Chapter_4&5_Test, Windows Configuration: Windows 10 - Chapters 11 - 12, Windows Configuration: Windows 10 - Chapter 7 & 8, Windows Configuration: Windows 10 - Chapters 9/10, Windows Configuration: Windows 10 - Chapter 5-6

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

A file for installing a Windows Store app

.appx file

An app packaged for installation by the Windows Installer service

.msi file

Partition Table

A data structure contained in the MBR that is used to identify reserved areas of disk space for hard disks formatted for x86 computers. The partition table holds a maximum of four entries originally tasked to point to a maximum of four primary partitions, or there primary and one extended partitions.

New Technology File System (NTFS)

A file system introduced with Windows NT. NTFS supports advanced features to add reliability features to add reliability, security, and flexibility that file systems such as FAT and FAT32 do not have.

Resilient File System (ReFS)

A file system introduced with Windows Server 2012 that supports basic NTFS-like features and self-healing technology for resilient bulk file storage when used together with Storage Space technology.

Access Control Entry (ACE)

A specific entry in a file or folder's ACL that uniquely identifies a user or group by its security identifier and the action it is allowed or denied to take on that file or folder.

Disk Quota

A system of tracking owners for file data within an NTFS-formatted partition or volume and the total disk space consumed by each owner. Limits or warning can be established to restrict disk space usage.

An administrator account derives its privileges from being a member of which local group? A) Administrators B) Users C) Guest D) Performance Monitor Users

A) Administrators

Which profile is used when new user profiles are created? A) Default B) Roaming C) Mandatory D) Public

A) Default

Which characteristics apply to the Administrator account? (Choose all that apply.) A) It cannot be deleted B) It has a blank password by default C) It can be locked out D) It cannot be renamed E) It is visible on the sign-in screen

A) It cannot be deleted B) It has a blank password by default

A user is given Read permission to a file stored on an NTFS-formatted volume. The file is then moved to a folder on the same NTFS-formatted volume where the user has been given Modify permission to that folder. When the user signs in to the computer holding the file and accesses its new location via a drive letter, what is the user's effective permission to the file? A) Read B) Modify C) None of the choices are correct D) Full Control E) No access

A) Read

In order to stop the automatic sign-in from occurring, which key should be held down during the boot process? A) Shift B) Ctrl C) Alt D) Esc

A) Shift

In Windows 10, the only supported method to configure the default profile is to use which utility? A) Sysprep B) The User Profiles applet C) The User Manager D) The Account Manger

A) Sysprep

On dynamic disks, the term partition is not used to define the space where a file system is installed. What term is used? A) Volumes B) Track C) Sectors D) Mirrors

A) Volumes

Upon opening the Disk Management console, you notice a disk whose status is reported as Foreign Disk. This is most likely because of which obstacle? A)The disk was moved from another computer B)The disk has been corrupted C)The disk's Unicode property is enabled D)The disk is shared on the network

A)The disk was moved from another computer

Which processor feature monitors processes to ensure that they do not access unauthorized memory spaces, which is done by various types of malware, such as virus, to take control of systems? a. DEP b. XPS c. WEI d. LOGO

A. DEP

To help identify and resolve app compatibility issues, the Windows 10 ______________________ includes the Application Compatibility Toolkit (ACT)

ADK

A service created by Apple that allows external apps to send notification data to apps installed on Apple devices.

APNs

A software layer that exists between apps and the operating system to simplify app development

Application Environment Subsystem

A technology that deploys applications by streaming and isolates them in a virtual environment

Application Virtualization (App-V)

The security process that records the occurrence of specific operating system events in the Security log.

Auditing

An identity and access management cloud solution.

Azure AD

Which NTFS feature allows an administrator to restrict the amount of disk space used by a user? A) EFS B) Disk Quotas C) Symbolic links D) Permissions

B) Disk Quotas

Which account has extremely limited access to resources and computer activates and is intended for occasional use by low-security users? A) Root B) Guest C) Administrator D) User

B) Guest

Which user management tool is required to assign a logon to a user? A) Default User B) Local Users and Groups MMC snap-in C) User Accounts in Control Panel D) Advanced Users and Groups MMC snap-in E) Advanced User Accounts applet

B) Local Users Groups MMC snap-in

Which of the following storage space types can only be created with three or more physical disks? A) Two-way mirror B) Parity C) Three-way mirror D) Simple

B) Parity

Members of which group are able to monitor performance counters on the computer, but cannot access performance logs. A) Event Log Readers B) Performance Monitor Users C) Performance Log Users D) Guests

B) Performance Monitor Users

What feature of NTFS allows a file or folder to point to another file or folder located somewhere else in the file system? A) Volume mount points B)Symbolic links C) Alternate data streams D) Transactional NTFS

B) Symbolic links

Which characters are not allowed in user account names? (Choose all that apply) A) ! B) \ C) 1 D) * E) $

B) \ D) *

Which type of permissions are considered the most basic level of data security in Windows 10? a. EFS b. NTFS c. FAT d. NAP

B. NTFS

Policy that allows employees to bring their own computers, smartphones, and tablets to work.

