windows final?

¡Supera tus tareas y exámenes ahora con Quizwiz!

Ruby is configuring UAC settings on her new Windows 10 laptop. She thinks that the default notification prompts setting is not secure enough and wants to choose the most secure notification setting. Which of the following options should Ruby choose?

Always notify me

Amanda subscribes to an ISP after moving into a new house. A technician configures the modem and Wi-Fi settings and connects her Windows 10 computer to the Wi-Fi network using the default administrator ID and password. Every time Amanda boots her computer, it automatically connects to the network. After a week, Windows 10 prompts her to provide the password for the network. Why do you think the password was required if the computer was already configured to the network?

Another network device with the same SSID was within range.

An e-commerce company purchases new Windows 10 laptops for its employees. The laptops get configured automatically, over the Internet, and are added to the company's network as soon as employees sign in using their user accounts, without the help of the system administrator. Which of the following networking models is the company most likely using?

Azure AD join

Daniel double-clicks on a VHD file in File Explorer. After making changes to files on the VHD, he restarts his computer. In which of the following scenarios will the VHD automatically mount after the restart?

Daniel has configured his computer to boot from the VHD.

Daniel is performing an upgrade installation on all the computers in the organization. The computers are currently running Windows 8.1 Pro and need to be upgraded to Windows 10. The organization uses several applications that were custom-built by a vendor for the earlier Windows edition. Which of the following precautions must Daniel take in this scenario?

Daniel should verify the compatibility of the applications before upgrading to Windows 10.

Danielle has Windows 10 Professional installed on her personal computer. She is a freelance software developer who builds custom applications for clients. Which of the following instances would justify Danielle's use of Windows Insider Preview Branch on her computer?

Danielle prefers testing applications with the latest features in Windows.

Derwin is using Storage Spaces to customize a newly created storage pool on his computer. Which of the following is true of this scenario?

Derwin can create a storage pool with a larger volume than the size of individual disks combined.

Your computer is running out of storage, and you decide to remove files that are no longer necessary. Which of the following administrative tools will help you identify such files?

Disk Cleanup

Under which of the following folders in a user profile are documents obtained from the Internet usually stored?

Downloads

Ayesha adds a new hard disk to her computer and configures it using the GPT partition type. She creates two partitions on the disk, one to store personal data and another to store work-related data. Which of the following disk types is Ayesha using in this scenario?

Dynamic disks

Joe is examining the user rights policies for a Windows 10 computer. He notices a default right that gives Administrators, Backup Operators, Guest, and Users the user right Allow log on locally. What will happen if Joe removes Guest from this list?

Guest users will not be able to sign in to the computer at the console.

Rajesh purchases a new video card for his Windows 10 computer. He downloads the latest drivers from the website of the manufacturer. Upon installation, he notices that the video card does not function properly. What do you think caused the problem?

He downloaded the 32-bit driver, while the operating system was 64-bit.

Kanye purchases a computer that runs on a Windows 10 operating system. After few months of use, he notices considerable lag in the computer. He tries defragmenting the drives, but there is no significant improvement. What should Kanye have done first to find a solution?

He should have used Performance Monitor to identify the issue and then should have troubleshot it.

Identify a difference between IPv6 and IPv4.

IPv6 has a larger address space compared to IPv4.

Shirley builds a desktop computer with various components sourced from vendors. She has a 64-bit 2.4 GHz processor, 2 GB RAM, 256 GB SSD, and a DirectX 9 graphical processor. Shirley installs the 64-bit Windows 10 Home edition on this computer and notices that the performance of the computer is sluggish. If Shirley wants a satisfactory user experience, which of the following changes should she make?

Increase the RAM to 8 GB

Which of the following is true regarding the Windows Defender Firewall in Windows 10?

It can be customized to different network types.

In the context of the methods for purchasing Windows 10 licenses, which of the following is true of volume licensing?

It is purchased by organizations to obtain software directly from Microsoft.

Which of the following is true of using the DVD boot installation method to install Windows 10?

