

Use Device Manager, Disk Management, Disk Defragmenter, Disk Cleanup, chkdsk, diskpart, and format to ensure hardware availability, reliability, and performance.
Use Local Users and Groups and Certificate Manager to manage users, personal digital certificates, and trusted root certificates.
Use Group Policy Editor and Registry Editor for fine-grained settings configuration.
Use System Information, Event Viewer, and winver to audit software and hardware inventory and monitor logs.
Use Task Manager, Resource Monitor, Performance Monitor, System Configuration, shutdown, and sfc to optimize process, service, and startup performance.
Use cd, dir, md, rmdir, x:, copy, xcopy, and robocopy to manage the file system from the command prompt.
Additional practice questions for the topics covered in this lesson are available on the CompTIA Learning Center.

93
Q

A user wants to use the xcopy command at a command (CMD) prompt but is unfamiliar with the syntax and switches. What can they use to learn more? (Select all that apply.)

A.xcopy help
B.help xcopy
C.xcopy |
D.xcopy /?

A

A. xcopy help and D. xcopy /?
When using help Command, the help system lists the syntax and switches used for the command.

The user can also display help on a particular command by using the /? switch.

Using xcopy help will result in an attempt to copy the help file if it exists in the directory.

Using xcopy | will result in an error stating the syntax is incorrect.

94
Q

Which of the following is NOT a registry hive?
HKEY_DEFAULT_USER
HKEY_CLASSES_ROOT
HKEY_CURRENT_USER
HKEY_LOCAL_MACHINE
HKEY_USERS

A

HKEY_DEFAULT_USER

95
Q

Which of the following components are visible using the Performance tab of Task Manager? Select all that apply.
a. IOPS
b. Memory
c. CPU
d. Disk

A

b. Memory
c. CPU
d. Disk

96
Q

What is the name of the graphical system performance tool used in Windows?

a. System Tool
b. Performance Tool
c. Task Manager
d. System Manager

A

c. Task Manager

97
Q

Which of the following are valid operations for a Windows service? (Select two).

a. Initialize
b. Terminate
c. Start
d. Stop

A

c. Start and d. Stop

98
Q

What does Security Center alert with event ID 1 indicate?

a. The Windows Security Center Service has started.
b. Windows operating system has rebooted.
c. The Windows Security Center has been reconfigured.
d. The Windows Security Center Service has stopped

A

**a. **