BYOD

A feature in Windows 10 that can encrypt the operating system partition of a hard drive and protect system files from modification.

BitLocker Drive Encryption

______________________________is a method for protecting data on removable storage such as USB drives?

BitLocker To-Go

A user is assigned Read permission to the NTFS folder C:\ACCOUNTING. The user requires full access to the folder C:\ACCOUNTING\FORMS and its contents. This can be accomplished by which of the following? A) Blocking permission inheritance at C:\ACCOUNTING and assigning the user Full control to C:\ACCOUNTING\FORMS B) Blocking permission inheritance at C:\ACCOUNTING\FORMS and assigning the user Full control to C:\ACCOUNTING\FORMS C) Assigning the user Full control to C:\ACCOUNTING\FORMS D) This is not possible E)Assigning the user Full control to C:\ACCOUNTING

C) Assigning the user Full control to C:\ACCOUNTING\FORMS

You have recently added a new USB portable hard disk to your computer. You have received a notice that new hardware has been detected but the disk dose not appear as a storage location. Which utility would you use to verify that the hard disk's logical disk information is recognized by Windows 10 (Choose all that apply)? A) USB Management console B) Startup and Recovery console C) Disk Management console D)DiskPart E) Device Manager

C) Disk Management console D) DikPart

The Guest account derives all of its privileges from being a member of the guest group and which other group? A) User B) Domain C) Everyone D) Initial

C) Everyone

Members of which of the following groups are able to monitor performance counters and access performance logs on the computer? A) Event Log Readers B) IIS_IUSRS C) Performance Log User D) Guests

C) Performance Log User

With which Windows version was NTFS first introduced? A) Windows 2000 B) Windows XP C) Windows NT D) Windows 95

C) Windows NT

Policy that allows employees to choose a computer, smartphone, or tablet from a corporate-owned pool of devices

CYOD

As a _______________-based service, Microsoft Intune requires the use of two administrative websites.

Cloud

When you format a drive, you choose the size of which of the following file system attributes? A) Track B) Sector C) Table D) Cluster

D) Cluster

Which sign-in method allows multiple users to have applications running on the computer at the same time? A) Assigned Access B) This is not possible in Windows C) SSO D) Fast user switching E) Automatic sign-in F) Secure sign-in

D) Fast user switching

Which windows 10 feature ensures that a second user can log on to a locked computer without logging off the first user and losing their work? A) Secure sign-in B) Windows Welcome C) Automatic sign-in D) Fast user switching

D) Fast user switching

Which Windows 10 feature simplifies the configuration of peer-to-peer networks by removing the need to synchronize users passwords on each computer? A) Personal User Password B) Pass-through authentication C) HomeGroup D) Game Control

D) Home Control

A VHD has been created using the Disk Management utility. Before the newly created VHD can be used to store files what must It be? A) Detached B) Configured as a dynamic disk C) Set to GPT partition style D) Initialized E) Set to MBR partition style

D) Initialized

A 127 GB volume on a dynamic disk can be formatted with which file system? A) Fat32 B) ReFS C) FAT D) NTFS

D) NTFS

Which of the following file systems is the only one that supports file compression in windows 10? A) Fat32 B) ReFS C) FAT D) NTFS

D) NTFS

Which profile is different from other profiles because it is not a complete profile? A) Default B) Roaming C) Mandatory D) Public

D) Public

Which profile is merged into each user profile when the user is signed in? A) New B) Blank C) Default User D) Public E) Default

D) Public

Standard users are members of which built-in local group? A) Guests B) Administrators C) Remote Desktop Users D) Users E) None of the above

D) Users

A(n) ___________________________is a router on the local network that is used to deliver packets to a remote network.

Default Gateway

For virtual hard disks, creating a checkpoint triggers the creation of a _______________________disk.