It is suitable for small organizations that only occasionally install Windows 10.

In the context of the notification area in Windows 10, which of the following is true of the Action Center?

It lists important notifications from the operating system to a user in one place.

Kindred laboratories, a diagnostics center, purchases 30 computers. The computers need to be activated using the Multiple Activation Key (MAK) activation method. However, the IT team is unable to connect the computers to the Internet to proceed with activation. Which of the following should the IT team do to proceed with the activation if it wants to save time?

It should use Volume Activation Management Tool (VAMT) for proxy activation.

You prepare a source system for imaging by installing the necessary applications and configuring the operating system settings. Next, you run the Sysprep utility. What will this utility do?

It will remove system-specific data from the source workstation.

You want to use USMT for a large-scale migration of user profiles in your organization. You are currently configuring the .xml files to control the USMT migration process. In which of the following files should you include information about the desktop settings that need to be migrated?

MigUser.xml

Naomi purchased a laptop without the operating system installed. She now wants to install Windows 10 on the laptop. She selects the GPT partition style when configuring the 2.5 TB hard disk. Which of the following justifies Naomi's decision to use the GPT partition style instead of the MBR partition style?

Naomi wants to create six partitions.

Which of the following allows Windows 10 computers to recognize previously connected networks?

Network location awareness

Anya purchases a laptop for personal use from an online store. The configuration of the computer is 8 GB RAM, 500 GB SSD, and Windows 10 Home. In this scenario, which of the following Windows 10 installation methods is used?

Original Equipment Manufacturer installation

Despite getting access to the picture and gestures used for authentication, a remote hacker may not be able to get access to the resources used by your computer. Which of the following will the hacker require to use the picture and gesture combination?

Physical access to the computer

Rizwan, Tina, and George are using the same Windows 10 computer in shifts. They need to be able to share files with each other and work on common files, although not simultaneously. What is the easiest method of enabling this?

Placing the common files in the Public folder and asking them to use that folder

Henry works as a network administrator in an e-commerce company. For security reasons, he is asked to make sure that the company's wireless network remains hidden to prevent unauthorized devices from attempting to connect to the network. What should Henry do?

Prevent the WAP from broadcasting the SSID

The network administrator in an organization has configured a rule that restricts inbound traffic from external networks to proprietary programs. He is asked to allow inbound traffic to one of the restricted programs. What changes should he make to the firewall configuration?

Remove the specific program from the list of programs affected by the rule

A hacker finds a flaw in Windows that compromises a popular browser. Instead of reporting the flaw directly to Microsoft, the hacker posts a detailed blog about the flaw. A malware developer creates malware that can exploit this flaw. Rihanna receives a notice from Microsoft that asks all Windows users to stop using this browser until a security fix is issued. After a few days, Microsoft issues a security fix. In which of the following instances is Rihanna's computer least likely to be infected by malware?

Rihanna installs the update immediately after it is issued by Microsoft.

Claire, a system administrator, is configuring Task Scheduler to run interactive tasks. Which of the following options should she select in Task Scheduler to enable users to interact with the task?

Run only when user is logged on

Identify the scenario that illustrates the use of a WWAN for Internet connectivity.

Sam uses his smartphone as a hotspot to connect his computer to the Internet.

Cameron is a Windows 10 Home user. He uses his computer to browse the Internet, watch movies, and play games. He prefers having a stable version of Windows on his computer that gets regular feature updates. Which of the following servicing branches fits Cameron's requirements?

Semi-Annual Channel

Athena is performing an unattended installation of Windows 10. She specifies the name of the answer file by using the /unattend switch. When Sysprep is run, she would like the system to avoid using the unattend.XML file cached to the %WINDIR%\Panther folder. How can Athena ensure this outcome?

She can specify an alternative answer file when running Sysprep.

Marissa downloaded two video files from a forwarded email. She tried opening one of the video files, but her system froze and crashed immediately. After the system restarted, she noticed that all the files in a folder were replaced with 0-byte sized files. Suspecting that her computer was infected by malware, she ran a full scan using Windows Defender Antivirus.

