Questions
A security-conscious user limits what usage data Windows permits to collect. They also limit what device
functions it enables and for which apps. Where does the user accomplish this? ANS: Privacy settings
A user is curious about the low-level data the system stored concerning their profile and wants to
explore the file which contains it. In Windows, where does the user look? ANS: NTUSER.DAT
A user is experimenting with the fast startup option to see if it really makes booting faster. What should
they expect? ANS: The computer will boot faster after being shutdown.
A new user requests that a few settings be configured to increase the comfortability while using a
company computer. In particular, the user requests that the narration feature be enabled. Where does a
support technician find this feature in the Ease of Access settings in Windows 10? ANS: Vision
The receptionist at a record label company connects a phone to a computer so the songs already
downloaded on the phone will play. Where does the receptionist set this up? ANS: Device settings
An enthusiastic computer user wants to test out the new Windows 11 desktop. Which of the following
has become more easily accessible using Windows 11? ANS: Multiple desktops
A user wants to optimize their Windows 10-based computer. The user pokes around in the system
settings applet on their computer. What can the user NOT configure in the system settings applet? ANS:
File explorer
A user wants to experiment with virtualization by enabling Microsoft's virtualization solution. Where can
the user go to enable this? ANS: Features
A technician assists a visually impaired person by making the text on their computer screen larger.
Where can the technician configure this? ANS: Ease of access
,An administrator is configuring a user's computer and is currently utilizing the User Accounts applet in
the Control Panel. What is the administrator doing? ANS: Changing UAC settings
A user experiences issues with large files and wants to run diagnostics to help figure out what might be
the issue. Which of the following commands should the user try? ANS: chkdsk
A server administrator performs a statistical analysis on server operations to provide optimized
resources. For example, the administrator wants to see resource performance graphs and key statistics,
such as threads started by a process or hard page faults/second. What is the best tool to use? ANS:
resmon.exe
A user wants to use the xcopy command at a command (CMD) prompt but is unfamiliar with the syntax
and switches. What can they use to learn more? (Select all that apply.) ANS: help xcopy
xcopy /?
A security administrator revisits the security of client machines and wants to push out configuration
changes to users. What is the best way to do this? ANS: gpedit.msc
A server administrator is writing a script that will help administer their servers. The administrator saves
the script to the Desktop folder. Instead of typing out the full path to the script in the command prompt,
the administrator wants to change the directory to the desktop to make it easier to run the script.
Which of the following commands should the server administrator use? ANS: cd C:\Users\user\Desktop
A vulnerability manager has significantly improved patching in the environment and now wants to focus
on system security. Which of the following options will directly support the manager's intent of making
the system more secure? ANS: services.msc
A security analyst is investigating a possible incident and wants to view the logs on a remote computer.
What should the security analyst use to accomplish this? ANS: eventvwr.msc
, A Windows server administrator wants to use a scheduled local script to transfer logs from that server
to a central security incident and event monitoring platform. Copying the logs over and ingesting them
locally saves on the licensing. Which command should the script use? ANS: robocopy Source
[Destination] [Switches]
A security analyst is investigating a possible incident where an alert showed a possible indicator of
malware. The malware has a tactic of replacing system files with its own version, which also runs the
malware code. Which of the following commands has the best chance of helping the security analyst?
ANS: sfc
A helpdesk operator wants to use a set of tools that will help them during troubleshooting. What can
help the operator customize their toolset? ANS: mmc
A software technician is working on a help ticket for a Windows-based computer that appears to have
performance issues. What provides a console that offers live monitoring of resource utilization data for
the CPU, system memory, disk/file system, and network? ANS: resmon.exe
A user wants to learn and grow with different versions of Windows operating systems, so the user
installs dual versions of Windows OS on their computer. The computer currently boots to Windows 10,
but the user wants to change the default operating system to another version. What should the user
utilize to do this? ANS: msconfig.exe
An incident handler is reviewing a possible cryptomining infection on one of the corporate servers. What
should the handler use first to investigate? ANS: taskmgr.exe
A user starts experiencing a blue screen of death (BSoD) on start up. Where should the user check for
changes after getting back on the computer? ANS: devmgmt.msc
A computer technician wants to optimize the input/output operations performance of HDDs. What
should the technician utilize? ANS: dfrgui.exe