Week 2 Quiz Supporting Client Operating Systems
When a new hard disk is added to a computer, it is initially configured as which type of disk?
A basic disk
Which of the following illustrates the use of a domain network?
A group policy setting is used to update the settings of all computers in the network.
Which location type is used when a computer is connected as part of a peer-to-peer network in a trusted location?
A private network
Which of the following is not true of the NTFS file system?
Bad clusters that fail to store data are not tracked.
Diego has the Windows 10 Home edition installed on his personal laptop. As an avid gamer, he prefers having his computer update with the latest feature updates from Microsoft. He usually plays games at specific times, and he wants to prevent his computer from restarting to install an update during these time slots. Which of the following Windows Update settings should Diego modify?
Change active hours
Oshane is configuring security settings on his computer. Recently, his friend's computer was attacked by malware that encrypted data on all the hard disks and demanded a cryptocurrency ransom to decrypt this data. Which of the following options in Windows 10 is the best option to help Oshane avoid a similar situation?
Controlled folder access
Kesha spends time analyzing datasets that are larger than 1 TB in job as a data scientist. This data is stored in databases on her Windows 10 system. While running an analysis on these databases, she does not want her code to be slowed down because of real-time scanning by Windows Defender. Which of the following settings should Kesha modify to solve this problem?
Exclusions
The Local Security Policy is part of a larger Windows management system known as which of the following?
Group Policy
What type of encryption algorithm is one-way encryption, which means that it encrypts data, but the data cannot be decrypted?
Hashing
SpeedNet is an Internet service provider. It provides Wi-Fi services to its subscribers at several cafes, restaurants, and other public places. When a subscriber moves from one place to another, the subscriber's Windows 10 laptop can automatically detect the network and connect to it. Which of the following is the company using to offer wireless connectivity?
Hotspot 2.0 technology
After returning from a vacation, Yunha transferred some photos from her smartphone to a folder on her laptop. She uses the Share tab in File Explorer to share this folder with her friend Kseniia. Which of the following is true of this scenario?
Kseniia will receive a copy of the folder's contents rather than the original folder itself.
Account Policies settings are located in which of the following?
Local Security Policy
Marsha and Moira belong to the Sales group that has full control permissions to the K:\Sales folder. Within this folder, Marsha is assigned read permission to a file named SalesPipeline. Moira is assigned read and execute permissions to the same file. Marsha also belongs to the Marketing group that has read permissions denied to the K:\Sales folder, while Moira also belongs to the Legal group that has write permissions denied to the K:\Sales folder. Which of the following is true of the effective permissions in this scenario?
Marsha cannot open the Sales folder.
Sharon recently lost an encryption certificate that rendered some of her EFS-encrypted files unrecoverable. To prevent a similar situation from arising in the future, she wants to create a recovery certificate for recently encrypted files. She creates the recovery certificate. What should Sharon do next?
NOT THE RIGHT ANSWER: Run cipher with the /r:filename option, where filename is the name of the recovery certificate
Ablorde is a tax advisor at TEXMII Consultants, a small business that hands tax filing for freelancers. Ablorde wants to share a folder on her computer with Rajesh. He has a Windows 10 computer that is connected to the same workgroup as Ablorde's computer. Which of the following is a requirement for successful sharing of files in this scenario?
Rajesh must have a user account on Ablorde's computer.
Which file system is designed to verify and autocorrect data faults on a volume without having to bring the volume down for maintenance?
ReFS
Which of the following is an updated version of TCP/IPv4 with a larger address space and additional features?
TCP/IPv6
_________ is used with newer computers that use UEFI firmware to start the computer.
The GUID Partition Table
As a network administrator, Lea helps a small start-up set up a temporary network at a rented space. She configures a host computer with the IP address provided by the ISP to act as a router. Other computers in the network share the Internet connection through the host computer. After few hours, the owners of the start-up complain that they are not able to connect to the Internet. Which of the following, if true, is preventing Internet access?
The host computer was manually configured using ICS.
Sasha is freelance graphic designer. She often works out of a café close to her house. The café provides free network connection for regular customers. When she tries to connect to the network using her Windows 10 laptop, she is prompted to confirm if she wants to make her laptop visible on the network. Assuming this is not the first time Sasha is connecting to the network, why do you think Windows 10 prompts her with this query?
The network location awareness service in Sasha's laptop has been disabled.
An application installed on a Windows 10 system requires access to restricted areas on the system to place user data. However, this application is not UAC compliant. To enable this application to run properly, which of the following UAC options should be enabled?
Virtualize file and registry write failures to per-user locations
Which NTFS feature allows you to link an empty folder in one volume to another volume?
Volume mount points
Nanxi wants to create a share on her computer. She decides to use the Create A Shared Folder Wizard to accomplish this task. Which of the following tools will launch this wizard?
shrpubw
Storage Spaces technology combines selected individual disks into a managed logical group called a _____.
storage pool
Which of the following is considered one of the biggest sources of malware (malicious software)?
the Internet