She should run a scan using Windows Defender Offline.

Nafisa is configuring the hard disks on her computer. One of the hard disks contains two partitions. She wants to create a third partition on this disk.When using the DiskPart utility, what should Nafisa do before partitioning the disk?

She should specify the disk that the partition will be created on.

Giselle signs into her Windows 10 laptop to install a new word processor. She downloads the installer package; however, she is prompted to provide an administrator password to proceed with the installation. Which of the following is likely to be true?

She signed in using a standard user account.

Ria and Olivia own and run a startup, a marketing agency. Olivia is working on the creatives for an upcoming ad campaign for a client. On the day of the campaign launch, Olivia has a family emergency that requires her to travel to a remote location. She sends Ria a text message, but she forgets to send the final creatives or leave her laptop password so that Ria can access the files. Ria tries reaching Olivia but cannot contact her. If Olivia's laptop is unencrypted and accessible, what is Ria's best option to extract the files that she needs for the ad campaign?

Start Olivia's laptop by booting it from a USB drive and run Linux with an NTFS driver

Trisha wants to use Sysprep for deploying Windows 10 by imaging. The source workstation is domain joined and was recently upgraded from Windows 8.1 Pro to Windows 10 Pro. This computer also contains many encrypted files. Which of the following is true in this scenario?

Sysprep will not run on the source workstation.

Keshawn, a system administrator, is configuring Advanced Audit Policy settings for Windows 10 clients in his organization. Some computers have shared resources accessed by other users, so Keshawn want to monitor when these computers are restarted or turned off. Which of the following event categories will help Keshawn track this?

System

Which of the following can be used to trigger disk fragmentation every second day when a computer is in sleep mode?

Task Scheduler

Which of the following is used to verify a local user account in Windows 10?

The SAM database

Anita, a network administrator, is troubleshooting a connectivity issue on a colleague's computer. The computer was receiving lookup responses that the services it was trying to connect to were not available. The computer was trying to send requests to the corporate DNS server. However, other employees in the organization were able to access the services. Which of the following issues could have likely caused the connectivity issue?

The computer had multiple DNS server configurations, including that of the ISP.

Sweta, a support engineer, installs Windows 10 Home edition on a computer using the DVD boot installation method. After completion of the installation, Sweta opens Windows PowerShell on the computer and runs the hostname command. What is the most likely result of this command?

The computer's name that was automatically generated during the installation will be displayed.

Darwish is exploring a document repository in a shared folder. He notices that one of the file icons in File Explorer is displayed with two arrows pointing at each other. What does this signify?

The file is compressed.

Ralph encrypts a 50 MB file with a 128-bit key and sends this file to Martha. Martha uses the same key to decrypt the file. Which of the following is true in this scenario?

The file is encrypted with a symmetric encryption algorithm.

Ashwin, a college student, purchased a laptop with Windows 10 preinstalled. The laptop has a single hard drive. Which of the following is true of this scenario?

The hard drive is most likely connected via SATA.

From which of the following groups does a standard user account inherit its privileges from?

The local Users group

Which of the following is required for pass-through authentication?

The user account on a remote computer must have the same name and password as the local computer.

Which of the following statements is true of operating systems?

They use drivers to communicate with computer hardware.

Ahva is upgrading her organization's computers to Windows 10. The existing computers contain data and settings that need to be carried over to the upgraded systems. Which of the following is true of this scenario?

To upgrade to Windows 10, the computers must be running Windows 7 with Service Pack 1 or Windows 8.1.

Pulptronics, a paper manufacturer, wants to purchase an industrial process controller to control the machinery that manufactures pulp. It wants to purchase a Windows 10 operating system for the industrial process controller. One of the requirements is that it wants long-term certification for the operating system to avoid the burden of recertifying on a regular basis. Which of the following editions of Windows 10 should Pulptronics purchase?

