FINAL EXAM Supporting Client Operating Systems

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following best describes a file format that can be used by the operating system to emulate the function of a hard drive, with all the data and structural elements of a drive?

A virtual hard disk

If you want to configure authentication to Windows 10 or create and manage local user accounts, which Settings category should you open?

Accounts

Where should you go on the Windows 10 desktop if you want to see important notifications from the operating system?

The Action Center

Which of the following commands will you use if you are asked to check the connectivity between two Windows 10 computers connected to a local network?

ping

Which of the following commands will you use to check the basic connectivity between your computer and a computer with the IP address 192.168.1.100? You need to send a minimum of six requests.

ping 192.168.1.100 -n

A manufacturing company has bought a new batch of computers that run on a Windows 10 operating system. As the systems administrator, Michael needs to check if the computers support Modern Sleep. What cmdlet should Michael use for this purpose?

powercfg.exe

Which of the following can you use to run a Win16 application?

The 32-bit version of Windows 10

What type of bottleneck occurs when Windows 10 and running applications want to read and write information to the physical disk in the system faster than the disk can manage?

A disc bottleneck

What is the most specific device identification string?

A hardwire ID

Which of the following best defines an answer file?

An XML file that contains settings used during the Windows installation process

Identify a difference between a standard user account and an administrator account.

An administrator account can update device drivers, whereas a standard account cannot.

Which of the following accounts will you create during the installation of Windows 10?

An initial account

You are using an MMC snap-in to troubleshoot an issue on a user's computer. The MMC snap-in is using the WinRM service to communicate between the user's computer and your computer. Which of the following is true of the security used by WinRM if the port used is 5985?

Authentication to WinRM is protected by Kerberos.

What is the preferred method to configure clients to use Work Folders?

Automatic discovery

Your organization has purchased a new printer. As the systems administrator, you need to ensure that the appropriate driver is automatically loaded whenever a Windows 10 computer in the organization is attached to the printer. However, the registry keys in the computers should not be modified. How will you do this?

By staging the driver in the driver store

Karen has installed a new router for her home network. She connects her Windows 10 computer and smartphone to the Wi-Fi to access the Internet. The next day, when she tries connecting to the Internet, she gets the error message "Check your Internet connection and try again." Which of the following should Karen do first to troubleshoot the issue?

Check if the wireless radio on her computer is turned on

Which of the following installations of Windows 10 is performed on a computer that does not have existing data or applications?

Clean

Chao is using a VPN client to access work files via a remote access server. However, her VPN connection to access work files has also made Internet access slow. Which of the following is the best solution to optimizing the Internet connection?

Disable VPN from being used as a default gateway.

Identify the cmdlet that can be used to temporarily prevent users from signing in using the account name Ignis without deleting it.

Disable-LocalUser Ignis

A firm purchases five hundred computers for its new office. A system administrator installs Windows 10 on all the computers. The administrator wants all the computers in the new office to have a consistent configuration. Which of the following features included in Windows 10 would be appropriate to complete this task?

Group Policy

For domain-joined computers, what is the simplest way to configure VPN connections automatically?

Group Policy Preferences

ShopKart is an e-commerce company with a small office for its developers. The company stores file backups in a cloud server and provides the employees in the IT department access to file shares via drive mapping. Which of the following has the company used to configure the computers used by developers?

Group Policy Preferences

Which of the following statements is not true of the Administrator account?

It can be renamed

Ariela prepares a workstation for imaging and shuts it down. She boots the computer using Windows PE to continue the imaging process. To capture the image using DISM, she needs to use the following command: DISM /Capture-Image /ImageFile:imagefile.wim /CaptureDir:path /Name:imagename. In this command, what does /CaptureDir:path signify?

It defines source files that are to be captured as part of the image.

Which of the following is not a downside of using Client Hyper-V?

It does not allow you to create virtual machines with a completely independent operating system that shares the hardware on the computer running Windows 10.

Account Policies settings are located in which of the following?

Local Security Policy

Data sent to which of the following returns to the computer that sent it and does not appear on the actual network?

Loopback address

Which of the following can be used to handle domain-joined desktop computers?

