Lesson 2 - Managing Windows Flashcards

1
Q

What is devmgmt.msc?

A

Device Manager allows you to view and edit the properties of installed hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is diskmgmt.msc?

A

Disk Management is a console related to initializing, partitioning, and formatting disk drives (HDDs, SSDs, and optical drives)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the three volumes you can find on Disk 0 that is holding the OS?

A
  1. The system volume contains the files used to boot the OS. Uses a boot system called extensible firmware interface (EFI).
  2. The boot volume contains the operating system files and is usually allocated the drive letter C:
  3. Recovery partitions contain tools to repair a damaged installation &/or return the computer to its factory state.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is initializing disks?

A

If you add an unformatted HDD, SSD, or thumb drive, you will be prompted to initialize it. You can choose whether to use the master boot record (MBR) or Globally Unique ID (GUID) Partition Table (GPT) partition style for the new disk. MBR and GPT refer to the way the partition information is stored on the disk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is partitioning?

A

Each disk must be configured with at least one partition. You can create a new partition by right-clicking on an area of unpartitioned space. A wizard will prompt you to choose how much of the unallocated space to use and to select a file system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is formatting?

A

A new partition must be written with a file system - typically NTFS - to allow Windows to write and read files. The simpler FAT32 file system might be used for small, removable drives. You can also reformat existing partitions. This will delete all files from the volume. Along with the file system type, you can choose a volume label and allocation unit size

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is repartitioning?

A

Existing partitions can be expanded if there is unpartitioned space. Partitions can also be removed or shrunk to make space available

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is configuring dynamic disks?

A

If there is more than one disk available, a new dynamic volume can be configured. Dynamic volumes use multiple devices to implement some type of software RAID redundancy, such as mirroring. Now the feature is called Storage Spaces

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the three main problems of file storage?

A
  1. Fragmentation: on a hard disk, ideally each file would be saved in contiguous clusters on the disk. In practice, over time as files grow, they become fragmented across non-contiguous clusters, reducing read performance.
  2. Capacity: It reduces over time. If the boot volume has less that 20% free space, performance can be impaired. When space drops below 200 MB, a Low Disk Space warning is generated.
  3. Damage: Hard disk operations are physically intensive, and the platters of the disk are easy to damage, especially if there is a power cut. If the disk does not recognize that a sector is damaged, files can become corrupted. SSDs can suffer from degradation of the memory circuitry, resulting in bad blocks, and can be damaged by impacts, overheating, and electrical issues.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is dfrgui.exe?

A

Defragment and Optimize Drives tool runs various operations to speed up the performance of HDDs and SSDs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does dfrgui.exe do on HDDs?

A

Defragmenting rewrites file data so that it occupies contiguous clusters, reducing the amount of time the controller has to seek over the disk to read a file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does dfrgui.exe do on SSDs?

A

Data is stored in units called blocks that are not directly managed by the OS. The drive controller determines how blocks are used according to wear-leveling routines to minimize degradation of the solid-state cell. The main purpose of the optimizer tool is to instruct the controller to run a TRIM operation. TRIM is a provess by which the controller identifies data that the OS has marked as deletable and can then tag corresponding blocks as writable. The optimizer does perform a type of defragmentation operation on an SSD if it hold the OS and the system protection feature Volume Shadow Copy service is enabled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is cleanmgr.exe?

A

The Disk Clean-up tool tracks files that can be safely erased to reclaim disk space. These files include ones deleted but still available in the Recycle Bin and various temporary files and caches. The tool can be run in administrator mode using the Clean up system files option to reclaim data from caches such as Windows Update and Defender

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is tasksch.msc?

A

The Task Scheduler runs commands and scripts automatically. Tasks can be run once at a future date or time or according to a recurring schedule. A task can be a simple application process or a batch file or script

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is lusrmgr.msc?

A

The Local Users and Groups console provides an advanced interface for creating, modifying, disabling, and deleting user accounts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is certmgr.msc?

A

The Certificate Manager console shows which certificates have been installed and provides a mechanism for requesting and importing new certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the certificates found in the Personal folder?

A

The Personal folder stores the certificates that have been issued to the user account. User certificates can be used for tasks such as authenticating to a network access server, encrypting data, and adding a digital signature to a document or message to prove its authenticity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the certificates found in the Trusted Root Certification Authorities?

