ITNW 1308 User Management

¡Supera tus tareas y exámenes ahora con Quizwiz!

After credentials are cached locally, you can sign in to a computer using a domain user account. By default, how many user sign-ins are cached?

10

Which profile is stored in a network location rather than on the local hard drive?

A Roaming Profile

After too many sign-in attempts, one of your colleagues has been blocked from using her Windows 10 user account. As a systems administrator, you need to help resolve this issue. How will you help her sign in using the computer management administrative tool?

By deselecting the Account is locked out option

Martha works as a systems administrator in a multinational corporation. One of her colleagues is going on a sabbatical for six months. Martha must ensure that no one uses the colleague's user account until he returns.Which of the following actions can she take to ensure this?

Disable the account

Because the initial user account created during installation is a member of the Administrators group, it has all the characteristics of the Administrator account. True or False?

False

In a peer-to-peer network, each computer authenticates users by using the domain controller.

False

Which account has extremely limited access to resources and computer activities and is intended for occasional use by low-security users?

Guest

Which user management tool is required to assign a logon script to a user?

Local Users and Groups MMC snap-in

Users

Members can operate the computer and save files but cannot install programs.

Backup Operators

Members of this group can backup and restore all files and folders on the computer, however, the ability to read and modify files is still controlled by file system security.

Device Owners

Members of this group can change system-wide settings.

Administrators

Members of this group have full access to the computer.

Guest

Members of this group have the same access to the system as members of the Users group.

Which file in a profile contains user-specific registry settings?

Ntuser.dat

Which type of network consists of multiple Windows computers that share information, but no computer on the network serves as an authoritative source of user information?

Peer-to-Peer

Despite getting access to the picture and gestures used for authentication, a remote hacker may not be able to get access to the resources used by your computer.Which of the following will the hacker require to use the picture and gesture combination?

Physical access to the computer

Each time a user logs on locally, which database is used to verify sign-in credentials?

SAM

From which of the following groups does a standard user account inherit its privileges from?

The Local Users Group

Which of the following is not an advantage for using a Microsoft Account?

The Microsoft account can be integrated with other Microsoft apps, such as OneDrive, Skype, Xbox Live and Zoom.

Which of the following is used to verify a local user account in Windows 10?

The SAM database

Abdul uses his Microsoft account to sign in to his desktop computer as well as his mobile device. He uses his mobile device to change his account's password. He signs out of his computer and tries signing in again. However, he is not able to. Why do you think he is not able to sign in?

The computer was not connected to the Internet.

Lee uses a Windows 10 computer to write a newsletter. After a few hours, he locks his computer, without saving his work, and goes on a break. Meanwhile, Martha signs into the computer using her account, checks her emails, and signs out. When Lee returns, he continues working on his newsletter. Which Windows 10 sign-in method enables Lee to continue his work?

The fast user switching method

In your organization, employees are made to press Ctrl + Alt + Delete before signing into a Windows 10 computer.

To protect the computer against malware

A roaming profile is located on a network server. True or False?

True

Cryptographic Operators group perform operations such as modifying settings for IPSec in Windows Firewall when configured in Common Criteria mode.

True

Why is it not possible to set up a peer-to-peer network in large organizations?

Windows 10 supports only up to 20 concurrent connections; large organizations typically have hundreds of connections

Samantha uses facial recognition to sign in to her Windows 10 laptop. She uses the same Microsoft account on different devices. She changes the password for her Microsoft account on her laptop. She can sign in to another device without having to enter the password manually. Identify the advanced authentication method used in this scenario.

Windows Hello for Business

Which authentication method requires the computer to be joined to either a domain or Azure AD?

Windows Hello for Business

Which characters are not allowed in user account names? (Choose all that apply.)

\ *


Conjuntos de estudio relacionados

BIOL 2401 Chapter 2 Module 4: 2.08-2.12

View Set

Why did south carolina secede from the Union

View Set

Chapter 50: The Endocrine System

View Set

Week 1: Maternity by Lowdermilk & Perry: Chapters 1, 2

View Set

W.3 Ixls identify run on sentences full answers

View Set

Milady capítulo 21 color parte A

View Set

MT-chapter 5 test review(body structure)

View Set