Differencing

A Microsoft tool for synchronizing copies of local identity information into Azure AD

DirSync

Username file in a profile contains user-specific registry settings? A) SYSTEM.DAT B) Local Setting C) AppData D) NTUSER.MAN E) NTUSER.DAT

E) NTUSER.DAT

An encryption technology for individual files and folders that can be enabled by users

EFS- Encrypting File System

A license suite available for purchase from Microsoft that includes Azure AD Premium, Microsoft Intune, and Azure Rights Management Services

EMS

T/F Local user account can be used to access resources on other computers in a workgroup or a domain.

FALSE

T/F The administrator and a user-specified initial account are called built-in accounts because they are created on every Windows 10 computer.

FALSE

(True Or False) A file is currently compressed in its local file system. For security reasons, the file is required to be encrypted. The file can be both compressed and encrypted.

False

(True Or False) Because the initial user account created during installation is a member of the Administrators group, it has all of the characteristics of the Administrator account.

False

(True Or False) Because user names are case sensitive, you can use capitalization to ensure that they are unique.

False

(True Or False) Changes in the ownership of a file do not change the amount of data that is considered to belong to user.

False

(True Or False) In a domain-based network, each server authenticates users by using the SAM database.

False

(True Or False) Local user accounts are stored in the database named users.sql

False

(True Or False) Local user accounts can be used to access resources on other computers in a workgroup or a domain.

False

(True Or False) The Administrator and a user-specified initial account are called built-in accounts because they are created on every Windows 10 computer.

False

(Ture or False) When assigning NTFS permissions, an ACE entry can explicitly define who is denied access to a resource.

False

Most organizations use the 32-bit version of Windows 10 rather than the 64-bit version of Windows 10.

False

New in Windows 10 is a virtual printer for PDF documents names Microsoft XPS Document Writer?

False

T/F Network bottlenecks are more common for computers than servers running Windows 10.

False

T/F The Services tab in Task Manager shows all the user applications running on the computer.

False

T/F Microsoft Intune policies apply only to domain joined devices

Fasle

A one-way encryption algorithm that creates a unique identifier that can be used to determine whether data has been changed.

Hashing Algorithm

Software and services responsible for provisioning and controlling access to mobile apps

MAM

Security software used to monitor, manage, and secure employee mobile devices.

MDM

Malicious software designed to perform unauthorized acts on your computer.

Malware

When a Windows 10 computer is not part of an Active Directory domain, you can sign in by using a local user account or a _______________________account.

Microsoft

New in Windows 10 is a virtual printer for PDF documents named______________________________

Microsoft Print to PDF

A system that allows multiple computers to share a single IP address when connecting to the Internet.

NAT

_________________________________is a central point in Windows 10 for managing the configuration of the network you are currently connected to.

Network & Sharing Center

A setting that controls how your computer views other computers on the network and advertises its presence on the network.

Network Discovery

The ability for Windows 10 to detect when it is connected to a different network and perform actions based on the change

Network Location Awareness

A command-line utility that can be used to test IP communications between the computer running the ulility and a remote target.

PINS

A collection of settings to control password characteristics such as length and complexity.

Password Policy

__________________ is an MMC snap-in that is used to monitor system performance indicators.

Performance Monitor

A standard set of rules that defines how different components of a system operate together.

Protocol

Which file system is designed to verify and autocorrect data faults on the volume without having to bring the volume down for maintenance? A) FAT32 B) exFAT C) ReFS D) NTFS

ReFS

A ___________________________is created from an earlier healthy OS installation on a computer, and contains a backup of the Windows system files and recovery tools to assist in the repair process.

Recovery Drive

A central store for application and operating system configuration information in Windows 10

Registry

A feature in Remote Desktop Services that presents clients with a single app in a window

RemoteApp

___________________provides real-time monitoring of the most common system performance indicators.

Resource Monitor

Each time a user logs on locally, which database is used to verify sign-in credentials? A) SAM B) SSID C) SID D) NID

SAM

Local user accounts are stored in the ___________________database of Windows 10.

SAM- Security Accounts Manager

A command-line tool that is used to apply, export, or analyze security templates.

Secedit

Which sign-in method requires users to press Ctrl+Alt+Delete before signing in? A) Secure sign-in B) Automatic sign-in C) Assigned sign-in D) Fast user switching

Secure sign-in

A(n) _____________________is used to define which part of an IP address is the network ID and which part of the IP address is the host ID.

Subnet mask

T/F NTFS permissions can be easily circumvented when you have a physical access to a computer.

TRUE

T/F Secure sign-in increases security on your computer by forcing you to press Ctrl+Alt+Delete before signing in.