A

Trusted Root Certification Authorities contains a superset of the certificates of all issuers that are trusted, including Microsoft’s CA root, local enterprise CAs and third-party CAs. Most of these certificates are managed via Windows Update

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the certificates found in the 3rd party Root CA?

A

Third-party Root Certification Authority contains trusted issuers from providers other than Microsoft or a local enterprise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is gpedit.msc?

A

The Group Policy editor is a console related to configuring detailed user and system registry settings via policies. It provides a more robust means of configuring many of the Windows settings than editing the registry directly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is secpol.msc?

A

The Local Security Policy editor can be used to modify security settings specifically

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is regedit.exe?

A

The Registry Editor is a tool for making direct edits to the registry database, such as adding or modifying keys or values. The Registry Editor ca be used to make backups of the registry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is the registry?

A

In the Windows registry, a key is analogous to a folder on the file system. Keys are used to group like settings together in a hierarchy that is logical to navigate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is HKEY_USERS?

A

HKEY_USERS is a root key in the registry that is a database includes settings that apply to individual user profiles, such as desktop personalization. HKEY_CURRENT_USER is a subset of HKEY_USERS with the settings for logged in user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is the name of the binary files that the registry database is stored?

A

Hives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is a hive?

A

A hive comprises a sign file (with no extension), a .LOG file (containing a transaction log), and a .SAV file (a copy of the key as it was at the end of setup).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is a value entry?

A

Each root key can contain subkeys and data items called value entries. Subkeys are to folders as value entries are to files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What are the three parts of a value entry?

A
  1. The name of the value
  2. The data type of the value (such as string or binary value)
  3. The value itself
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is MMC?

A

A Microsoft Management Console is a utility allowing Windows administrative tools to be added as snap-ins to a single interface. Most MMC snap-ins can be used to manage either the local computer or a remote computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

You are supporting a user who has installed a vendor keyboard driver. The keyboard no longer functions correctly. Under Windows 10, what are the steps to revert to the previous driver?

A

Open Device Manager from the WinX menu, Instant Search, or the Computer Management console. Expand Keyboards, then right-click the device and select Properties. On the Driver tab, select Roll Back Driver.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

You are troubleshooting an issue with a wireless adapter. When you open Device Manager, you find the device’s icon is shown with a down arrow superimposed. What does this mean, and why might this configuration have been imposed?

A

The icon indicates that the device has been disabled. It could be that there was a fault, or there may be a network configuration or security reason for disabling the adapter. In this sort of situation, use incident logs and device documentation to establish the reason behind the configuration change.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

If a single physical disk is divided into three partitions, how many different file systems can be supported?

A

Three—each partition can use a different file system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

True or false? The dfrgui.exe utility should be disabled if Windows is installed to an SSD.

A

False. While solid state drives (SSDs) and hard disk drives (HDDs) have different mechanical and performance characteristics, it is still necessary to run the Defragment and Optimize Drives (dfrgui.exe) periodically to optimize performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

In Windows, what is the difference between the boot partition and the system partition?

A

The system partition contains the boot files; the boot partition contains the system root (OS files). The boot partition is normally assigned the drive letter C. The system partition is not normally assigned a drive letter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is msinfo32.exe?

A

The System Information is a utility that provides a report of the PC’s hardware and software configuration. Running the tool produces an inventory of system resources, firmware and OS versions, driver file locations, environment variables, network status, and so on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What is eventvwr.msc?

A

Event Viewer is a management console snap-in for viewing and managing logs on a Windows host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What are the 4 main log files under Windows Logs folder in Event Viewer?

A
  1. System
  2. Application
  3. Security
  4. Setup
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What type of logs can be found in the System log files in Event Viewer?

A

The System log contains information about events that affect the core OS. These include service load failures, hardware conflicts, driver load failures, network issues, and so on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What type of logs can be found in the Application log files in Event Viewer?

A

The Application log contains information regarding non-core processes and utilities and some third-party apps. For example, app installers write events to the Application log.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What type of logs can be found in the Security log files in Event Viewer?

A

The Security log holds the audit data for the system.

41
Q

What type of logs can be found in the Setup log files in Event Viewer?

A

The Setup log records event generated during installation.

42
Q

What is taskmgr.exe?

A

The Task Manager tool can be used to monitor the PC’s key resources.

