11.1.4 Manage Services

Lesson_11_Practice___Quiz

Lab 11.1.4

Complete this lab as follows:


  1. Access the Services control console.

    1. Right-click Start and then select Computer Management.

    2. Maximize the window for better viewing.

    3. From the left pane, expand and select Services and Applications > Services.

  2. Configure the services to start automatically and then start the service.

    1. Double-click the applicable service.

    2. Using the Startup type drop-down, select Automatic.

    3. Select Start to start the service.

    4. Select OK.

    5. Repeat steps 2a - 2d to configure the other service.


11.1.8


  1. You need to customize which utilities and programs load on your Windows system at startup.


    What should you do?


    Run System Configuration (Msconfig)


  2. After running the Backup and Restore console on your Windows computer, you notice that backups are not created for open files.


    To troubleshoot the issue, you want to confirm that the Volume Shadow Copy Service (VSS) is running and configured to start automatically when the computer boots.


    Which tool can you use to make sure VSS is configured to start automatically?


    Services


  3. You are using the System Information utility, and you want to see the size of the disks installed and how much free space you have. Which option would you expand?


    Components


  4. hich of the following utilities allows you to change the startup type of a service to Automatic (Delayed)?


    services.msc

  5. Windows comes with a special tool called the Microsoft Management Console (MMC). What does this tool do?


    Provide a consistent interface for all management tools

    Windows comes with a special tool called the Microsoft Management Console (MMC). Its purpose is to provide a consistent interface for all of the management tools that we use to manage the various aspects of the operating system.


  6. You are using the Services app. You have double-clicked on a service. Which tab will allow you to see the system drivers that the service uses?


    Dependencies

    The Dependencies tab shows the services and system drivers that the service uses.


  7. You have opened the System Information app, which is now displaying the System Summary.


    Which information can be seen from this view?


    Name of the operating system, the operating system manufacturer, and system model number


  8. You have opened the System Information app (msconfig.exe) and selected the tab named Boot. In the Boot options section, you have checked Boot log.


    What will selecting this option do?


    Gather information about a service or device that is running when the system starts up.


  9. What is the main purpose of the dxdiag utility?


    Test the system's multimedia capabilities.


  10. You have a utility on your computer that needs to run regularly on a set time and day each week. What tool would you use to accomplish this task?


    Task Scheduler

    11.2.8


  11. You are troubleshooting a problem that keeps occurring on your Windows system. When the problem happens, there are several Warning and Error events logged to the Application log in Event Viewer.


    You create a Custom View that shows only Warning and Error events. During troubleshooting, you filter the Custom View to show only the Error messages.


    How can you create a new Custom View using the current filter settings?


    Save the filter to a Custom View.


  12. You are troubleshooting a problem that keeps occurring on your Windows system. When the problem happens, Event Viewer shows several Error events in the Application and System logs.


    From a single view, you would like to see only Error events from both the Application and the System logs.


    What can you do in Event Viewer to make this happen?


    On the Application log, filter the log to show only Error events. Save the filter to a Custom View and then add the System event log as an additional filter.


  13. Using Event Viewer, you have created a Custom View to track Warning and Error events from both the Application and System logs.


    After a few days, there are several events in the Custom View. You would like to clear the messages from the view so that you only see messages starting from today.


    How do you make sure that any messages from today that are in the corresponding logs still exist?


    Edit the Custom View properties and create a custom range for the logged events, starting with today's date.

    A Custom View shows all messages that exist in the corresponding log. To remove older messages from the Custom View without deleting the messages, edit the Custom View properties to change the logged parameters.

  14. As part of the regular system maintenance on your Windows system, you are checking Performance Monitor statistics and Event Log events.


    You notice that there are several Error events listed with the same ID number. They also contain a description that sounds as if the error is related to system hardware. You check your Performance Monitor logs but don't notice anything unusual around the time that the events were generated.