TRUE

T/F With fast user switching, only one user can be actively using the computer at a time

TRUE

A system to tunnel IPv6 addressed packets over an IPv4 network, even if NAT is used on the IPv4 network.

Teredo

Storage Space

The Microsoft software-based disk pooling technology that allows for different levels of resiliency to disk failure and provides virtualized volume storage within the disk pool.

(True Or False) A roaming profile is located on a network server.

True

(True Or False) After you set a PIN for a domain account on your laptop, that PIN can be used only on your laptop.

True

(True Or False) NTFS stores files and folders in a way that looks very similar to the FAT file system.

True

(True Or False) Secure sign-in increases security on your computer by forcing you to press Ctrl+Alt+Delete before signing in.

True

(True Or False) The choice of file system can limit the total amount of data stored in a partition or volume.

True

Data Execution Prevention (DEP) is a processor feature in Windows 10 that monitors processes to ensure that they do not access unauthorized memory spaces.

True

Local printing requires that a printer be connected directly to a Windows 10 computer by using a cable?

True

T/F A company commonly sets up only one production Office 365 tenant account, and adds users to that account.

True

T/F Both Hyper-V on Windows Server and Client Hyper-V on Windows 10 offer the same core functionality that allows you to run virtual machines.

True

T/F Client Hyper-V can use either VHD or VHDX virtual hard disks

True

T/F If a Windows 10 computer has multiple network interfaces active, each can be assigned a different network location, each with a different firewall settings based on their assigned network location.

True

T/F The option to manage printers in Settings is new for Windows 10?

True

T/F The simplest automated deployment method is to create a batch file that does a silent install of the application.

True

T/F When deploying Apps with Microsoft Intune, required installs can have a deadline for installation defined.

True

T/F Windows 10 includes several interfaces that make it easier for developers to create clients, services, protocols, and network drivers?

True

All Internet Exploer zones can be configured to run in Protected Mode. Protected Mode works in conjunction with ________________ to prevent malware from installing through Internet Explorer.

UAC

A feature in Windows 10 that elevates user privileges only when required.

UAC - User Account Control

The name that uniquely identifies a user within an identity directory.

UPN

The most recent iteration of Windows Store apps is _________________________ also known as Universal apps.

Universal Windows Platform Apps

A standard user account derives its privileges from being a member of the local________________group.

Users

Automatic sign-in is configured on the __________________ tab of the User Accounts applet.

Users

A system used to resolve computer NetBIOS names to IP address.

WINS

Anti-malware software included with Windows 10.

Windows Defender

Currently, administrators are more likely to create new scripts in ________________________than to create batch files and use reg.exe

Windows PowerShell

The newest application environment that is designed to be cross platform with phones, tablets, and desktop computers

Windows Store Apps

A system in Windows that allows 32-bit Windows apps to run on a 64-bit operating system

Windows on Windows 64 (WOW64)

Which utility is used to browse and manage the records of system events and messages stored in system event logs? a. Event Viewer b. shared folders c. device managers d. WMI Control

a. Event Viewer

File Explorer contains ribbon tabs that can be used for various functions. Which ribbon tab provides options to open a new file explorer window, command prompt, or Windows PowerShell prompt that is focused on the current folder? a. File b. Home c. Share d. View

a. File

Which of the following is NOT an Intune policy category? a. Firewall policies b. Configuration Policies c. Compliance Policies d. Corporate Device Enrollment Policies

a. Firewall policies

The local security policy is part of a larger Windows management system known as which of the following? a. Group Policy b. Local Policy c. Network Policy d. Domain Policy

a. Group Policy

The two most common mechanisms for sharing an IP address are a router or which of the following? a. ICS b. DSL c. PPPoE d. IPsec

a. ICS

A new interface for managing printers in Windows 10 is known as which of the following? a. Printers and Scanners b. Connected devices c. Print Management snap-in d. Devices and Printers

a. Printers & Scanners

Each time a user logs on locally, which database is used to verify sign-in credentials? a. SAM b. SSID c. SID d. NID

a. SAM - Security Account Manager

In order to stop the automatic sign-in from occurring, which key should be held down during the boot process? a. Shift b. Ctrl c. Alt d. Esc

a. Shift

Which of the following allows you to begin using an application faster after printing by storing the print job as a file and sending the print job to the printer as a background process? a. Spooling b. Staging c. XPS d. PCL

a. Spooling

What is the format for user names used by Office 365 apps? a. UPN b. DNS c. UNC d. LDAP

a. UPN

Which of the following is NOT a desktop OS supported by Intune with an Intune client installed? a. Windows 8.1 RT b. Windows 10 Pro c. Windows 7 Ultimate d. Windows Vista Business

a. Windows RT 8.1

Which of the following terms is used to describe a virtualized environment that hosts Win32 apps on the 64-bit version of Windows 10? a. Windows on Windows 64 (WOW64) b. Client Hyper-V c. App-V d. Win64

a. Windows on WIndows 64 (WOW64)