43
Q

What information can found in the Processes tab in Task Manager?

A

View of each app or background process to view its sub-processes and view more clearly what resources each is taking up

44
Q

What information can found in the Performance tab in Task Manager?

A

The Performance tab provides more information about the CPU, memory, disk, network, and graphics processing unit (GPU) subsystems

45
Q

What information can found in the Memory tab in Task Manager?

A

The Memory page reports which slots have modules installed and the speed

46
Q

What information can found in the Disk page in Task Manager?

A

The Disk pages report the type and capacity plus statistics for active time, response time, and read/write speeds.

47
Q

What information can found in the CPU and GPU pages in Task Manager?

A

The CPU page shows the number of cores and logical processors (HyperThreading), multisocket, or virtualization enabled. The GPU page is shown if the system has a dedicated graphics adapter. It reports the amount of graphics memory available and utilization statistics.

48
Q

What information can found in the Users tab in Task Manager?

A

The Users tab lets you see the people who are logged on, the info about the processes they are running, and the resource utilization associated with their account

49
Q

What information can found in the Startup tab in Task Manager?

A

The Startup tab lets you disable programs added to the Startup folder or set to run using the registry

50
Q

What information can found in the Services tab in Task Manager?

A

The Services tab monitors the state of all registered background processes.

51
Q

What is resmon.exe?

A

Resource Monitor shows an enhanced version of the sort of snapshot monitoring provided by Task Manager

52
Q

What is perfmon.msc?

A

Windows Performance Monitor can be used to provide real-time charts of system resources or can be used to log information to a file for long-term analysis

52
Q

What are counter logs?

A

Counter logs allow you to collect statistics about resources, such as memory, disk, and processor. These can be used to determine system health and performance

52
Q

What are trace logs?

A

Trace logs can collect statistics about services, providing you with detailed reports about resource behavior. In essence, trace logs provide extensions to the Event Viewer, logging data that would otherwise be inaccessible.

53
Q

What does the counter “% Processor Time” mean for a Processor?

A

The percentage of time that the processor is executing a non-idle thread. In general terms, this should be low. If it is greater that 85% for a sustained period, you may have a processor bottleneck.

54
Q

What does the counter “% Privileged Time” or “% User Time” mean for a Processor?

A

If overall processor time is very high (over 85% for sustained periods), it can be helpful to compare these. Privileged time represents system processes, whereas user time is software applications. If privileged time is much higher, it is likely that the CPU is underpowered.

55
Q

What does the counter “% Disk Time” mean for a Physical Disk?

A

The percentage of elapsed time that the selected disk drive is busy servicing read or write requests. This is a good overall indicator of how busy the disk is. Again, if the average exceeds 85% for a sustained period, you may have a disk problem

56
Q

What does the counter “Average Disk Queue Length” mean for a Physical Disk?

A

The number of requests outstanding on the disk at the time the performance data is collected. Taken with the preceding counter, this gives a better indicator of disk problems. For example, if the disk queue length is increasing and disk time is high, then you have a disk problem.

57
Q

What does the counter “Available Bytes” mean for Memory?

A

The amount of memory available - this should not be below about 10% of total system RAM. If available bytes fall continuously, there could be a memory leak (that is, a process that allocates memory but does not release it again).

58
Q

What does the counter “Pages/sec” mean for Memory?

A

The number of pages read from or written to disk to resolve hard page faults. This means your system is using the paging file. Nothing wrong as long as this is not excessive (averaging above about 50). You probably also want to check the paging file’s usage by viewing the paging object itself.

59
Q

What does the counter “% Usage” mean for Paging File?

A

The amount of the pagefile instance in use in percent. If your paging file is currently 1000MB on the disk and this figure averages 50%, then it means you might benefit from adding memory (about 500 MB). Don’t forget that if your system pages excessively, then disk performance will suffer - paging is disk intensive.

60
Q

What is msconfig.exe?

A

System Configuration Utility is used to modify various settings and files that affect the way the computer boots and loads Windows. The msconfig tool is frequently used to test various configurations for diagnostic purposes, rather than a permanently make configuration changes. Follow diagnostic testing, permanent changes would typically be made with more appropriate tools, like Services, to change the startup settings of various system services.

61
Q

What is the BCD?