    Which step must you take to get an email every time the event is logged so you can check the system statistics at that moment?


    Attach a task to the event.


    Attach a task to an event or log to receive a notification or take other actions when an event is logged. Tasks attached to an event execute the action whenever an event with that ID, source, and log occurs.


  15. On your Windows system, you run a custom application that was developed in-house.


    The application generates Event Viewer events and logs those events to the default Application and the Security logs in Event Viewer.


    As you monitor the application, you would like to be able to do the following:


    • View all events related to the application from a single log.

    • View only the events related to the application and no others.

    • View the necessary events with minimal future configuration.

    • Save the Event Viewer configuration so that you can easily export and import the solution to other servers that will be running the application.


      What should you do?


      Create a Custom View.

      A Custom View is a saved filter. Custom Views apply filter criteria to one or more event logs. The filter criteria for a Custom View is similar to that of a filter, but it also includes the log(s) you want to include in the view. Custom Views are saved between Event Viewer sessions and are available each time you use Event Viewer. You can export a Custom View and import it on another system. This exports and imports the Custom View criteria, but it does not export or import the events showing in the view.


  16. You have two Windows systems named Computer 1 and Computer 2.


    Over the next few days, you want to be able to monitor Computer 1 from Computer 2. To do this, you want to automatically save and send Computer 1's Application and System logs to Computer 2.


    How would you do this?


    On both computers, enable and configure Event Subscriptions. Configure Computer 1 as a source and Computer 2 as a collector.

  17. You manage three Windows systems that are part of a Workgroup. You would like to configure Event Subscriptions so that you can view all events from those computers on your Windows notebook.


    You need to configure the three source computers and one collector computer. The subscription will be a source-initiated subscription.


    What should you do? (Select two. Each answer is part of the complete solution.) On the collector computer, configure the subscription.

    On all four computers, run the winrm qc-q command. On the collector computer, run the wecutil qc /q command.


  18. You manage two Windows systems named Computer 1 and Computer 2.


    You have configured Event Subscriptions with the default settings to forward events from these two computers to a third Windows system named Computer 3.


    How do you view the events from these two computers on Computer 3?


    In Event Viewer, open the Forwarded Events log.

    By default, events received from source computers are saved in the Forwarded Events log in Event Viewer. You could create a filter, but the filter would not show any information that is different from what is in the Forwarded Events log. Use a filter if you want to add additional filters to the events in that log.


  19. You would like to configure Event Subscriptions on your Windows system to forward events to a network server. You need to configure your computer as a source computer for a collector- initiated subscription.


    Which of the following will be part of your configuration? (Select two.) Run the winrm qc command.

    Add the collector computer to the Event Log Readers group.


  20. You would like to configure Event Subscriptions on your Windows system to forward events to a network server. You need to configure your computer as a source computer for a source- initiated subscription.


    Which of the following will be part of your configuration? (Select two.) Run the winrm qc -q command.

    Configure the Local Security Policy to identify the FQDN of the collector computer.

    11.3.6


  21. You use a custom application that was developed in-house.


    On a periodic basis, the application writes or modifies several registry entries. You want to monitor these registry keys so that you can create a report that shows their corresponding settings over the next 5 days.


    What should you do?


    Configure a configuration data collector in Performance Monitor.

    Use a configuration data collector in Performance Monitor to monitor registry keys and values. Configure an interval (such as every 10 minutes) for the data collector to report the setting of the registry keys at that time. Configure the Data Collector Set with a stop duration of 5 days to collect data only for those 5 days. By using the data collector, you can easily create a report from the log data.


  22. You share your Windows system with several other users. You are concerned about the amount of disk space use on the computer.


    What can you do to be notified by email when the used disk space exceeds 85%?


    Configure a performance counter alert.

    Use a performance counter alert to configure triggers that take an action when a counter reaches a threshold value. Alerts monitor a system performance statistic such as processor time or disk space.


