Quiz 3

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following is used to protect your computer from malware that may attempt to steal your password?

Secure sign-in

After too many sign-in attempts, one of your colleagues has been blocked from using her Windows 10 user account. As a systems administrator, you need to help resolve this issue. How will you help her sign in using the computer management administrative tool?

By deselecting the Account is locked out option

Which of the following accounts will you create during the installation of Windows 10?

An initial account

W hich type of network consists of multiple Windows computers that share information, but no computer on the network serves as an authoritative source of user information?

peer-to-peer

Which profile is different from other profiles because it is not a complete profile?

A public profile

Which profile is stored in a network location rather than on the local hard drive?

A roaming profile

After credentials are cached locally, you can sign in to a computer using a domain user account. By default, how many user sign-ins are cached?

10

Martha works as a systems administrator in a multinational corporation. One of her colleagues is going on a sabbatical for six months. Martha must ensure that no one uses the colleague's user account until he returns. Which of the following actions can she take to ensure this?

Disable the account

Which of the following actions will you perform on the Windows sign-in screen if your organization uses a virtual smart card for authentication?

Enter a PIN on the sign-in screen.

The Guest account derives all of its privileges from being a member of the Guests group and which other group?

Everyone

Which of the following is a biometric authentication method supported by Windows Hello?

Facial recognition

Which Windows 10 feature ensures that a second user can sign in to a locked computer without signing out the first user and losing their work?

Fast user switching

Ricky enables dynamic lock authentication on his computer using his mobile device. He walks around his cubicle without locking his computer. When he returns to his seat, he notices that the computer did not automatically lock the screen. Why do you think this happened?

His mobile device was within the range of the computer.

Which of the following statements is not true of the Administrator account?

It can be renamed

Members of which of the following groups are able to monitor performance counters and access performance logs on the computer?

Performance Log Users

Which of the following cmdlets can be used to change the user account Lea to Leahona?

Rename-LocalUser

One of your friends, Steve, wants to rename a local user account using the Computer Management Administrative Tool. He opens the properties window; however, he does not find any option to rename the user account. What should he do instead?

Right-click on the user account to rename it.

Each time a user logs on locally, which database is used to verify sign-in credentials?

SAM

In Windows 10, the only supported method to configure the default profile is to use which utility?

Sysprep

Nazreen, a media analyst, works on a backup computer as her laptop is corrupted. She saves her documents on the desktop and signs out. When she signs in the next day, she is shocked to see that all her files are gone. Why do you think her files were lost?

The user account she used must have been assigned a mandatory profile.

In your organization, employees are made to press Ctrl + Alt + Delete before signing into a Windows 10 computer. Identify one reason why your organization may be enforcing this sign-in method.

To protect the computer against malware.

You have created accounts for five people on a Windows 10 computer. They are able to sign in, work on files, and save them; however, they are not able to install new software on the computer. Which of the following groups do these accounts belong to?

Users

Which of the following cmdlets will you use to create local users using Windows PowerShell?

New-LocalUser

Which of the following can be used in an advanced authentication method?

A fingerprint reader

Which of the following is a profile that cannot be modified?

A mandatory profile

Members of which of the following groups can back up and restore all files and folders on the computer?

Backup Operators

Which account has extremely limited access to resources and computer activities and is intended for occasional use by low-security users?

Guest

Arun has purchased a new Windows 10 computer. He wants to create user accounts for his family members. Unlike previous versions of Windows, he is not able to use the User Accounts applet in the Control Panel to create new users. What do you think is the issue?

In Windows 10, the User Accounts applet in the Control Panel does not have the option to create new user accounts.

Some options in the User Accounts applet has a shield displayed beside them. What does this indicate?

It indicates that those options are restricted to administrative users.

Which of the following tabs in the properties window of a user account can be used to add the user account to a group?

Member of

Abdul uses his Microsoft account to sign in to his desktop computer as well as his mobile device. He uses his mobile device to change his account's password. He signs out of his computer and tries signing in again. However, he is not able to. Why do you think he is not able to sign in?

The computer was not connected to the Internet.

You use your domain account to sign in to your devices when you are within the premises of your organization. However, you can use the same credentials to sign in even when you have no access to the domain. How is this possible?

The credentials are cached in Windows 10.

Which profile is used when new user profiles are created?

The default profile

The Windows 10 computers in your office are configured such that the files saved in the Documents folder can be viewed and edited by students singing in using different user accounts. The documents are visible in the Documents folder of each user. Which of the following user profiles does this configuration demonstrate?

The public profile

As a systems administrator, you are asked to set up an infrastructure that would allow employees to use any computer, and the files that a user stores on one computer should be available on any other computer that he or she signs into. Which of the following user profiles will you configure for the user accounts?

A roaming profile

What does Windows Hello store when biometric authentication is being configured?

A unique pattern

Which of the following are required for individuals to sign in to Windows 10 and use resources on the computer?

A user account

Which account is the most powerful local user account possible?

Administrator

An Administrator account derives its privileges from being a member of which local group?

Administrators

Identify a difference between a standard user account and an administrator account.

An administrator account can update device drivers, whereas a standard account cannot.

Joanna uses a USB device to sign in to her Office 365 account. She can plug in the device on any computer with an Internet connection. However, in addition to the USB device she must also use a PIN for authentication. Identify the authentication method used by Joanna.

She is using a security key.

In order to stop the automatic sign-in from occurring, which key should be held down during the boot process?

Shift

Identify the cmdlet that can be used to temporarily prevent users from signing in using the account name Ignis without deleting it.

Disable-LocalUser Ignis

Joshua, a systems administrator, is configuring new Windows 10 laptops. He is creating new local users on each laptop. He realizes that two users have the same name, Miguel. He uses the name Miguel for one user. Which of the following is a valid user name that he can create for the second user?

Miguel2

Members of which group are able to monitor performance counters on the computer, but cannot access performance logs?

Performance Monitor Users


Conjuntos de estudio relacionados

Requirements for a Valid Contract

View Set

Pharm III Exam: Drugs used in the Treatment of Angina Pectoris

View Set

CHAPTER 8 - Data Warehouse and Data Mart Modeling

View Set

Chapter 16: Giving Birth: McKinney

View Set

Chapter 6 The Neonatal Period: Changes During the First Month of Life

View Set

Saunders Mental Health and Pharmacology Psychiatric

View Set