test 2 Flashcards
Describe this command/utility: Services
The Windows Services utility allows the system administrator to start, stop and
manage all of the functions of a background process.
Disable a background process
Describe this command/utility: ODBC Data Sources
The ODBC (Open Database Connectivity) Data Sources utility integrates Windows applications with database services.
Create a database link to an external server.
A network administrator is troubleshooting an intermittent Internet link
outage to a server at 8.8.8.8. The administrator believes that the outage is
occurring on one of the WAN connections between locations. Use a
Windows network utility that can identify the router that is closest
to the outage
tracert 8.8.8.8
Which windows 10 editions include Domain Membership?
Pro and Enterprise
Which windows 10 editions include AppLocker
Enterprise
AppLocker allows an administrator to manage which applications can run on
company computers. This feature is only available in Windows 10 Enterprise.
Which windows 10 editions include BitLocker
Pro, Enterprise
Which windows 10 editions include BranchCache?
Enterprise
Network administrators use BranchCache to store often-used files at a local site
instead of transmitting them across the network each time they’re used. This
feature is only available in Windows 10 Enterprise edition
Which windows 10 editions include Hyper-V?
pro, enterprise
Hyper-V allows users to run multiple operating systems as virtual machines in
Windows 10. This feature is included in Windows 10 Pro and higher.
A system administrator is concerned that the local Windows file system
may contain logical file system errors. Scan and repair any potential file
system errors from the Windows command line.
sfc /scannow
A user runs a corporate app on their smartphone that downloads a
database each time the app is started. This download process normally
takes a few seconds, but today the download is taking minutes to
complete. Which of the following should a technician follow as the best
NEXT troubleshooting step?
❍ A. Disable Bluetooth
❍ B. Run a network speed check
❍ C. Evaluate the app with an app scanner
❍ D. Check the cloud storage resource usage
The Answer: B. Run a network speed check
Delays associated with the downloading process would initially indicate a
problem with the network connection. A speed check would evaluate the
network connectivity and provide a baseline for download speeds.
The incorrect answers:
A. Disable Bluetooth
The Bluetooth radio would not cause a delay in transmitting traffic
across the 802.11 network or cellular network. It’s unlikely that disabling
Bluetooth would provide any change to the download speed.
C. Evaluate the app with an app scanner
This app is a corporate published app, so using a third-party app scanner
to determine the safety and security of the app would be unnecessary.
D. Check the cloud storage resource usage
The resource usage of a cloud storage platform would not cause the delays
with this app.
Jack, a user, has opened a help desk ticket to remove malware from his
laptop. A previous removal occurred two weeks earlier with a similar
malware infection. Which of the following was missed during the first
malware removal?
❍ A. Restart the computer
❍ B. Educate the end-user
❍ C. Enable System Protection
❍ D. Quarantine infected systems
The Answer: B. Educate the end-user
Of the available possible answers, this is the only one that would have
resulted in a reinfection if not properly followed. The users aren’t malware
experts, and they may not realize that their actions can have a negative
effect on their system. Spending some quality time explaining antimalware best practices can help prevent future infections.
The incorrect answers:
A. Restart the computer
Restarting the computer is not a necessary step in the malware removal
process, and it wouldn’t cause the computer to be more susceptible to
another malware infection.
C. Enable System Protection
Enabling System Protection after malware has been removed does not
make it more likely to receive another infection.
D. Quarantine infected systems
The quarantine process would prevent other devices from infection.
Missing the quarantine process would not necessarily cause the original
system to become infected again.
Which of the following features would be found in Windows 10 Enterprise but not in Windows 10 Pro? (Choose TWO) ❍ A. Domain membership ❍ B. BitLocker ❍ C. BranchCache ❍ D. Hyper-V ❍ E. Remote Desktop host ❍ F. AppLocker
The Answer: C. BranchCache, and F. AppLocker
BranchCache provides a method of caching data at remote sites to save
time and bandwidth, and AppLocker provides administrative control
of what applications can run in Windows. Both features are available in
Windows 10 Enterprise but not in Windows 10 Pro
A local coffee shop has a public wireless network for customers and a
private wireless network for company devices. The shop owner wants to be
sure that customers can never connect to the company network. Which of
the following should be configured on this network?
❍ A. Enable WPS on the customer network
❍ B. Configure WPA2 on the company network
❍ C. Require static IP addresses on the customer network
❍ D. Assign MAC filters to the company network
❍ E. Use a firewall between the customer and corporate network
The Answer: B. Configure WPA2 on the company network
Enabling WPA2 (Wi-Fi Protected Access version 2) would require a
password to connect and would prevent customers from connecting to the
company wireless network
A user in the shipping department has logged into the Windows domain.
However, the desktop does not show the user’s normal wallpaper and all
of the user’s spreadsheets and documents in the “My Documents” folder
are missing. Which of these would be the BEST way to restore the user’s
normal work environment?
❍ A. Rename the user’s folder and delete their profile in the registry
❍ B. Boot into Safe Mode and disable all startup applications
❍ C. Add the user to the Administrator group
❍ D. Update to the latest operating system version
The Answer: A. Rename the user’s folder and delete their profile
in the registry
Problems with a user profile causes display problems on the desktop and
user documents to disappear. To recreate the profile, the user’s folder
is deleted and the profile setting in the registry is deleted. Once the
computer is restarted and the user logs in, a new profile will be created.
The incorrect answers:
B. Boot into Safe Mode and disable all startup applications
There’s nothing associated with this issue that would indicate a problem
with a startup application, and it would not be necessary to boot into Safe
Mode if there was an issue with a startup application.
C. Add the user to the Administrator group
The user doesn’t need administrator rights and permissions to load their
own desktop and files. Adding the user to the Administrator group would
not resolve the issue and would create a larger security concern.
D. Update to the latest operating system version
The current version of the operating system should properly load a user’s
profile and their documents. Updating the operating system would be a
significant and unnecessary change
Which of the following Windows Share permissions has the priority when assigning access on a mapped drive? ❍ A. Allow ❍ B. Full control ❍ C. List folder contents ❍ D. Deny
The Answer: D. Deny
In Windows shares, the most restrictive setting has priority over all others.
For example, the deny option takes priority over all other permissions.
The incorrect answers:
A. Allow
If a share is configured to deny access, it will take priority over an allow.
B. Full control
The permission option for full control would be configured for allow or
deny access, and does not itself have priority over the deny option.
C. List folder contents
Listing folder contents is an NTFS permission that would be configured
to allow or deny. These permission categories do not take priority over a
deny setting.