  23. You would like to generate a report that shows the status of hardware resources, processes, and configuration information on your Windows system.


    How can you generate a report that includes suggestions for ways to improve the performance of your system? (Select two. Each correct choice is a complete solution.)


    From Command Prompt, run perfmon /report.


    From Performance Monitor, under Data Collector Sets, run System Diagnostics.


  24. You manage a Windows system.


    You would like to generate a report that runs several basic tests of the operating system, Security Center, hard disk, services, and hardware devices and drivers.


    How can you generate a report that includes suggestions for how to improve system performance?


    In Performance Monitor, run the System Diagnostics Data Collector Set.

    To view a report that shows the required information, go to Performance Monitor and run the System Diagnostics Data Collector Set. You can also go to Performance Information and Tools in the Control Panel and generate a system health report to create the same report. The System Diagnostics report runs several basic tests of the operating system, Security Center, hard disk, services, and hardware devices and drivers. The System Diagnostics report also reports on warnings such as missing security tools (antivirus software) and system components that might need to be upgraded to improve performance.

  25. You need to monitor the processor utilization on your Windows system. You want to get an email notification every time the processor utilization exceeds 90%, so you create a new Data Collector Set in Performance Monitor.


    Which type of Data Collector should you create?


    Performance counter alert


  26. You have just installed a custom application on your Windows system. The application generates Event Viewer events and logs those events to the default Application and the Security logs in Event Viewer.


    You are concerned about system performance while running the application. You would like to be able to view the current statistics for the processor, memory, and disk reads and writes. You only want to see these statistics and no others, and you want to be able to easily save the configuration so that the same statistics are shown each time.


    What should you do?


    Create a Data Collector Set in Performance Monitor.

    Use Data Collector Sets to define statistics to gather over time. These statistics are saved to a file. You open the file to analyze the statistics. You cannot view current statistics from a defined Data Collector Set.


  27. After running the System Diagnostics found in the Data Collector Sets, you want to view the results of the diagnostics and review any suggestions for improving system performance.


    Click the folder that contains the diagnostics results.


    image


    After you run the System Diagnostics Data Collector Set, you can view the results of the diagnostics and review any suggestions for improving system performance in the Reports / System / System Diagnostics folder.

  28. Captures system performance statistics over a period of time. Data Collector Set (DCS)


    Used to view the collected data from data collector set counters. Performance Monitor Reports


    Displays real-time visual graphs of a computer's overall performance. Performance Monitor


    Used to start and stop and existing collection. logman.exe


  29. Which of the following is an accurate description of the function of the Windows Performance Analyzer (WPA)?


    Presents trace content in the form of interactive graphs and summary tables.


  30. The Windows Performance Toolkit (WPT) is not included with the Windows operating system.


    Which steps do you need to follow to install and run the WPT? (Select two. Each answer is part of the complete solution.)


    Install the Microsoft .NET Framework 4.5.


    Download the Windows Assessment and Deployment Kit (ADK).


    11.4.5


  31. You use an application on your Windows system that compresses videos used in your online business. You want to make sure that the application continues to run in the background even if you open other applications.


    How do you adjust the amount of attention given to that application?


    Use Task Manager to modify the process priority.


    Use Task Manager to configure the process priority. Priority controls how the system can delay or switch between processes.


    • By default, the system typically gives a higher priority to a process that has active user input or interaction.

    • Processes can continue to run in the background. Virus scanners, video compression, and backups are examples of processes that run in the background while you continue working in a different application.

    • If a background process has a priority that is too high, the system might seem slow and unresponsive when running other programs.

  32. You need to enable Remote Registry on your Windows desktop system.


    Click the Task Manager option you would use to do this.


    image


    You can use the Services tab in Task Manager to start, stop, or restart system services. In this example, you would go the Services tab, right-click the Remote Registry service, and click Start.


