What command would a technician use to apply a change to the security policy?

Grátis

20 pág.

What command would a technician use to apply a change to the security policy?

  • Denunciar


Pré-visualização | Página 2 de 3

· to start a network service
· to review the settings of password and logon requirements for users
Explanation: These are some common net commands:
net accounts – sets password and logon requirements for users
net start – starts a network service or lists running network services
net use – connects, disconnects, and displays information about shared network resources
net view – shows a list of computers and network devices on the network
When used without options, the net accounts command displays the current settings for password, logon limitations, and domain information.
18. Match the Windows 10 boot sequence after the boot manager (bootmgr.exe) loads.
· Step one: The Windows boot loader Winload.exe loads
· Step two: Ntosknl.exe and hal.dll are loaded
· Step three: Winload.exe reads the registry, chooses a hardware profile, and loads the device drivers.
· Step four: Ntoskrnl.exe takes over the process.
· Step five: Winlogon.exe is loaded and excutes the logon process.
19. A technician has installed a third party utility that is used to manage a Windows 7 computer. However, the utility does not automatically start whenever the computer is started. What can the technician do to resolve this problem?
· Set the application registry key value to one.
· Use the Add or Remove Programs utility to set program access and defaults.
· Change the startup type for the utility to Automatic in Services .
· Uninstall the program and then choose Add New Programs in the Add or Remove Programs utility to install the application.
Explanation: The Services console in Windows OS allows for the management of all the services on the local and remote computers. The setting of Automatic in the Services console enables the chosen service to start when the computer is started.
20. Which statement describes the function of the Server Message Block (SMB) protocol?
· It is used to stream media contents.
· It is used to manage remote PCs.
· It is used to compress files stored on a disk.
· It is used to share network resources.
Explanation: The Server Message Block (SMB) protocol is primarily used by Microsoft to share network resources.
21. A user creates a file with .ps1 extension in Windows. What type of file is it?
· PowerShell function
· PowerShell cmdlet
· PowerShell documentation
· PowerShell script
Explanation: The types of commands that PowerShell can execute include the following:
· cmdlets – perform an action and return an output or object to the next command that will be executed
· PowerShell scripts – files with a .ps1 extension that contain PowerShell commands that are executed
· PowerShell functions – pieces of code that can be referenced in a script
22. Match the Windows command to the description.
Modules 3 – 4: Operating System Overview Group Exam
· renames a file ~~> ren
· creates a new directory ~~> mkdir
· changes the current directory ~~> cd
· lists files in a directory ~~> dir
23. A user logs in to Windows with a regular user account and attempts to use an application that requires administrative privileges. What can the user do to successfully use the application?
· Right-click the application and choose Run as Priviledge .
· Right-click the application and choose Run as Superuser .
· Right-click the application and choose Run as Administrator .
· Right-click the application and choose Run as root .
Explanation: As a security best practice, it is advisable not to log on to Windows using the Administrator account or an account with administrative privileges. When it is necessary to run or install software that requires the privileges of the Administrator, the user can right-click the software in the Windows File Explorer and choose Run as Administrator .
24. An IT technician wants to create a rule on two Windows 10 computers to prevent an installed application from accessing the public Internet. Which tool would the technician use to accomplish this task?
· Local Security Policy
· Computer Management
· Windows Defender Firewall with Advanced Security
· DMZ
Explanation: Windows Firewall with Advanced Security or the Windows 10 Windows Defender Firewall with Advanced Security is used to create inbound and outbound rules, connection security rules such as security traffic between two computers, and monitoring any active connection security rules.
25. What technology was created to replace the BIOS program on modern personal computer motherboards?
· UEFI
· MBR
· CMOS
· RAM
Explanation: As of 2015, most personal computer motherboards are shipped with UEFI as the replacement for the BIOS program.
26. Match the Linux system component with the description. (Not all options are used.)
· CLI : a text based interface that accepts user commands
· shell : a program that interprets and executes user commands
· daemon : a background process that runs without the need for user interaction
· (Empty) : a program that manages CPU and RAM allocation to processes, system calls, and file systems
27. What is the outcome when a Linux administrator enters the man man command?
· The man man command configures the network interface with a manual address
· The man man command opens the most recent log file
· The man man command provides a list of commands available at the current prompt
· The man man command provides documentation about the man command
Explanation: The man command is short for manual and is used to obtain documentation about a Linux command. The command man man would provide documentation about how to use the manual.
28. Match the description to the Linux term. (Not all options are used.)
· a type of file that is a reference to another file or directory ~~> symlink
· a running background process that does not need user interaction ~~> daemon
· protecting remote access ~~> hardening
· (Empty) ~~>logging
29. What are two benefits of using an ext4 partition instead of ext3? (Choose two.)
· an increase in the number of supported devices
· improved performance
· compatibility with NTFS
· increase in the size of supported files
· decreased load time
· compatibility with CDFS
Explanation: Based on the ex3 file system, an ext4 partition includes extensions that improve performance and an increase in the of supported files. An ext4 partition also supports journaling, a file system feature that minimizes the risk of file system corruption if power is suddenly lost to the system.
30. Consider the result of the ls -l command in the Linux output below. What are the file permissions assigned to the sales user for the analyst.txt file?
ls -l analyst.txt
-rwxrw-r-- sales staff 1028 May 28 15:50 analyst.txt
· read, write, execute
· write only
· read only
· read, write
Explanation: The file permissions are always displayed in the User Group and Other order. In the example displayed, the file has the following permissions:
The dash ( – ) means that this is a file. For directories, the first dash would replaced with a “d”.
The first set of characters is for user permission (rwx).
The user, sales, who owns the file can read, write and execute the file.
The second set of characters is for group permissions (rw-). The group, staff, who owns the file can read and write to the file.
The third set of characters is for any other user or group permissions (r–). Any other user or group on the computer can only read the file.
31. What is the purpose of entering the netsh command on a Windows PC?
· to configure networking parameters for the PC
· to change the computer name for the PC
· to create user accounts
· to test the hardware devices on the PC
Explanation: The netsh.exe tool can be used to configure networking parameters for the PC from a command prompt.
32. Which type of Windows PowerShell command performs an action and returns an output or object to the next command that will be executed?
· cmdlets
· functions
· routines
· scripts
Explanation: The types of commands that PowerShell can execute include the following:
· cmdlets – perform an action and return an output or object to the next command that will be executed
· PowerShell scripts

Página123

What command would be used on a computer where a specific application has stopped?

The most common way to close an unresponsive app on Windows is to use the keyboard shortcut of Alt + F4. This combination of keys tells the operating system to terminate the currently active window.

Which macos tool is used to display and modify the main system settings?

To change System Settings on your Mac, click the System Settings icon in the Dock or choose Apple menu > System Settings.

Which system configuration tab is used to configure a computer to boot in diagnostic startup mode?

The MSConfig General tab gives you some basic options for starting your PC. The default choice for the utility is Normal Startup. The other two options for starting the computer are Diagnostic Startup and Selective Startup.

Which type of Windows installation setup is used for a corporate environment quizlet?

Network admins in corporate environments often prefer which type of Windows 10 installation type? Clean Installation.