A+ Chapter 11 Test (2.0)

Total Page:16

File Type:pdf, Size:1020Kb

A+ Chapter 11 Test (2.0) Name: Class: Date: A+ Chapter 11 Test (2.0) True / False Indicate whether the statement is true or false. 1. Windows Task Scheduler can be set to launch a task or program at a future time, including at startup. a. True b. False 2. You do not have to be logged on as an administrator in order to use tools found in Computer Management. a. True b. False 3. The Home editions of Windows 7 do not include the Local Security Policy or Print Management. a. True b. False 4. There is no undo feature in the Registry Editor. a. True b. False 5. The Windows shell is responsible for interacting with hardware. a. True b. False Multiple Choice Indicate the answer choice that best completes the statement or answers the question. 6. What file holds the preferences and settings of the currently signed-in user? a. userconfig.ini b. ntprofile.dat c. profile.ini d. ntuser.dat 7. Where can a user find out more information about a hardware or network failure that occurred on that particular PC? a. Task Scheduler b. Resource Monitor c. Event Viewer d. Performance Information and Tools 8. Using what utility allows you to build your own customized console windows? a. Microsoft Management Console b. Microsoft Management Components c. Microsoft Manager Console d. Microsoft Manager Controls Copyright Cengage Learning. Powered by Cognero. Page 1 Name: Class: Date: A+ Chapter 11 Test (2.0) 9. What Windows utility is used to control the Windows and third-party services installed on a system? a. Microsoft Management Console b. Services console c. Event Viewer d. System Configuration Utility 10. What Windows utility can be used to find out what processes are launched at startup? a. Microsoft Management Console b. Computer Management c. System Configuration d. Task Manager 11. A custom view filter in Event Viewer can be saved to a file using what extension? a. .evf b. .evs c. .evtx d. .evlog 12. What task can't be performed by using Task Manager? a. restart a process b. end a process c. end process tree d. start a process 13. What registry key stores information that determines which application is opened when a user double-clicks a file? a. HKEY_USERS b. HKEY_CLASSES_ROOT c. HKEY_CURRENT_USER d. HKEY_LOCAL_MACHINE 14. When troubleshooting a device or service that has failed to start, what utility may have information regarding the cause? a. Microsoft Management Console b. Performance Monitor c. Event Viewer d. Resource Monitor 15. When a user logs into Windows, what registry key is created? a. HKEY_LOCAL_MACHINE b. HKEY_CURRENT_CONFIG Copyright Cengage Learning. Powered by Cognero. Page 2 Name: Class: Date: A+ Chapter 11 Test (2.0) c. HKEY_USERS d. HKEY_CURRENT_USER 16. What Windows utility is particularly useful in identifying software and hardware bottlenecks, and provides the ability to monitor in real time? a. Event Viewer b. Reliability Monitor c. Resource Monitor d. Performance Monitor 17. If you need to find the model and speed of the installed processor and hard drive and the amount of memory installed, what utility should you open? a. msinfo32.exe b. msconfig.exe c. Event Viewer d. Task Manager 18. Shell subsystems that have only a limited access to system information and can access hardware only through other OS services are operating in what mode? a. process mode b. elevated privilege mode c. user mode d. kernel mode 19. What registry key is considered to be the most important key, containing hardware, software, and security data? a. HKEY_CLASSES_ROOT b. HKEY_USERS c. HKEY_LOCAL_MACHINE d. HKEY_CURRENT_CONFIG 20. What is the term given to the individual tools in a console? a. views b. snap -ins c. add-ins d. consoles 21. What Performance counter tracks the percentage of time the hard drive is in use? a. Disk Buffer Length b. Avg. Disk Queue Length c. % Disk Time d. Max Disk Queue Length Copyright Cengage Learning. Powered by Cognero. Page 3 Name: Class: Date: A+ Chapter 11 Test (2.0) 22. If you need to see information about problems and errors that have happened over time, what utility should you use? a. Performance Monitor b. Services Console c. Reliability Monitor d. Resource Monitor 23. If a game or desktop publishing app that relies heavily on graphics is not performing well or giving errors, what command can you run to view DirectX information? a. gpudiag.exe b. dxtshoot.exe c. video.exe d. dxdiag.exe Matching Match each item with a statement below. a. Task Scheduler b. Event Viewer c. Windows ReadyBoost d. Task Manager e. Registry f. kernel g. shell h. Computer Management i. Service j. HAL 24. the portion of an OS that relates to the user and to applications 25. uses a flash drive or secure digital (SD) memory card to boost hard drive performance 26. lets you view the applications and processes running on your computer as well as information about process and memory performance, network activity, and user activity 27. can be set to launch a task or program at a future time, including at startup 28. The core of the OS that is responsible for interacting with hardware 29. a Windows tool useful for troubleshooting hardware or network failures, OS error messages, failed services and more. 30. a database designed with a treelike structure that contains configuration information for Windows, users, software applications, and installed hardware devices. Copyright Cengage Learning. Powered by Cognero. Page 4 Name: Class: Date: A+ Chapter 11 Test (2.0) Copyright Cengage Learning. Powered by Cognero. Page 5 .