  33. 33.


    image


    A user calls to complain that her Windows system is running slowly. You launch Task Manager on her system and select the Processes tab. The output is shown in the image below.


    What should you do? (Select two. Each answer is a part of the complete solution.) Install a faster CPU in the system.

    Install more RAM in the system.

    The CPU in this system is overloaded because utilization is running consistently at 90% and above. A faster CPU will help reduce the load. In addition, system RAM utilization is above 70%. This indicates that either more RAM is needed or applications need to be unloaded.


  34. When should you start monitoring system performance?


    Immediately after the system is set up.



  35. There's a tool designed to collect data. It allows you to specify which counters you want to collect data for by clicking on the plus sign and adding the counters you want. What's the name of this tool?


    Performance Monitor

    Performance Monitor is designed to collect data. It allows you to specify which counters you want to collect data for. You do this by clicking on the plus icon and then specifying which counters you want to include by selecting them and clicking Add.


  36. You are analyzing the CPU utilization on you system. Why would you use Resource Monitor rather than Task Manager?


    Resource Monitor provides much more granular information than Task Manager.

    Resource Monitor provides much more granular information than Task Manager can. It displays the same categories of information as Task Manager does, such as CPU, Disk, Network, and Memory. It also includes overall utilization graphs for each category like Task Manager does. However, under each category, more details are provided that can't be found in Task Manager. Under CPU, for example, you see each of the processes running on the system, the processes' ID number, a description of the process, the threads each of the processes is using, how much CPU time is being used by each process, and a 60-second average of how much CPU utilization is being consumed by each process.


  37. Which action can you take to see disk activity performance for an application running on your Windows system?


    Filter by the application in Resource Monitor.


  38. You want to see memory statistics for a specific process running on your Windows system.


    What do you need to do to view the working set, shareable, and private memory for the process?


    Filter by the process in Resource Monitor.


  39. While working with a new application on your Windows system, the application stops responding.


    How can you analyze the application and its associated processes to identify which processes the application is waiting on?


    In Resource Monitor, analyze the wait chain for the process.


  40. You suspect that a process on your Windows computer is causing a large amount of network activity. You would like to view the network activity on your computer filtered by specific processes.


    Which of the following tools will display the most detailed information about network activity?

    Resource Monitor


    11.5.5


  41. You started using a new Windows server three months ago. Since that time, you have found that the system slows down and crashes from time to time.


    You want to look at a report that shows important events for the server since it was installed. You'd like to see when software was installed and if there are any hardware or application failures.


    What is the simplest way to view this information?


    Open Reliability Monitor.

    The reliability and problem history chart in Reliability Monitor keeps track of overall server health on a daily basis. It shows you a historical record of system changes and events. It assigns an overall server health value to each day (1 being the least stable and 10 being the most stable).


  42. You are viewing the reliability and problem history chart in Reliability Monitor on a Windows system. Some sections of the graph are displayed with a dotted line.


    What does the dotted line indicate?


    There is not enough data to calculate the stability index.


  43. What data on a Windows system is monitored to create the reliability and problem history chart in Reliability Monitor? (Select two.)


    Software installs/uninstalls System memory failures

  44. image


    Consider the Reliability Monitor output shown below. Which status does the yellow triangle icon with an exclamation point represent?


    Warning



  45. In the Windows Action Center, notifications are provided for which of the following? (Select two.)


    Network firewall Windows Defender

  46. image


    Consider the Reliability Monitor output shown below. What does the red circle with the letter x represent?


    Critical Event


  47. What tools or services rely on Security Center to be active and running to function well? (Select two.)


    Network Access Protection Windows Action Center


  48. What is the tool that queues messages, checks several security and maintenance-related items, and consolidates messages and status updates for several other tools called?


    Windows Action Center


  49. What is Windows Action Center?

    A central location for managing system messages and resolving issues within your system.


  50. How do you manage the items in the Windows Action Center?


    From the Settings app.