Which of the following is NOT a benefit of using VHDX instead of VHD format virtual disks? a. better backward compatibility b. better resilience to corrution c. improved performance d. automatic trimming

a. better backward compatibility

What feature is supported in Client Hyper-V that is not supported in the server version? a. hibernate b. checkpoints c. replica d. live migration

a. hibernate

Which component of the Hyper-V architecture controls all communication with the physical hardware on the computer? a. hypervisor b. child partition c. Integration Services d. Parent partition

a. hypervisor

Windows 10 includes search functionality that can be used to find files and folders. Which of the following is used to increase the efficiency of searching in Windows 10? a. indexing b. profiling c. viewing d. context searching

a. indexing

What type of bottleneck occurs when the applications you are running require more memory than is physically available in the computer? a. memory b. disk c. network d. processor

a. memory

Which of the following is responsible for enabling communications between Windows 10 and the network device in your computer? a. network driver b. kernel c. socket d. network protocol

a. network driver

After you install Client Hyper-V, what must you do before you can begin using it? a. reboot the computer b. install the Hyper-V driver package c. format a disk to store virtual machines d. update the Windows OS

a. reboot the computer

You have two processors on a computer running Client Hyper-V. You have two virtual machines running VM1 and VM2. You want to be sure VM1 is allocated twice as much processing power as VM2. What control setting should you configure? a. Relative weight b. Virtual machine reserve c. Virtual machine limit d. Percent of total system resources

a. relative weight

What Windows 10 feature is a user- specific data protection mechanism that protects local resources by allowing user files to be backed up to an external hard drive or a network location? a. relog b. schlog c. tsklog d. brklog

a. relog

Which profile is stored in a network location rather than on the local hard drive? a. roaming b. public c. mandatory d. default

a. roaming

Which of the following is NOT a typical scenario for using Client Hyper-V? a. to make use of old workstations with few resources b. testing updates to the OS c. to provide app compatibility with older apps d. to run an alternate operating system

a. to make use of old workstations with few resources

Each Microsoft account is allocated how much storage that can be used for file storage in OneDrive? a. 1 GB b. 5 GB c. 7 GB d. 10 GB

b. 5GB

User accounts that are enrolled to be managed by Microsoft Intune must be linked to which of the following? a. a local AD b. Azure AD c. A SAM account d. A DNS record

b. Azure AD

Which of the following is an automated mechanism used to assign IP addresses, subnet masks, default gateways, DNS servers, WINS servers, and other IP configuration information to network devices? a. IPX b. DHCP c. AIX d. X.25

b. DHCP (Dynamic Host Configuration Protocol)

Which of the following is a correct statement about Generation 1 and Generation 2 virtual machines? a. Generation 1 virtual machines can boot to a SCSI virtual disk; Generation 2 virtual machines can only boot to IDE virtual disks. b. Generation 1 virtual machines use BIOS-based firmware; Generation 2 virtual machine use UEFI-based firmware c. Generation 1 virtual machines support secure boot; Generation 2 virtual machines do not support secure boot d. Generation 1 virtual machines support USB disks; Generation 2 virtual machines support floppy disks

b. Generation 1 virtual machines use BIOS-based firmware; Generation 2 virtual machine use UEFI-based firmware

Selecting a counter to display will display information about that counter's collected data as a chart type. Which chart type displays the current value of each performance counter in decimal format? a. Line b. Histogram bar c. Report d. Vertical bar

b. Histogram bar

Account policies setting are located in which of the following? a. NAP b. local security policy c. EFS security policy d. remote policy

b. Local security policy

Intune can distribute third-party updates in which of the following formats? a. COM b. MSP c. XML d. BIN

b. MSP

Members of which group are able to monitor performance counters on the computer, but cannot access performance logs? a. Event log readers b. Performance Monitor Users c. Performance Log Users d. Guests

b. Performance Monitor Users

Which tool allows a user to connect to the active registry database and make changes that are effective immediately? a. EDITREG.EXE b. REGEDIT.EXE c. REGISTER.EXE d. CHGREG.EXE