Recommended publications
  • Semi-Automated Parallel Programming in Heterogeneous Intelligent Reconfigurable Environments (SAPPHIRE) Sean Stanek Iowa State University
    Iowa State University Capstones, Theses and Graduate Theses and Dissertations Dissertations 2012 Semi-automated parallel programming in heterogeneous intelligent reconfigurable environments (SAPPHIRE) Sean Stanek Iowa State University Follow this and additional works at: https://lib.dr.iastate.edu/etd Part of the Computer Sciences Commons Recommended Citation Stanek, Sean, "Semi-automated parallel programming in heterogeneous intelligent reconfigurable environments (SAPPHIRE)" (2012). Graduate Theses and Dissertations. 12560. https://lib.dr.iastate.edu/etd/12560 This Dissertation is brought to you for free and open access by the Iowa State University Capstones, Theses and Dissertations at Iowa State University Digital Repository. It has been accepted for inclusion in Graduate Theses and Dissertations by an authorized administrator of Iowa State University Digital Repository. For more information, please contact [email protected]. Semi-automated parallel programming in heterogeneous intelligent reconfigurable environments (SAPPHIRE) by Sean Stanek A dissertation submitted to the graduate faculty in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY Major: Computer Science Program of Study Committee: Carl Chang, Major Professor Johnny Wong Wallapak Tavanapong Les Miller Morris Chang Iowa State University Ames, Iowa 2012 Copyright © Sean Stanek, 2012. All rights reserved. ii TABLE OF CONTENTS LIST OF TABLES .....................................................................................................................
    [Show full text]
  • Run-Commands-Windows-10.Pdf
    Run Commands Windows 10 by Bettertechtips.com Command Action Command Action documents Open Documents Folder devicepairingwizard Device Pairing Wizard videos Open Videos Folder msdt Diagnostics Troubleshooting Wizard downloads Open Downloads Folder tabcal Digitizer Calibration Tool favorites Open Favorites Folder dxdiag DirectX Diagnostic Tool recent Open Recent Folder cleanmgr Disk Cleanup pictures Open Pictures Folder dfrgui Optimie Drive devicepairingwizard Add a new Device diskmgmt.msc Disk Management winver About Windows dialog dpiscaling Display Setting hdwwiz Add Hardware Wizard dccw Display Color Calibration netplwiz User Accounts verifier Driver Verifier Manager azman.msc Authorization Manager utilman Ease of Access Center sdclt Backup and Restore rekeywiz Encryption File System Wizard fsquirt fsquirt eventvwr.msc Event Viewer calc Calculator fxscover Fax Cover Page Editor certmgr.msc Certificates sigverif File Signature Verification systempropertiesperformance Performance Options joy.cpl Game Controllers printui Printer User Interface iexpress IExpress Wizard charmap Character Map iexplore Internet Explorer cttune ClearType text Tuner inetcpl.cpl Internet Properties colorcpl Color Management iscsicpl iSCSI Initiator Configuration Tool cmd Command Prompt lpksetup Language Pack Installer comexp.msc Component Services gpedit.msc Local Group Policy Editor compmgmt.msc Computer Management secpol.msc Local Security Policy: displayswitch Connect to a Projector lusrmgr.msc Local Users and Groups control Control Panel magnify Magnifier
    [Show full text]
  • Program Name Run Command About Windows Winver Add a Device
    List of Run Commands in Win7/8 to Windows Managment By Shree Krishna Maharjan in some commands need to use .msc Program Name Run Command About Windows winver Add a Device devicepairingwizard Add Hardware Wizard hdwwiz Advanced User Accounts netplwiz Authorization Manager azman Backup and Restore sdclt Bluetooth File Transfer fsquirt Calculator calc Certificates certmgr Change Computer Performance Settings systempropertiesperformance Change Data Execution Prevention Settings systempropertiesdataexecutionprevention Change Printer Settings printui Character Map charmap ClearType Tuner cttune Color Management colorcpl Command Prompt cmd Component Services comexp Component Services dcomcnfg Computer Management compmgmt.msc Computer Management compmgmtlauncher Connect to a Network Projector netproj Connect