Microsoft Endpoint Configuration Manager

Wes is using USMT to migrate user profiles to newly purchased Windows 10 computers in the organization. To begin the migration, he executes the ScanState.exe process on the source computers to collect user profile information. Where is this information most likely to be stored?

On a network file share

Each domain can be subdivided into which of the following that allows you to organize the objects in a domain?

Organizational units (OUs)

DSL connections usually use which protocol in order to secure connections?

PPPoE

Which of the following registry editing tools has the built-in functionality to export a portion of a registry to a .reg file using commands?

Reg.exe

Which of the following allows a user to send an invitation to a remote user that invites them to remotely connect to the local computer?

Remote Assistance

Which of the following keys in the HKEY_LOCAL_MACHINE contains information regarding device drivers?

SYSTEM

Joanna uses a USB device to sign in to her Office 365 account. She can plug in the device on any computer with an Internet connection. However, in addition to the USB device she must also use a PIN for authentication. Identify the authentication method used by Joanna.

She is using a security key.

Martha sets up a local peer-to-peer network at her home office. She has five Windows 10 computers connected to the network. The computers were not able to access the Internet. Upon troubleshooting, she noticed that the packets sent from the computers were blocked by an IPv6-aware router; however, she was able to send ping requests from one computer to another. Identify the issue with the network configuration.

The computers were assigned link-local unicast addresses.

Samantha is conducting a presentation on hardware and software troubleshooting. While she is conducting the presentation using a projector screen, one of her colleagues is working on another task on her laptop. During the presentation, the slides keep moving back and forth from the screen. Can you identify the configuration issue that is likely causing this problem?

The displays are probably configured using the Extended option.

Chao is creating a provisioning package. When given the option to encrypt the package, he considers proceeding with encryption. However, his colleague advises against encryption mentioning that it would make the package more difficult to deploy. Which of the following justifies the colleague's advice?

The encryption key will be needed to deploy the package.

Macy works as a system administrator at an accounting firm. Sensitive data is stored on all Windows 10 client systems. She wants to audit all access to files on these systems, so she decides to edit the Global Object Access Auditing category. In order to complete this task, which of the following conditions should be met?

The files and folders must be on NTFS-formatted volumes.

Ming is automating VPN deployment in her organization. She decides to use Windows Configuration Designer to enable the VPN deployment. She deploys the VPN connectivity profiles to the client computers as provisioning packages. Which of the following is true of this scenario?

The provisioning packages need to be deployed via Microsoft Intune.

The Windows 10 computers in your office are configured such that the files saved in the Documents folder can be viewed and edited by students singing in using different user accounts. The documents are visible in the Documents folder of each user.Which of the following user profiles does this configuration demonstrate?

The public profile

You have configured your Windows 10 computer such that the computer enters the sleep mode after 10 minutes of idle time. However, you notice that this does not happen. What should you first do to troubleshoot this issue?

Verify the power management settings

Which of the following is a device identification string that can be used to control the installation of a device?

WRONG: A device driver

Which of the following is a cloud-based solution to compatibility issues?

WRONG: Client Hyper-V

Haley is tasked with purchasing and setting up Windows 10 computers in Kraper Technologies. These computers will be used by 75 new hires. The company already has 20 available computers with Windows 10 installed, so Haley needs to purchase and set up the remaining computers. Which of the following installation methods is least suitable to Haley's requirements?

WRONG: Distribution share installation

How often do domain controllers download Group Policy settings?

WRONG: Every 90 minutes

Which of the following statements about domains is true?

WRONG: The computer and the domain do not need to be identified by unique names.

Brian is performing an upgrade of computers in the organization from Windows 8.1 Pro to Windows 10. Along with the OS upgrade, he wants to migrate user profile data. Which of the following ADK tools can Brian use for this purpose?

WRONG: Compatibility Administrator

Which of the following downloads updates from Microsoft Update and stores them in a local datastore, rather than each client computer downloading updates individually?

WSUS

Which of the following is not one of the five mainstream versions of Windows 10?

Windows 10 Business


Conjuntos de estudio relacionados

Words that mean the opposite when using the prefix in/im or ex.

View Set

Types of Medication Distribution Systems

View Set

Tema 3: Udvikling og udfordringer i voksenlivet

View Set