b. REGEDIT.EXE

Which protocol is included with Windows 10 for Network communication? a. IPX b. TCP/IP c. NetBEUI d. AppleTalk

b. TCP/IP

Which part of the motherboard in your computer is used to store encryption keys and certificates? a. NTFS b. TPM c. EFS d. NAP

b. TPM - Trusted Platform Module

Which of the following is a default Intune user group. a. Administrator Users b. Ungrouped Users c. Standard Useres d. Power Users

b. Ungrouped Users

Which of the following is NOT an operating system supported by Microsft Intune as a mobile device? a. Windows 8.1 RT b. Windows 7 c. Mac OS X 10.9 d. Android 4.0

b. Windows 7

Instead of logging performance counters to disk, you can configure which of the following to occur? a. messages b. alerts c. tasks d. archives

b. alerts

What do applications use to request services from the application environment subsystem? a. .NET Framework b. Application Programming Interfaces (API) c. Kernel services d. Hardware services

b. application programming interfaces (API)

Which distribution method delivers the critical components of an application first and allows the users to be using the application before installation is complete? a. sideloading b. Click-to-Run c. downloading d. RED.EXE

b. click-to-run

What type of virtual network should you create if your virtual machine should be able to communicate with the Internet? a. Internal b. external c. VPN d. private

b. external

The registry is divided into sections and levels of data. Multiple sections exist to organize data by purpose. What are these individual sections called? a. keys b. hives c. branches d. nests

b. hives

What happens if an APN certificate expires? a. the managed device is erased b. iOS device management will fail c. the administrator is warned and given 1 month grace period d. the device is locked until the Apple ID password is entered

b. iOS device management will fail

In Windows 10, which of the following is updated each time a file is changed to ensure that search results are current? a. search box b. index c. context d. file

b. index

Where in the Hyper-V architecture do device drivers reside? a. hypervisor b. parent partition c. child partition d. hardware

b. parent partition

Which rule condition identifies software by file location? a. publisher b. path c. file hash d. certificate

b. path

Which of the following is used to protect your computer from malware that may attempt to steal your password? a. Fast user switching b. Secure sign-in c. Windows Welcome d. Manual sign-in

b. secure sign-in

Each Win32 application runs in its own virtual memory space and is executed by the processor in which mode? a. DOS b. user c. kernel d. Win32

b. user

A NTFS partition has disk quotas enabled. You would like to run a weekly report that summarizes how much space each user is consuming. Which of the following utilities allows you to review quota details from the command line? A) get-diskquota B) diskpart C) fsutil D) convert E) dsquota

c) fsutil

Windows 10 introduces a newer version of Windows Backup. What did Microsoft decide to call this newer version? a. Windows Backup 10 b. Microsoft Backup for Windows 10 c. Backup and Restore (Windows 7) d. File History

c. Backup and Restore (Windows 7)

To address the risks to data stored on computers and laptops, which encryption technology is available in Windows 10? a. NAP b. Dual Locked Hard Drive c. BitLocker Drive Encryption d. TPM

c. BitLocker Drive Encryption

What Windows 10 allows you to centralize the administration of printers for remote locations but still keep WAN link utiliation low because the print jobs stay local? a. Windows Printing b. Windows Connectivity c. Branch Office Direct Printing d. Windows Remote Office

c. Branch Office Printing

Which of the following protocols is used for resolving host names to IP address? a. IPv6 b. IPv4 c. DNS d. TCP/IP

c. DNS

Data Collector Sets organize multiple counters into a single unit. Which type of data can a Data Collector Set monitor to track when system event occur? a. Configuration b. Performance counters c. Event Trace d. Bottleneck trace

c. Event Trace

The Guest account derives all of its privileges from being a member of the Guests groups and which other group? a. User b. Domain c. Everyone d. Initial

c. Everyone

You are running a virtual machine that must boot through the network adapter and provide the best networking performance. Which type of virtual machine and virtual network adapter should you choose? a. Generation 1, synthetic b. Generation 1, emulated c. Generation 2, synthetic d. Generation 2, emulated

c. Generation 2, synthetic

A more manageable way to deploy .msi-based application in smaller environments would be to use which of the following? a. a batch file b. msiexec.exe utility c. Group Policy d. System Center configuration manager

c. Group Policy

What Windows 10 feature simplifies the configuration of peer-to-peer networks by removing the need to synchronize users and passwords on each computer? a. Personal User Password b. Pass-through authentication c. HomeGroup d. Game control