Windows 10 Enterprise LTSC

As a system administrator, you have been entrusted with building the infrastructure required for your company's new data analytics department. The data analysts are expected to receive and analyze up to 4-5 TB of data and will require computing power of more than 2 physical processors. You have been specifically tasked with building computers that are capable of processing large amounts of data with high-end hardware. In the given scenario, which of the following editions of Windows 10 would you consider to be the most appropriate to meet your processing needs?

Windows 10 Pro for Workstations

Why is it not possible to set up a peer-to-peer network in large organizations?

Windows 10 supports only up to 20 concurrent connections; large organizations typically have hundreds of connections.

Samantha uses facial recognition to sign in to her Windows 10 laptop. She uses the same Microsoft account on different devices. She changes the password for her Microsoft account on her laptop. She can sign in to another device without having to enter the password manually. Identify the advanced authentication method used in this scenario.

Windows Hello for Business

Raymond is a Windows 10 Home user and Marteen is an ethical hacker and security researcher. Marteen finds a security flaw in Windows and reports this to Microsoft. Microsoft releases a security fix to prevent malware developers from exploiting this flaw. Which of the following features on Raymond's computer will apply Microsoft's security fix and protect his computer from being compromised?

Windows Update

You run Sysprep to generalize an image. On the Syprep cleanup actions window, you choose the System Out-of-Box Experience (OOBE) cleanup action. Which of the following is most likely to occur in this scenario on the first boot?

Windows Welcome is launched.

Identify the IPv4 address using the information below. Subnet mask = 255.255.0.0Network ID = 192.120.0.0Host ID = 0.0.4.250

192.120.4.250

What is the resolution of a 4K monitor?

3840 X 2160

Kettle Corp. purchases Windows 10 computers with the Pro edition installed. Chieh, the system administrator, wants to apply the organization's standardized configuration settings and update the operating system to the Enterprise edition. Which of the following should Chieh use in this scenario?

A provisioning package

Identify an internal hardware component.

A video card

Identify a similarity between the picture password and PIN authentication methods.

Both methods are unique to a specific computer.

You are asked to use the Get-NetIPConfiguration cmdlet in Windows PowerShell. You are not familiar with the cmdlet. How will you get information relevant to the cmdlet using Windows PowerShell?

By using the Get-Help Get-NetIPConfiguration -Full cmdlet

You are told that you can use dism.exe to access optional features that are not available in the Settings window. How will you access it?

By using the command in the command prompt window

Which wireless standard has a maximum data throughput of 54 MBps?

IEEE 802.11a

Under which of the following categories in the Windows 10 settings window can one find the volume settings?

System

Lee uses a Windows 10 computer to write a newsletter. After a few hours, he locks his computer, without saving his work, and goes on a break. Meanwhile, Martha signs into the computer using her account, checks her emails, and signs out. When Lee returns, he continues working on his newsletter. Which Windows 10 sign-in method enables Lee to continue his work?

The fast user switching method

You are tasked with upgrading the computers in your organization to Windows 10. You receive a request from users to migrate all their personal and application settings to the upgraded systems. If you are able to accommodate their request successfully, which of the following must be true?

You synced the settings using Microsoft accounts.

Moses, a system administrator, wants to limit the amount of storage consumed by particular users on a disk partition. Which of the following command-line utilities will help Moses accomplish this task?

fsutil

Trisha, a system administrator, is reviewing the permissions for a few shared folders. She notices that the custom permissions have over time become messy. She wants to reset these permissions with the default access control list.

icacls


Conjuntos de estudio relacionados

AP Macro Final MC Questions: 4,5,6

View Set

Caring for the Patient with Acute Pancreatitis

View Set

Unit 4 Practice Test ( Nervous System )

View Set

Chapter 42 Fluid, Electrolyte, and Acid-Base Balance (Week 11)

View Set

EMS Chapter 36: Multisystem Trauma & Trauma in Special Patient Populations

View Set

IndiaBix - Bipolar Junction Transistors (BJT)

View Set

Vsim Carla Hernandez Pre/Post-test

View Set