    11.6.3 Lab

    1. Disable automatically managed paging files for all drives.


      1. From the search field on the Windows taskbar, type Control.

      2. From Best match, select Control Panel.

      3. Select System and Security.

      4. Select System.

      5. From the left pane, select Advanced system settings.

      6. In the Performance section, select Settings.

      7. Select the Advanced tab.

      8. Under Virtual memory, select Change.

      9. Clear Automatically manage paging file size for all drives to change the default settings.

    2. Remove the page file from drive C:.

      1. Select the C: drive.

      2. Select No paging file and then select Set.

      3. Read the warning message displayed and then select Yes.

    3. Add a custom page file to drive D:.

      1. Select the D:.

      2. Select Custom size and configure its options as follows:

        • Initial size (MB): 2048

        • Maximum size (MB): 3072

      3. Select Set to add the paging file.

      4. Select OK to save your changes.

      5. Select OK to confirm that a restart is required.

      6. Select OK to close the Performance Options dialog.

      7. Select OK to close the System Properties dialog.

    4. Select Restart Now and wait for the computer to reboot.


    11.6.5


  51. How do you increase the size of the paging file on your Windows system?


    Modify the Advanced system settings.

    Edit Advanced system settings to increase the size of a paging file. The paging file is an area on the hard disk that Windows uses as if it were RAM. The paging file is used to move unused data in RAM to the hard disk, thereby making more space available in memory for other running applications or data.


  52. While managing the available memory for applications on your Windows system, you discover that the paging file is set below the recommended size.

    Which answer is a common recommendation for setting the size of the paging file?


    Configure the paging file to one and a half to two times the amount of physical RAM.


  53. For several months, your Windows computer acted like a server in the workgroup. It was optimized to share files and folders to the other computers. You no longer need the computer to act like a server. Now, you want the computer to focus on applications.


    After installing the applications, you believe the computer is not reacting quickly enough while using the applications. You know the machine has enough video memory and physical memory to handle the applications.


    What should you do?


    Edit the Processor Scheduling settings.

    Configure Processor Scheduling to adjust the response times of interactive applications or background applications running as services. In this scenario, you should adjust the Processor Scheduling for programs. This option gives the active application the best response time and the greatest share of available resources.


  54. You have been having trouble with your Windows notebook system crashing. The support technician wants you to send him a memory dump that occurred when the computer crashed. You find that the computer did not create the memory dump file.


    How can you configure the system to create a memory dump file the next time it crashes?


    Place the paging file on the system drive.

    The system cannot create a memory dump if the paging file is not on the system volume. The paging file must be at least the same size as the amount of physical memory.


  55. You want to enable Data Execution Protection (DEP) for all programs and services on your Windows system.


    Click the option you would use in System Properties to configure this function.


    image

    Configure DEP in the Data Execution Protection tab within the Performance settings of the System Properties screen. Data Execution Protection (DEP) helps to prevent damage to your computer from viruses and other security threats


  56. Why does virtual memory play an important role in the Windows OS?


    It allows you to run more applications on the system than you have physical memory to support.

    Virtual memory plays an important role in the Windows operating system because it allows you to run more applications on the system than you have physical memory to support.


  57. What is it called when the hard drive light on your PC is staying on constantly, and the applications have slowed down significantly?


    Disk thrashing


  58. What are the benefits of the Indexing Service on a Windows system? (Select two.) It makes the search process much faster.

    It searches specified locations on the system's hard disk drives and catalogs all the files and programs it finds.


  59. When using the Indexing Service on your Windows system, how many directories should you typically catalog?


    Only those containing data that is used often.


  60. You have opened the Indexing Options dialog and navigated to Advanced > File Types tab. From this page, you can specify how the file should be indexed.