c. HomeGroup

What is the name of the could-based storage that is automatically included for free when a Microsoft account is created? a. Windows Store b. Microsoft Cloud c. OneDrive d. WindowsDrive

c. OneDrive

Members of which of the following groups are able to monitor performance counters and access performance logs on the computer? a. Event Log Readers b. IIS_IUSRS c. Performance Log Users d. Guests

c. Performance log users

What type of software is silently installed on your computer, monitors your behavior, and performs actions based on you behavior? a. Adware b. Worm c. Spyware d. Virus

c. Spyware

Which Control Panel applet is considered a simplified interface for user management? a. Privileges b. Permissions c. User Accounts d. Accounts

c. User accounts

Which of the following are required for individuals to log on to Windows 10 and uses resources on the computer? a. Public Keys b. IP address c. User accounts d. Digital certificates

c. User accounts

Which Windows 10 feature provides an automated diagnosis and repair of boot problems plus a centralized platform for advanced recovery tool? a. Windows Preinstallation Environment (Windows PE) b. System Reset c. Windows Recovery Environment (WinRE) d. Recovery Drive

c. Windows Recovery Environment (WinRE)

You can modify the locations included in a library, but the locations must be indexed by which of the following? a. File Explorer b. Libraries c. Windows Search d. Documents

c. Windows Search

Which policy allows you to configure an account to be temporarily disabled after a number of incorrect log-on attempts? a. domain b. group c. account lockout d. password

c. account lockout

Which of the following is a default Intune device group? a. All desktop computers b. Windows Devices c. All mobile devices d. Non- Windows Devices

c. all mobile devices

In addition to defining which locations are indexed, what else are you able to configure to be indexed by Windows 10? a. libraries b. folders c. file types d. metadata

c. files types

Data sent to which of the following returns to the computer that sent it and does not appear on the actual network? a. multicast address b. class D address c. loopback address d. MAC address

c. loopback address

Running fewer applications at once is a way to resolve which type of bottleneck? a. disk b. network c. memory d. processor

c. memory

What is the default format for an Office 365 tenant account? a. nickname.microsoftazure.com b. nickname.yourdomain.com c. nickname.onmicorsoft.com d. nickname.office365.com

c. nickname.onmicrosoft.com

Which utility can be used by a user with administrative rights in order to stage a driver manually? a. xpsprnt.exe b. pdriver.exe c. pnputil.exe d. pinstall.exe

c. pnputil

Which advanced audit policy setting tracts when tasks are performed that require a user rights assignment, such as changing the system time? a. object access b. account management c. privilege use d. process tracking

c. privilege use

Rules for communication across a network that define how much data can be sent and the format of that data is known as which of the following? a. Network drives b. Network drivers c. Protocols d. clients and services

c. protocols

When applications or Windows 10 starts, they read their configuration information from which of the following? a. kernel b. system core c. registry d. application environment

c. registry

Which of the following are used to process log file data and display it in a meaningful way? a. Counters b. Data managers c. Reports d. Data Collector Sets

c. reports

Which of the following would prevent the Intune client to be installed on an OS? a. it's a 32-bit OS b. it's Windows Vista Enterprise c. the SMS client is installed d. the Windows Installer is version 3.2

c. the SMS client is installed

Which IP utility is used to display response times for every router on the path to the destination? a. ping b. route c. tracert d. arp

c. tracert

Running apps in which mode ensures that a poorly written app does not affect system stability? a. kernel b. environment c. user d. service

c. user

Which of the following simplifies folder and file sharing by controlling both NTFS permissions and share permissions at the same time? a. Advance sharing b. Single sharing c. Public sharing d. "Share with" method

d. "share with" method

Besides the .NET Framework 4.6, what other version of the .NET Framework does Windows 10 provide as a feature? a. .NET 2.0 b. .NET 4.8 c. .NET 2.5 d. .NET 3.5

d. .NET 3.5

Traditional WIn32 or .NET Framework apps are commonly packaged as which type of file? a. .xml b. .html c. .pdf d. .msi

d. .msi

If you configure a virtual machine with dynamic memory, what is the default minimum RAM that will be configured? a. 256 MB b. 1 GB c. None d. 512 MB

d. 512 MB

If Windows 10 is configured to use dynamic IP configuration and is unable to contact a DHCP server, the default action is to use which type of address? a. WINS b. NetBIOS c. IPv6 d. APIPA

d. APIPA

Which account is the most powerful local user account possible? a. Guest b. Initial c. Installation d. Administrator

d. Administrator

Your Client Hyper-V host has a single network adapter. What option should be enabled to allow your virtual machines to communicate with the external network while not disrupting host network communication? a. Enhanced session mode b. Generation 2 virtual machine c. Enable virtual LAN identification for management operating system d. Allow management operating system to share this network adapter.

d. Allow management operating system to share this network adapter.