A

The Boot Configuration Data is information about operating systems installed on the computer located in \boot\bcd on the system partition. The BCD can be modified using the bcedit command-line tool or msconfig.

62
Q

Identify how to open the tool shown in this exhibit. What single word command can you use to open the tool shown in the exhibit? How can this tool assist with troubleshooting?

A

Run the System Information tool using the msinfo32 command. This tool produces a comprehensive hardware and software inventory report. This configuration and version information will be useful for many troubleshooting tasks.

63
Q

You take a support call where the user doesn’t understand why a program runs at startup when the Startup folder is empty. What is the likely cause, and how could you verify this?

A

The program has added a registry entry to run at startup. You could check this (and optionally disable the program) by using Task Manager.

64
Q

You are monitoring CPU Usage and notice that it often jumps to 100% and then falls back. Does this indicate a problem?

A

Probably not—CPU Usage usually peaks and falls. If it stays over 80–90%, the system could require a faster CPU, or if it spikes continually, there could be a faulty application.

65
Q

You have a computer with two SATA disks. You want to evaluate the performance of the primary disk. How would you select this in Performance Monitor, and what might be appropriate counters to use?

A

Select the Physical Disk object, select the counter, and then select the 0 C: instance. Counters that are useful for evaluating performance include % Disk Time and Average Disk Queue Length.

66
Q

You are monitoring system performance and notice that a substantial number of page faults are occurring. Does this indicate that a memory module is faulty?

A

No—it shows the system is using the pagefile intensively and could benefit from more system RAM being installed.

67
Q

What is cmd.exe?

A

The Command Prompt is a basic shell interpreter for Windows. It processes the legacy command set that has been part of Windows since its earliest versions.

68
Q

What does this error mean “The requested operation requires elevation”?

A

The command prompt needs to be reopened with Administrator credentials “Run as administrator”.

69
Q

How to get help in Command Prompt?

A

If you type help at the command prompt and then press ENTER, a list of available commands is displayed. If you enter help Command, the help system lists the syntax and switches used for the command. You can also display help on a particular command by using the /? switch. For example, netstat /? displays help on the netstat command.

70
Q

What is dir command?

A

It is a command-line utility that displays information about the contents of the current directory. You can present files in a particular order using the /o:x switch, where x could be n to list by name, s to list by size, e to list by extension, or d to list by date. The date field can be set by the /t:x switch, where x is c for created on, a for last access, or w for last modified.

Another useful switch is /a:x, which displays files with the attribute indicated by x (r for Read-only, h for hidden, s for system, and a for archive).

A wildcard character allows you to use unspecified characters with the command. A question mark (?) means a single unspecified character. For example, the command dir ????????.log will display all .log files with eight characters in the file name.

71
Q

What is cd command?

A

Command-line tool used to navigate the directory structure.
If the current directory is C:\Users\David and you want to change to C:\Users\David\Documents, enter: cd Documents
If the current directory is C:\Users\David\Documents and you want to move up to the parent directory, enter: cd ..
If the current directory is C:\Users\David and you want to change to the root directory of the drive, enter: cd \
If the current directory is C:\Users and you want to change to C:\Windows, enter: cd \Windows

72
Q

What are the three-parts of this syntax: command Source Destination

A

Command: move command or copy command
Source: is the drive name, path, and name of the files to be moved/copied
Destination: the drive name and path of the new location

73
Q

What is the xcopy command?

A

It is a utility that allows you to copy the contents of more than one directory at a time and retain the directory structure. The syntax for xcopy is: xcopy Source [Destination] [Switches]. You can use switches to include or exclude files and folders

74
Q

What is the robocopy command?

A

The “robust copy” is another file copy utility. robocopy is designed to work better with long file names and NTFS attributes. You can also use robocopy to move files (/mov switch).

75
Q

What is the md command?

A

It is a command-line to create a directory. For example, to create a directory called Data in the current directory, type md Data. To create a directory called Docs in a directory called Data on the A drive, when the current path is C:\, type md A:\Data\Docs

76
Q

What is the rmdir command?

A

It is used to delete an empty directory, enter rd Directory or rmdir Directory. If the directory is not empty, you can remove files and subdirectories from it using the /s switch or use the /q switch to supress confirmation messages (quiet mode)

77
Q

What is diskpart?

A

It is the command interface underlying the Disk Management tool

78
Q

What is the basic process of inspecting disks and partitions?