    Which of the following options are available? (Select two.) Index Properties Only

    Index Properties and File Contents


        1. Lab


          Complete this lab as follows:


          1. On Office2, enable PowerShell remoting.

            1. Right-click Start and then select Windows PowerShell (Admin).

            2. From PowerShell, run Enable-PSRemoting.

          2. On ITAdmin, start a PowerShell interactive session with Office2 and test Office2's connection to the ISP.

            1. From the top navigation tabs, select Floor 1 Overview.

            2. Under IT Administration, select ITAdmin.

            3. Right-click Start and then select Windows PowerShell (Admin).

            4. From PowerShell, run Enter-PSSession Office2.

            5. Run tracert 65.86.1.1.

            6. Run Exit-PSSession.

          3. Answer the question.

            1. In the top right, select Answer Questions.

            2. Answer the question.

            3. Select Score Lab.


        2. 11.7.6


  61. You manage two Windows systems named Computer1 and Computer2. Both computers are members of a domain. Windows Remote Management (WinRM) is enabled on both computers.


    Which steps do you need to perform so you can use Computer2 to create an additional disk volume on Computer1?


    On Computer2, run winrs and then run diskpart

    To create an additional disk volume on a remote computer, run winrs and then run diskpart from the local computer. Windows Remote Shell (WinRS) uses the command line interface to manage a remote computer. DiskPart is a command line utility used to configure and manage disks and volumes.

  62. You manage two Windows systems named Computer1 and Computer2. Both computers are members of a domain.


    Which steps do you need to perform so you can remotely execute commands on Computer2 from Computer1?


    On Computer2, run winrm qc

    To execute the commands on a remote computer, the Windows Remote Management (WinRM) service must first be enabled on the remote computer with the winrm qc command.


  63. You manage two Windows systems named Computer1 and Computer2. You need to use the command line to remotely manage Computer1 from Computer2.


    What should you do? (Select two. Each answer is part of the complete solution.) On Computer1, run winrm qc

    Authenticate Computer2 to Computer1


    In this scenario, you must:


    1. Run winrm qc on Computer1. This enables the Windows Remote Management (WinRM) service so you can execute commands on the remote computer.

    2. Authenticate Computer2 to Computer1. You need to authenticate the local computer to the remote computer because authentication credentials will be forwarded to the remote computer. In a domain, Active Directory provides authentication for remote management. However, in this scenario, there is no domain. You should authenticate the computers with

    the winrm set winrm/config/client @{TrustedHosts="computername"} command.


  64. You are the Windows desktop administrator for your company. You would like to manage your computers remotely using the Windows Remote Shell. You need to enable remote management on each target computer.


    What should you do?


    Run winrm quickconfig

    If you want the target computer to support Remote Shell connections, run winrm quickconfig to enable this. Because Remote Shell sets up HTTP listeners on ports 80 or 443, you will not need to open any additional firewall ports. To connect to the target computer, run winrs along with the command you want to execute.


  65. You have a Windows system that you would like to manage remotely. The computer connects to the network behind a firewall that blocks all but the most common ports.


    Which remote management solution does not require additional firewall ports opened?

    Windows Remote Shell (WinRS)


    Windows Remote Shell (WinRS) sets up HTTP listeners on ports 80 or 443. These ports are allowed by most firewalls.


  66. You need to interactively access Command Prompt on a remote Windows system named WS1 from your Windows workstation.


    Which command should you use to do this?


    psexec \\WS1 cmd


    The psexec \\WS1 cmd command can be used to open an interactive Command Prompt on the remote WS1 workstation. PsExec is a remote management application that is part of the PsTools tool component of the Windows Sysinternals Suite from Microsoft. PsExec is similar to WinRS in that you can execute programs on remote systems. It provides full interactivity for console applications. This makes the applications appear to be running locally.


  67. You need to be able to remotely execute commands on a Windows workstation named WS1.


    Which commands can be used to enable remote management on this system? (Select two. Each answer is a complete solution.)


    winrm quickconfig Enable-PSRemoting

  68. Which of the following syntax examples is used by a PowerShell cmdlet?


    Verb – noun

    PowerShell commands are referred to as cmdlets. The syntax starts with a verb. The verb specifies what you want PowerShell to do, such as get, start, or set. This is followed by a dash and a noun that specifies what you want to get, set, or start. For example, get - help, get - process, and start - service are all commands.


