Chapter_4&5_Test, Windows Configuration: Windows 10 - Chapters 11 - 12, Windows Configuration: Windows 10 - Chapter 7 & 8, Windows Configuration: Windows 10 - Chapters 9/10, Windows Configuration: Windows 10 - Chapter 5-6
A file for installing a Windows Store app
.appx file
An app packaged for installation by the Windows Installer service
.msi file
Partition Table
A data structure contained in the MBR that is used to identify reserved areas of disk space for hard disks formatted for x86 computers. The partition table holds a maximum of four entries originally tasked to point to a maximum of four primary partitions, or there primary and one extended partitions.
New Technology File System (NTFS)
A file system introduced with Windows NT. NTFS supports advanced features to add reliability features to add reliability, security, and flexibility that file systems such as FAT and FAT32 do not have.
Resilient File System (ReFS)
A file system introduced with Windows Server 2012 that supports basic NTFS-like features and self-healing technology for resilient bulk file storage when used together with Storage Space technology.
Access Control Entry (ACE)
A specific entry in a file or folder's ACL that uniquely identifies a user or group by its security identifier and the action it is allowed or denied to take on that file or folder.
Disk Quota
A system of tracking owners for file data within an NTFS-formatted partition or volume and the total disk space consumed by each owner. Limits or warning can be established to restrict disk space usage.
An administrator account derives its privileges from being a member of which local group? A) Administrators B) Users C) Guest D) Performance Monitor Users
A) Administrators
Which profile is used when new user profiles are created? A) Default B) Roaming C) Mandatory D) Public
A) Default
Which characteristics apply to the Administrator account? (Choose all that apply.) A) It cannot be deleted B) It has a blank password by default C) It can be locked out D) It cannot be renamed E) It is visible on the sign-in screen
A) It cannot be deleted B) It has a blank password by default
A user is given Read permission to a file stored on an NTFS-formatted volume. The file is then moved to a folder on the same NTFS-formatted volume where the user has been given Modify permission to that folder. When the user signs in to the computer holding the file and accesses its new location via a drive letter, what is the user's effective permission to the file? A) Read B) Modify C) None of the choices are correct D) Full Control E) No access
A) Read
In order to stop the automatic sign-in from occurring, which key should be held down during the boot process? A) Shift B) Ctrl C) Alt D) Esc
A) Shift
In Windows 10, the only supported method to configure the default profile is to use which utility? A) Sysprep B) The User Profiles applet C) The User Manager D) The Account Manger
A) Sysprep
On dynamic disks, the term partition is not used to define the space where a file system is installed. What term is used? A) Volumes B) Track C) Sectors D) Mirrors
A) Volumes
Upon opening the Disk Management console, you notice a disk whose status is reported as Foreign Disk. This is most likely because of which obstacle? A)The disk was moved from another computer B)The disk has been corrupted C)The disk's Unicode property is enabled D)The disk is shared on the network
A)The disk was moved from another computer
Which processor feature monitors processes to ensure that they do not access unauthorized memory spaces, which is done by various types of malware, such as virus, to take control of systems? a. DEP b. XPS c. WEI d. LOGO
A. DEP
To help identify and resolve app compatibility issues, the Windows 10 ______________________ includes the Application Compatibility Toolkit (ACT)
ADK
A service created by Apple that allows external apps to send notification data to apps installed on Apple devices.
APNs
A software layer that exists between apps and the operating system to simplify app development
Application Environment Subsystem
A technology that deploys applications by streaming and isolates them in a virtual environment
Application Virtualization (App-V)
The security process that records the occurrence of specific operating system events in the Security log.
Auditing
An identity and access management cloud solution.
Azure AD
Which NTFS feature allows an administrator to restrict the amount of disk space used by a user? A) EFS B) Disk Quotas C) Symbolic links D) Permissions
B) Disk Quotas
Which account has extremely limited access to resources and computer activates and is intended for occasional use by low-security users? A) Root B) Guest C) Administrator D) User
B) Guest
Which user management tool is required to assign a logon to a user? A) Default User B) Local Users and Groups MMC snap-in C) User Accounts in Control Panel D) Advanced Users and Groups MMC snap-in E) Advanced User Accounts applet
B) Local Users Groups MMC snap-in
Which of the following storage space types can only be created with three or more physical disks? A) Two-way mirror B) Parity C) Three-way mirror D) Simple
B) Parity
Members of which group are able to monitor performance counters on the computer, but cannot access performance logs. A) Event Log Readers B) Performance Monitor Users C) Performance Log Users D) Guests
B) Performance Monitor Users
What feature of NTFS allows a file or folder to point to another file or folder located somewhere else in the file system? A) Volume mount points B)Symbolic links C) Alternate data streams D) Transactional NTFS
B) Symbolic links
Which characters are not allowed in user account names? (Choose all that apply) A) ! B) \ C) 1 D) * E) $
B) \ D) *
Which type of permissions are considered the most basic level of data security in Windows 10? a. EFS b. NTFS c. FAT d. NAP
B. NTFS
Policy that allows employees to bring their own computers, smartphones, and tablets to work.