Which of the following can be used to define which programs are allowed or disallowed in the system? a. Software restriction policies b. A network zone c. Local Policies d. AppLocker

d. AppLocker

Applications that are not designed for Windows 10 and that require administrative privileges do no work properly request elevated privileges, generating an error. You can eliminate this error by using which of the following? a. Administrative Privileges Toolkit b. Private Toolkit c. Secure Toolkit d. Application Compatibility Toolkit

d. Application Compatibility Toolkit

Which security process records the occurrence of specific operating system events in the Security log? a. Encrypting b. Hashing c. Filtering d. Auditing

d. Auditing

Which Windows 10 feature ensures that a second user can log on to a locked computer without logging off? a. Secure sign-in b. Window Welcome c. Automatic sign-in d. Fast user switching

d. Fast User switching

Which registry hive contains details about the current hardware profile in use? a. HKEY_CURRENT_USER b. HKEY_CLASSES_ROOT c. HKEY_LOCAL_MACHINE d. HKEY_CURRENT_CONFIG

d. HKEY_CURRENT_CONFIG

Which of the following is a threat to privacy and is sometimes installed when you visit a website? a. Windows Defender b. EFS c. Macro Script d. Spyware

d. Spyware

What Windows 10 feature captures a screenshot each time the user clicks on a screen item and saves the screen shots and users actions in a report that can be emailed or saved to a shared storage location? a. Steps Monitor b. Event Viewer c. File Recovery d. Steps Recovery

d. Steps Recovery

Which of the following is an updated version of TCP/IPv4 with a larger address space and additional features? a. LLTP b. LLTPRD c. AIX d. TCP/IPv6

d. TCP/IPv6

You want to install Client Hyper-V on your new Windows 10 computer. Of the available choices which version of Windows 10 must be installed? a. Any 32-bit edition b. Windows 10 Home c. Windows 10 Mobile d. Windows 10 Education

d. Windows 10 Education

The full Intune product is available through which of the following? a. from the Windows Features control panel b. free from the Microsoft Download site c. from the Windows Store d. as part of the EMS

d. as part of the EMS

What feature of Hyper-V virtual machines is very useful for testing because you can almost instantly reset a computer back to a previous state? a. backups b. clones c. exports d. checkpoints

d. checkpoints

Which of the following is NOT a possible state for a virtual machine. a. Starting b. Paused c. Saved d. Down

d. down

What type of encryption algorithm is one-way encryption, which means that it encrypts data, but the data cannot be decrypted? a. signing b. symmetric c. asymmetric d. hash

d. hash

Which service is NOT supported by the Intune client for desktop computers? a. software updates b. managing apps c. updating Windows Firewall settings d. issuing certificates

d. issuing certificates

Characteristics of a file such as a file name, creation data, and modified date are known as which of the following? a. index b. category c. service d. metadata

d. metadata

If you have obtained the .appx file for a Windows Store app, you can install the app from a source other than the Windows Store. What is this ability known as? a. distribution b. download c. Click-to-Run d. package management

d. package management

Which page description language is the oldest and best supported? a. PDF b. PCL c. XPS d. Postscript

d. postscript

Software Windows 10 uses to understand and use the features of a printer is known as which of the following? a. shared printer b. print server c. print firewall d. printer driver

d. printer driver

Which type of virtual network should you create if you want to completely isolate test environment for a virtual machine? a. internal b. external c. VPN d. private

d. private

Which of the following is the name assigned to the WAP to identify itself to clients? a. netID b. access code c. security key d. security set identifier

d. security set identifier

A discrete body of registry keys and values stored in files as part of the operating system.

hive

A command-line utility that can be used to display, change, add, and delete network configuration settings on a computer, including basic and advanced settings.

netsh

A command-line utility that can be used to view or debug that data returned from a DNS server in response to a DNS name resolution query.

nslookup


Kaugnay na mga set ng pag-aaral

Nutrition Consultant Exam Chp. 10-11

View Set

Intro to Paralegal Studies Chapter 14 Tort Law

View Set

energy resources and energy transfer

View Set

CHAPTER 2 interpersonal communication and emotional intelligence

View Set

4.05: Parallel and Perpendicular Lines

View Set

CH 6: NJ Laws, Rules, and Regulations Pertinent to Life Insurance Only

View Set