  69. What are two ways you can run PowerShell cmdlets remotely? (Select two.)


    Use invoke-command followed by the name of the remote computer and then the PowerShell cmdlet within brackets.


    Directly from the command, use the computername parameter.


  70. Which tool can you use to remotely manage a system using a graphical user interface?


Graphical Microsoft Management Console


Lab 11.8.4


  1. Enable Remote Desktop.

    1. Right-click Start and then select System.

    2. From the left pane, select Remote Desktop.

    3. Under Enable Remote Desktop, slide the switch to ON.

    4. Select Confirm.

  2. Select the users that can remotely access this PC.

    1. From the right pane, scroll down to User Accounts and select Select users that can remotely access the PC.

    2. Select Add.

    3. In the Enter the object names to select field, type Tom Plask and then select Check Names.

    4. Select OK to choose the user.

    5. Select OK to add the user.

  3. Verify the firewall port configuration.

    1. From Settings, in the top left, select Home.

    2. Select Network & Internet.

    3. From the right pane, select Windows Firewall.

    4. Select Allow an app through firewall.

    5. Scroll down and verify that Remote Desktop is selected, indicating that the port is opened.


      The corresponding port is opened or closed automatically when you enable or disable Remote Desktop.


    6. Select Cancel.


Lab 11.8.8


  1. Access the Remote settings dialog.

    1. In the search field on the Windows taskbar, type Control.

    2. Under Best match, select Control Panel.

    3. Select System and Security.

    4. Select System.

    5. From the left pane, select Remote settings.

  2. Configure Remote Assistance.

    1. Under Remote Assistance, select Allow Remote Assistance connections to this computer.

    2. Select Advanced.

    3. Make sure Allow this computer to be controlled remotely is selected.

    4. Under Invitations, use the drop-down lists to select 1 Hours.

    5. Select Create invitations that can only be used from computers running Windows Vista or later.

    6. Select OK.

    7. Select OK.


11.8.9


  1. You have a Windows system that you would like to manage remotely. You enable Remote Desktop on the computer. While working from home, you find that your home firewall is blocking Remote Desktop.


    Using the port numbers assigned by default, how can you configure the firewall to allow a Remote Desktop connection to the system?


    Open port 3389 in the network firewall.


  2. You are the desktop administrator for your company. You would like to manage the computers remotely using a tool with a graphical user interface (GUI).


    Which action should you take? (Select two. Each answer is a possible solution.)


    Establish a Remote Desktop connection to each computer.


    Open Computer Management and connect to each remote computer.


  3. You need to connect to a remote Windows system using Remote Desktop.


    How can you copy files from your local hard drives to the remote computer with the least amount of effort?


    In the Remote Desktop Connection options, edit the local devices and resources options.

  4. You have a computer running Windows 10. You have just enabled Remote Desktop on the computer so you can connect to it using a low-speed broadband connection from home and run a few reports. You need to optimize the performance of your Remote Desktop session for your slow connection.


    Select the Experience setting(s) that will optimize performance.


    imageEnabling Persistent bitmap caching caches

  5. You are using a Windows desktop system to connect to a remote system using Remote Desktop.


    How do you prevent the desktop background on the remote computer from displaying on the local computer?


    On the Experience tab of the Remote Desktop Connection, clear the Desktop Background checkbox.


  6. You manage a Windows system that is a member of a Workgroup. The computer is shared by three users. Each user has a standard user account.


    Mary is one of the three users of this computer. She wants to access the computer using a Remote Desktop connection.


    How do you allow Remote Desktop access for Mary while granting her the least amount of privileges possible?