to a Projector displayswitch Control Panel control Create A Shared Folder Wizard shrpubw Create a System Repair Disc recdisc Credential Backup and Restore Wizard credwiz Data Execution Prevention systempropertiesdataexecutionprevention Default Location locationnotifications Device Manager devmgmt.msc Device Pairing Wizard devicepairingwizard Diagnostics Troubleshooting Wizard msdt Digitizer Calibration Tool tabcal DirectX Diagnostic Tool dxdiag Disk Cleanup cleanmgr Disk Defragmenter dfrgui Disk Management diskmgmt.msc Display dpiscaling Display Color Calibration dccw Display Switch displayswitch DPAPI Key Migration Wizard dpapimig Driver Verifier Manager verifier Ease of Access Center utilman EFS REKEY Wizard rekeywiz Encrypting File System
    [Show full text]
  • Docker Windows Task Scheduler
    Docker Windows Task Scheduler Genealogical Scarface glissading, his karyotype outgone inflicts overflowingly. Rudolph is accessorial and suckers languorously as sociologistic Engelbart bridled sonorously and systematises sigmoidally. Which Cecil merchandises so unbelievably that Cole comedowns her suavity? Simple task runner that runs pending tasks in Redis when Docker container. With Docker Content Trust, see will soon. Windows Tip Run applications in extra background using Task. Cronicle is a multi-server task scheduler and runner with a web based front-end UI It handles both scheduled repeating and on-demand jobs targeting any. Django project that you would only fetch of windows task directory and how we may seem. Docker schedulers and docker compose utility program by learning service on a scheduled time, operators and manage your already interact with. You get a byte array elements followed by the target system privileges, manage such data that? Machine learning service Creatio Academy. JSON list containing all my the jobs. As you note have noticed, development, thank deity for this magazine article. Docker-crontab A docker job scheduler aka crontab for. Careful with your terminology. Sometimes you and docker schedulers for task failed job gets silently redirected to get our task. Here you do want to docker swarm, task scheduler or scheduled background tasks in that. Url into this script in one easy to this was already existing cluster created, it retry a little effort. Works pretty stark deviation from your code is followed by searching for a process so how to be executed automatically set. Now docker for windows service container in most amateur players play to pass as.
    [Show full text]
  • FROM SHAMOON to STONEDRILL Wipers Attacking Saudi Organizations and Beyond
    FROM SHAMOON TO STONEDRILL Wipers attacking Saudi organizations and beyond Version 1.05 2017-03-07 Beginning in November 2016, Kaspersky Lab observed a new wave of wiper attacks directed at multiple targets in the Middle East. The malware used in the new attacks was a variant of the infamous Shamoon worm that targeted Saudi Aramco and Rasgas back in 2012. Dormant for four years, one of the most mysterious wipers in history has returned. So far, we have observed three waves of attacks of the Shamoon 2.0 malware, activated on 17 November 2016, 29 November 2016 and 23 January 2017. Also known as Disttrack, Shamoon is a highly destructive malware family that effectively wipes the victim machine. A group known as the Cutting Sword of Justice took credit for the Saudi Aramco attack by posting a Pastebin message on the day of the attack (back in 2012), and justified the attack as a measure against the Saudi monarchy. The Shamoon 2.0 attacks observed since November 2016 have targeted organizations in various critical and economic sectors in Saudi Arabia. Just like the previous variant, the Shamoon 2.0 wiper aims for the mass destruction of systems inside targeted organizations. The new attacks share many similarities with the 2012 wave, though featuring new tools and techniques. During the first stage, the attackers obtain administrator credentials for the victim’s network. Next, they build a custom wiper (Shamoon 2.0) which leverages these credentials to spread widely inside the organization. Finally, on a predefined date, the wiper activates, rendering the victim’s machines completely inoperable.