BYOD
A feature in Windows 10 that can encrypt the operating system partition of a hard drive and protect system files from modification.
BitLocker Drive Encryption
______________________________is a method for protecting data on removable storage such as USB drives?
BitLocker To-Go
A user is assigned Read permission to the NTFS folder C:\ACCOUNTING. The user requires full access to the folder C:\ACCOUNTING\FORMS and its contents. This can be accomplished by which of the following? A) Blocking permission inheritance at C:\ACCOUNTING and assigning the user Full control to C:\ACCOUNTING\FORMS B) Blocking permission inheritance at C:\ACCOUNTING\FORMS and assigning the user Full control to C:\ACCOUNTING\FORMS C) Assigning the user Full control to C:\ACCOUNTING\FORMS D) This is not possible E)Assigning the user Full control to C:\ACCOUNTING
C) Assigning the user Full control to C:\ACCOUNTING\FORMS
You have recently added a new USB portable hard disk to your computer. You have received a notice that new hardware has been detected but the disk dose not appear as a storage location. Which utility would you use to verify that the hard disk's logical disk information is recognized by Windows 10 (Choose all that apply)? A) USB Management console B) Startup and Recovery console C) Disk Management console D)DiskPart E) Device Manager
C) Disk Management console D) DikPart
The Guest account derives all of its privileges from being a member of the guest group and which other group? A) User B) Domain C) Everyone D) Initial
C) Everyone
Members of which of the following groups are able to monitor performance counters and access performance logs on the computer? A) Event Log Readers B) IIS_IUSRS C) Performance Log User D) Guests
C) Performance Log User
With which Windows version was NTFS first introduced? A) Windows 2000 B) Windows XP C) Windows NT D) Windows 95
C) Windows NT
Policy that allows employees to choose a computer, smartphone, or tablet from a corporate-owned pool of devices
CYOD
As a _______________-based service, Microsoft Intune requires the use of two administrative websites.
Cloud
When you format a drive, you choose the size of which of the following file system attributes? A) Track B) Sector C) Table D) Cluster
D) Cluster
Which sign-in method allows multiple users to have applications running on the computer at the same time? A) Assigned Access B) This is not possible in Windows C) SSO D) Fast user switching E) Automatic sign-in F) Secure sign-in
D) Fast user switching
Which windows 10 feature ensures that a second user can log on to a locked computer without logging off the first user and losing their work? A) Secure sign-in B) Windows Welcome C) Automatic sign-in D) Fast user switching
D) Fast user switching
Which Windows 10 feature simplifies the configuration of peer-to-peer networks by removing the need to synchronize users passwords on each computer? A) Personal User Password B) Pass-through authentication C) HomeGroup D) Game Control
D) Home Control
A VHD has been created using the Disk Management utility. Before the newly created VHD can be used to store files what must It be? A) Detached B) Configured as a dynamic disk C) Set to GPT partition style D) Initialized E) Set to MBR partition style
D) Initialized
A 127 GB volume on a dynamic disk can be formatted with which file system? A) Fat32 B) ReFS C) FAT D) NTFS
D) NTFS
Which of the following file systems is the only one that supports file compression in windows 10? A) Fat32 B) ReFS C) FAT D) NTFS
D) NTFS
Which profile is different from other profiles because it is not a complete profile? A) Default B) Roaming C) Mandatory D) Public
D) Public
Which profile is merged into each user profile when the user is signed in? A) New B) Blank C) Default User D) Public E) Default
D) Public
Standard users are members of which built-in local group? A) Guests B) Administrators C) Remote Desktop Users D) Users E) None of the above
D) Users
A(n) ___________________________is a router on the local network that is used to deliver packets to a remote network.
Default Gateway
For virtual hard disks, creating a checkpoint triggers the creation of a _______________________disk.
Differencing
A Microsoft tool for synchronizing copies of local identity information into Azure AD
DirSync
Username file in a profile contains user-specific registry settings? A) SYSTEM.DAT B) Local Setting C) AppData D) NTUSER.MAN E) NTUSER.DAT
E) NTUSER.DAT
An encryption technology for individual files and folders that can be enabled by users
EFS- Encrypting File System
A license suite available for purchase from Microsoft that includes Azure AD Premium, Microsoft Intune, and Azure Rights Management Services
EMS
T/F Local user account can be used to access resources on other computers in a workgroup or a domain.
FALSE
T/F The administrator and a user-specified initial account are called built-in accounts because they are created on every Windows 10 computer.