A
  1. Run the ‘diskpart’ utility, and then enter ‘select disk 0’ at the prompt (or the number of the disk you want to check).
  2. Enter ‘detail disk’ to display configuration information for the disk. The utility should report that the partitions (or volumes) are healthy. If diskpart reports that the hard disk has no partitions, the partition table may have become corrupted.
  3. Enter either ‘select partition 0’ or ‘select volume 0’ at the prompt.
  4. Enter either ‘detail partition’ or ‘detail volume’ to view information about the object. You can now use commands such as ‘assign’ (change the drive letter), ‘delete’ (destroy the volume), or ‘extend’.
  5. Enter exit to quit diskpart.
79
Q

What is the format command?

A

It writes a new few system to a drive. This process deletes any data existing on the drive. The basic command is format X: /fs:SYS, where X is a drive letter and SYS is the file system, such as NTFS, FAT32, or EXFAT. By default, the command performs a scan for bad sectors first. This scan can be suppressed by using the /q switch.

80
Q

What is chkdsk?

A

chkdsk scans the file system and/or disk sectors for faults and can attempt to repair any problems detected.

81
Q

What is autochk?

A

It is a version of Check Disk that will run automatically if the system detects file system errors at boot.

82
Q

What are the three ways to run chkdsk?

A
  1. ‘chkdsk X:’ (where X is the drive letter but no switch is used) runs the tool in read-only mode. The scan will report whether errors need to be repaired.
  2. ‘chkdsk X: /f’ attempts to fix file system errors.
  3. ‘chkdsk X: /r” fixes file system errors and attempts recovery of bad sectors. You are prompted to save any recoverable data, which is copied to the root directory as filename.chk files.
83
Q

What is this command: ‘shutdown /s’ ?

A

Shutdown. The ‘shutdown /t nn’ command can be used to specify delay in seconds before shutdown starts; the default is 30 seconds. If a shutdown is in progress, ‘shutdown /a’ aborts it.

84
Q

What is this command: ‘shutdown /h’?

A

Hibernate. Save the current session to disk before powering off the computer.

85
Q

What is this command: ‘shutdown /l’?

A

Log off. Close all open programs and services started under the user account, but leave the computer running.

86
Q

What is this command: ‘shutdown /r’?

A

Restart. Close all open programs and services before rebooting without powering down. This is also called a soft reset.

87
Q

What is the command sfc?

A

System File Checker provides a manual interface for verifying system files and restoring them from cache if they are found to be corrupt or damaged.

88
Q

What is this command: ‘sfc /scannow’?

A

Runs a scan immediately of system files

89
Q

What is this command: ‘sfc /scanonce’?

A

Schedules a scan of the system files when the computer is next restarted

90
Q

What is this command: ‘sfc /scanboot’?

A

Schedules a scan of the system files that runs each time the PC boots.

91
Q

What is the winver command?

A

It reports version information.
- Version refers to a feature update via a year/month code representing the time of release, such as 1607 (July 2016) or 21H1 (first half of 2021).
- OS Build is a two-part numeric value with the first part representing the brand plus feature update and the second rev part representing quality update status (patches).

92
Q

You are attempting to run a command but receive the message “The requested operation requires elevation.” What must you do to run the command?

A

Run as Administrator when opening Command Prompt

93
Q

Which Windows command is probably best suited for scripting file backup operations?

A

The robocopy command offers more options than those offered by the xcopy command, so it will usually be the better choice. The copy command is quite basic and probably not suitable.

94
Q

Is the command format d: /fs:exfat /q valid? If so, what is its effect, and what precaution might you need to take before running it?

A

Yes, it is valid. It formats drive D with the exFAT file system by using a quick format (does not scan for bad sectors). This will delete the file table on the drive so existing data files can be overwritten—the formatted drive will appear to be empty in Explorer. If there are existing files that need to be preserved, they should be backed up before running the format command.

95
Q

How do you perform a scan to identify file system errors in read-only mode?

A

At a command prompt, run chkdsk without any switches. Note that sfc is not the correct answer as this verifies the integrity of protected system files rather than checks the file system on a drive.

96
Q

Why might you run the shutdown command with the /t switch?

A

To specify a delay between running the command and shutdown starting. You might do this to give users a chance to save work or to ensure that a computer is restarted overnight.