    [Show full text]
  • Enterprise Job Scheduling Checklist
    ••• ••• ••• 2 Forest Park Drive Farmington, CT 06032 Tel: 800 261 JAMS www.JAMSScheduler.com Enterprise Job Scheduling Checklist Following is a detailed list of evaluation criteria that you can use to benchmark the features and functions of various job schedulers your organization is considering. This checklist provides a way to thoroughly assess how well a given product meets your needs now and in the future. Product X General Cross Platform Scheduling Capabilities (Windows, UNIX, Linux, OpenVMS, System i, All Virtual Platforms, MacOS, zLinux, etc.) Support for native x64 and x86 Windows platforms Single GUI to connect to multiple Schedulers and Agents if necessary Kerberos Support Active Directory Support / ADAM Support Windows Management Instrumentation High Availability Architecture supporting Clustering and Standalone Automated Failover Scalable Architecture to support 500k+ jobs/day and more than 2,500 Server Connections Event-Driven Architecture Free, Unlimited Deployment of Admin Clients Scheduling Date/time based scheduling Event based scheduling Ad hoc scheduling Multiple jobs can be tied together in a Setup or Workflow Nested Jobs and Job Plans supported through Setups and Workflows Unlimited number of Job dependencies on one or multiple jobs in a Setup or Workflow Job dependencies between different schedulers File presence, absence & available dependencies and events Variable comparison dependencies Graphical Gantt view of the schedule with projected time runs Hooks for user defined dependencies Graphical view of job stream
    [Show full text]
  • Windows Intruder Detection Checklist
    Windows Intruder Detection Checklist http://www.cert.org/tech_tips/test.html CERT® Coordination Center and AusCERT Windows Intruder Detection Checklist This document is being published jointly by the CERT Coordination Center and AusCERT (Australian Computer Emergency Response Team). printable version A. Introduction B. General Advice Pertaining to Intrusion Detection C. Look for Signs that Your System may have been Compromised 1. A Word on Rootkits 2. Examine Log Files 3. Check for Odd User Accounts and Groups 4. Check All Groups for Unexpected User Membership 5. Look for Unauthorized User Rights 6. Check for Unauthorized Applications Starting Automatically 7. Check Your System Binaries for Alterations 8. Check Your Network Configurations for Unauthorized Entries 9. Check for Unauthorized Shares 10. Check for Any Jobs Scheduled to Run 11. Check for Unauthorized Processes 12. Look Throughout the System for Unusual or Hidden Files 13. Check for Altered Permissions on Files or Registry Keys 14. Check for Changes in User or Computer Policies 15. Ensure the System has not been Joined to a Different Domain 16. Audit for Intrusion Detection 17. Additional Information D. Consider Running Intrusion Detection Systems If Possible 1. Freeware/shareware Intrusion Detection Systems 2. Commercial Intrusion Detection Systems E. Review Other AusCERT and CERT Documents 1. Steps for Recovering from a Windows NT Compromise 2. Windows NT Configuration Guidelines 3. NIST Checklists F. Document Revision History A. Introduction This document outlines suggested steps for determining whether your Windows system has been compromised. System administrators can use this information to look for several types of break-ins. We also encourage you to review all sections of this document and modify your systems to address potential weaknesses.
    [Show full text]
  • Vbscripting For
    Paper AD09 Integrating Microsoft® VBScript and SAS® Christopher Johnson, BrickStreet Insurance ABSTRACT VBScript and SAS are each powerful tools in their own right. These two technologies can be combined so that SAS code can call a VBScript program or vice versa. This gives a programmer the ability to automate SAS tasks, traverse the file system, send emails programmatically, manipulate Microsoft® Word, Excel, and PowerPoint files, get web data, and more. This paper will present example code to demonstrate each of these capabilities. Contents Abstract .......................................................................................................................................................................... 1 Introduction .................................................................................................................................................................... 2 Getting Started ............................................................................................................................................................... 2 VBScript Running SAS ................................................................................................................................................... 2 Creating and Running Code ....................................................................................................................................... 2 Running Existing Code ..............................................................................................................................................