FALSE
(True Or False) A file is currently compressed in its local file system. For security reasons, the file is required to be encrypted. The file can be both compressed and encrypted.
False
(True Or False) Because the initial user account created during installation is a member of the Administrators group, it has all of the characteristics of the Administrator account.
False
(True Or False) Because user names are case sensitive, you can use capitalization to ensure that they are unique.
False
(True Or False) Changes in the ownership of a file do not change the amount of data that is considered to belong to user.
False
(True Or False) In a domain-based network, each server authenticates users by using the SAM database.
False
(True Or False) Local user accounts are stored in the database named users.sql
False
(True Or False) Local user accounts can be used to access resources on other computers in a workgroup or a domain.
False
(True Or False) The Administrator and a user-specified initial account are called built-in accounts because they are created on every Windows 10 computer.
False
(Ture or False) When assigning NTFS permissions, an ACE entry can explicitly define who is denied access to a resource.
False
Most organizations use the 32-bit version of Windows 10 rather than the 64-bit version of Windows 10.
False
New in Windows 10 is a virtual printer for PDF documents names Microsoft XPS Document Writer?
False
T/F Network bottlenecks are more common for computers than servers running Windows 10.
False
T/F The Services tab in Task Manager shows all the user applications running on the computer.
False
T/F Microsoft Intune policies apply only to domain joined devices
Fasle
A one-way encryption algorithm that creates a unique identifier that can be used to determine whether data has been changed.
Hashing Algorithm
Software and services responsible for provisioning and controlling access to mobile apps
MAM
Security software used to monitor, manage, and secure employee mobile devices.
MDM
Malicious software designed to perform unauthorized acts on your computer.
Malware
When a Windows 10 computer is not part of an Active Directory domain, you can sign in by using a local user account or a _______________________account.
Microsoft
New in Windows 10 is a virtual printer for PDF documents named______________________________
Microsoft Print to PDF
A system that allows multiple computers to share a single IP address when connecting to the Internet.
NAT
_________________________________is a central point in Windows 10 for managing the configuration of the network you are currently connected to.
Network & Sharing Center
A setting that controls how your computer views other computers on the network and advertises its presence on the network.
Network Discovery
The ability for Windows 10 to detect when it is connected to a different network and perform actions based on the change
Network Location Awareness
A command-line utility that can be used to test IP communications between the computer running the ulility and a remote target.
PINS
A collection of settings to control password characteristics such as length and complexity.
Password Policy
__________________ is an MMC snap-in that is used to monitor system performance indicators.
Performance Monitor
A standard set of rules that defines how different components of a system operate together.
Protocol
Which file system is designed to verify and autocorrect data faults on the volume without having to bring the volume down for maintenance? A) FAT32 B) exFAT C) ReFS D) NTFS
ReFS
A ___________________________is created from an earlier healthy OS installation on a computer, and contains a backup of the Windows system files and recovery tools to assist in the repair process.
Recovery Drive
A central store for application and operating system configuration information in Windows 10
Registry
A feature in Remote Desktop Services that presents clients with a single app in a window
RemoteApp
___________________provides real-time monitoring of the most common system performance indicators.
Resource Monitor
Each time a user logs on locally, which database is used to verify sign-in credentials? A) SAM B) SSID C) SID D) NID
SAM
Local user accounts are stored in the ___________________database of Windows 10.
SAM- Security Accounts Manager
A command-line tool that is used to apply, export, or analyze security templates.
Secedit
Which sign-in method requires users to press Ctrl+Alt+Delete before signing in? A) Secure sign-in B) Automatic sign-in C) Assigned sign-in D) Fast user switching
Secure sign-in
A(n) _____________________is used to define which part of an IP address is the network ID and which part of the IP address is the host ID.
Subnet mask
T/F NTFS permissions can be easily circumvented when you have a physical access to a computer.
TRUE
T/F Secure sign-in increases security on your computer by forcing you to press Ctrl+Alt+Delete before signing in.
TRUE
T/F With fast user switching, only one user can be actively using the computer at a time
TRUE
A system to tunnel IPv6 addressed packets over an IPv4 network, even if NAT is used on the IPv4 network.
Teredo
Storage Space
The Microsoft software-based disk pooling technology that allows for different levels of resiliency to disk failure and provides virtualized volume storage within the disk pool.
(True Or False) A roaming profile is located on a network server.
True
(True Or False) After you set a PIN for a domain account on your laptop, that PIN can be used only on your laptop.
True
(True Or False) NTFS stores files and folders in a way that looks very similar to the FAT file system.
True
(True Or False) Secure sign-in increases security on your computer by forcing you to press Ctrl+Alt+Delete before signing in.
True
(True Or False) The choice of file system can limit the total amount of data stored in a partition or volume.