    Make Mary's user account a member of the Remote Desktop Users group.


  7. You manage several Windows systems that are members of a domain. Your company uses Remote Assistance to help diagnose user desktop issues. All computers are configured to allow Remote Assistance. One day, you receive a Remote Assistance request from someone you don't know using an invitation file you created several weeks ago.


    What can you do to prevent this from happening again? (Select two.) Require a password on invitation files.

    Decrease the timeout for invitation files.


  8. Which of the following are true regarding Remote Assistance? (Select two.) Invitations require a password and have an expiration date.

    The helper cannot copy files from a user's computer.


  9. You need to configure Remote Assistance on your Windows system so that invitations can only be used from computers running Windows Vista or later.


    Click the System Properties option you would use to do this.


    imageYou can configure Remote Assistance so that invitations can only be used from computers running Windows Vista or later by clicking

    the Advanced button in the Remote Assistance section under the Remote tab in System Properties. In the Remote Assistance Settings dialog, click Create invitations that can only be used from computers running Windows Vista or later.


  10. You were having trouble with your Windows system, and you initiated a Remote Assistance session with a Help Desk technician.


    The technician has taken control of your system to perform several checks. She has now asked you to take back control of the system.

    What should you do? (Select two. Each answer is a complete solution.) Press Esc.

    Click Stop sharing.


    Lab 11.9.3


    1. Open the System Configuration tool, also known as MSconfig.

      1. From the Windows taskbar, in the search field, type msconfig.

      2. From Best match, select System Configuration.

    2. Disable all non-Microsoft services.

      1. Select the Services tab.

      2. From the bottom left, select Hide all Microsoft Services. You are left with the remaining services selected.

      3. Select Disable all.

      4. Select Apply.

    3. Use Task Manager to disable all high and medium startup items.

      1. Select the Startup tab.

      2. Select Open Task Manager.

      3. Select a program that has a High or Medium startup impact and then select Disable.

      4. Repeat step 3c for all remaining High or Medium startup items.

      5. Close Task Manager.

    4. Close the System Configuration tool.

      1. From the System Configuration tool, select OK.

      2. Because Isabel is in the middle of a project, select Exit without restart.


        11.9.10


  11. What are some of the resources you can look at first when troubleshooting startup issues with your PC? (Select two.)


    Task Manager


    msconfig


  12. What tool can be used to automatically fix common startup problems?


    Startup Repair


  13. Drag each PowerShell feature or function on the left to the appropriate description on the right.


    These let you access data stores, such as the registry and certificate store, in a way similar to accessing the file system.

    Providers


    This is text-based and uses a simple command syntax. Command line interface


    You can use this to redirect the output of one PowerShell cmdlet to the input of another. Piping


    These contain one or more PowerShell cmdlets. Script files


    These are executed at a PowerShell prompt to perform system management tasks. Cmdlets


  14. The PowerShell command line interface (CLI) uses simple command construction.


    What is the typical form of a PowerShell command? verb-noun -adverb

  15. What are some security measures Microsoft has implemented to protect your system against users trying to use PorwerShell for malicious purposes?


    File extension, script's full path, and execution policies


  16. How should cmdlets in a PowerShell script be organized?


    In the order that they should run


  17. When do you need to use the full path to a script in order to run it in PowerShell?


    Always.


  18. What are some of the execution policies that Windows has in place to protect PowerShell against malicious users? (Select two.)


    AllSigned and RemoteSigned Restricted and Unrestricted


  19. Why is command history so useful in PowerShell?


    Because it allows you to use the up arrow key to select a previously used command instead of retyping it.


  20. What happens when you double-click a PowerShell script file?


It opens as a Notepad file.

Donation Page

Support Our Work

Do you appreciate the value this website provides? If so, please consider donating to help keep it running. Your donation will go a long way in helping us continue to provide the same quality of content and services. Every bit helps, and your support is greatly appreciated. Thank you for your generosity.