    [Show full text]
  • Directx 11 Extended to the Implementation of Compute Shader
    DirectX 1 DirectX About the Tutorial Microsoft DirectX is considered as a collection of application programming interfaces (APIs) for managing tasks related to multimedia, especially with respect to game programming and video which are designed on Microsoft platforms. Direct3D which is a renowned product of DirectX is also used by other software applications for visualization and graphics tasks such as CAD/CAM engineering. Audience This tutorial has been prepared for developers and programmers in multimedia industry who are interested to pursue their career in DirectX. Prerequisites Before proceeding with this tutorial, it is expected that reader should have knowledge of multimedia, graphics and game programming basics. This includes mathematical foundations as well. Copyright & Disclaimer Copyright 2019 by Tutorials Point (I) Pvt. Ltd. All the content and graphics published in this e-book are the property of Tutorials Point (I) Pvt. Ltd. The user of this e-book is prohibited to reuse, retain, copy, distribute or republish any contents or a part of contents of this e-book in any manner without written consent of the publisher. We strive to update the contents of our website and tutorials as timely and as precisely as possible, however, the contents may contain inaccuracies or errors. Tutorials Point (I) Pvt. Ltd. provides no guarantee regarding the accuracy, timeliness or completeness of our website or its contents including this tutorial. If you discover any errors on our website or in this tutorial, please notify us at [email protected]
    [Show full text]
  • The Tweakguides Tweaking Companion Download Page, Or to the Main Tweakguides Page Without Seeking Written Permission
    WWW.TWEAKGUIDES.COM [Version 3.00 ‐ January 2006] T HE T WEAKG UIDES T WEAKING C OMPANION TABLE OF CONTENTS Table Table of Contents ........................................................................................................................................................... 2 of Copyright & Credits..................................................................................................................................................... 10 Contents Introduction................................................................................................................................................................... 11 Using this Guide .......................................................................................................................................................... 12 Basic Requirements ........................................................................................................................................................................................... 12 Different Versions of Windows ......................................................................................................................................................................... 12 Why is the Guide So Long? .............................................................................................................................................................................. 12 Recommended Software ..................................................................................................................................................................................
    [Show full text]
  • Windows 7, Configuring
    Microsoft 70-680 Windows 7, Configuring Microsoft 70-680 Dumps Available Here at: https://www.certification-questions.com/microsoft-exam/70-680-dumps.html Enrolling now you will get access to 551 questions in a unique set of 70- 680 dumps Question 1 Your network consists of an Active Directory domain and a Direct Access infrastructure. You install Windows 7 on a new portable computer and join the computer to the domain. You need to ensure that the computer can establish Direct Access connections. What should you do? Options: A. Install a computer certificate. B. Create a new network connection. C. Enable the Network Discovery firewall exception. D. Add the computer account to the Network Configuration Operators group. Answer: A Explanation: Certificates The Direct Access IPsec session is established when the client running Windows 7 and the Direct Access server authenticate with each other using computer certificates. Direct Access supports only certificate- based authentication. Direct Access Client Configuration Clients receive their Direct Access configuration through Group Policy. This differs from traditional VPN configuration where connections are configured manually or distributed through the connection manager administration kit. Once you have added the computer’s client account to the designated security group, you need to install a computer certificate on the client for the purpose of Direct Access authentication. An organization needs to deploy Active Directory Certificate Services so that clients can automatically enroll with the appropriate certificates. Question 2 You have a portable computer named Computer1 that runs Windows 7. https://www.certification-questions.com Microsoft 70-680 You have a file server named Server1 that runs Windows Server 2008.
    [Show full text]
  • Winscp Automation and Scripting Using Windows Task Scheduler
    WinSCP Automation and Scripting using Windows Task Scheduler This guide demonstrates how to script an automated job that places files on or pulls files from an sFTP account on WinSCP using Windows Task Scheduler. 1. Modify the script (use the template and the example screenshot below) in Notepad, Notepad ++, or other editable client based on your facility, your server, and the sFTP account information that has been provided to you by InductiveHealth: # Automatically abort script on errors option batch abort # Disable overwrite confirmations that conflict with the previous option confirm off # Connect open sftp://userid??@hostname??:port#??/ -privatekey=c:\directory\where\key\stored\user??.ppk - passphrase=?? # Change remote directory cd cd /incoming # Force binary mode transfer option transfer binary # push to sftp from the source directory, switched to delete after it is pushed put -delete c:\directory\where\data\stored\*.hl7 # Disconnect close # Exit WinSCP Exit @hostname??:port#?? 1 2. With the script file edited and localized to your needs, the next step is to automate a command line method to run the script. There are multiple methods of how this can be accomplished. We will provide guidance on one of those methods: Using the “Start a Program” within Windows Task Scheduler. Step 1: Create a new task in Windows Task Scheduler Step 2: Schedule the triggers Step 3: Create a new action: Start a program Step 4: Settings: Program/script should aim at the WinSCP.com installed on the machine Step 5: Add argument should read: /script=NameOfScript.txt Optional, if generation of a log file is preferred, include the log switch: /script=NameOfScript.txt /log=NameOfLog.log Step 6: Start in is the default directory for the task to look for the script and log files.
    [Show full text]