True
Data Execution Prevention (DEP) is a processor feature in Windows 10 that monitors processes to ensure that they do not access unauthorized memory spaces.
True
Local printing requires that a printer be connected directly to a Windows 10 computer by using a cable?
True
T/F A company commonly sets up only one production Office 365 tenant account, and adds users to that account.
True
T/F Both Hyper-V on Windows Server and Client Hyper-V on Windows 10 offer the same core functionality that allows you to run virtual machines.
True
T/F Client Hyper-V can use either VHD or VHDX virtual hard disks
True
T/F If a Windows 10 computer has multiple network interfaces active, each can be assigned a different network location, each with a different firewall settings based on their assigned network location.
True
T/F The option to manage printers in Settings is new for Windows 10?
True
T/F The simplest automated deployment method is to create a batch file that does a silent install of the application.
True
T/F When deploying Apps with Microsoft Intune, required installs can have a deadline for installation defined.
True
T/F Windows 10 includes several interfaces that make it easier for developers to create clients, services, protocols, and network drivers?
True
All Internet Exploer zones can be configured to run in Protected Mode. Protected Mode works in conjunction with ________________ to prevent malware from installing through Internet Explorer.
UAC
A feature in Windows 10 that elevates user privileges only when required.
UAC - User Account Control
The name that uniquely identifies a user within an identity directory.
UPN
The most recent iteration of Windows Store apps is _________________________ also known as Universal apps.
Universal Windows Platform Apps
A standard user account derives its privileges from being a member of the local________________group.
Users
Automatic sign-in is configured on the __________________ tab of the User Accounts applet.
Users
A system used to resolve computer NetBIOS names to IP address.
WINS
Anti-malware software included with Windows 10.
Windows Defender
Currently, administrators are more likely to create new scripts in ________________________than to create batch files and use reg.exe
Windows PowerShell
The newest application environment that is designed to be cross platform with phones, tablets, and desktop computers
Windows Store Apps
A system in Windows that allows 32-bit Windows apps to run on a 64-bit operating system
Windows on Windows 64 (WOW64)
Which utility is used to browse and manage the records of system events and messages stored in system event logs? a. Event Viewer b. shared folders c. device managers d. WMI Control
a. Event Viewer
File Explorer contains ribbon tabs that can be used for various functions. Which ribbon tab provides options to open a new file explorer window, command prompt, or Windows PowerShell prompt that is focused on the current folder? a. File b. Home c. Share d. View
a. File
Which of the following is NOT an Intune policy category? a. Firewall policies b. Configuration Policies c. Compliance Policies d. Corporate Device Enrollment Policies
a. Firewall policies
The local security policy is part of a larger Windows management system known as which of the following? a. Group Policy b. Local Policy c. Network Policy d. Domain Policy
a. Group Policy
The two most common mechanisms for sharing an IP address are a router or which of the following? a. ICS b. DSL c. PPPoE d. IPsec
a. ICS
A new interface for managing printers in Windows 10 is known as which of the following? a. Printers and Scanners b. Connected devices c. Print Management snap-in d. Devices and Printers
a. Printers & Scanners
Each time a user logs on locally, which database is used to verify sign-in credentials? a. SAM b. SSID c. SID d. NID
a. SAM - Security Account Manager
In order to stop the automatic sign-in from occurring, which key should be held down during the boot process? a. Shift b. Ctrl c. Alt d. Esc
a. Shift
Which of the following allows you to begin using an application faster after printing by storing the print job as a file and sending the print job to the printer as a background process? a. Spooling b. Staging c. XPS d. PCL
a. Spooling
What is the format for user names used by Office 365 apps? a. UPN b. DNS c. UNC d. LDAP
a. UPN
Which of the following is NOT a desktop OS supported by Intune with an Intune client installed? a. Windows 8.1 RT b. Windows 10 Pro c. Windows 7 Ultimate d. Windows Vista Business
a. Windows RT 8.1
Which of the following terms is used to describe a virtualized environment that hosts Win32 apps on the 64-bit version of Windows 10? a. Windows on Windows 64 (WOW64) b. Client Hyper-V c. App-V d. Win64
a. Windows on WIndows 64 (WOW64)
Which of the following is NOT a benefit of using VHDX instead of VHD format virtual disks? a. better backward compatibility b. better resilience to corrution c. improved performance d. automatic trimming
a. better backward compatibility
What feature is supported in Client Hyper-V that is not supported in the server version? a. hibernate b. checkpoints c. replica d. live migration
a. hibernate
Which component of the Hyper-V architecture controls all communication with the physical hardware on the computer? a. hypervisor b. child partition c. Integration Services d. Parent partition
a. hypervisor
Windows 10 includes search functionality that can be used to find files and folders. Which of the following is used to increase the efficiency of searching in Windows 10? a. indexing b. profiling c. viewing d. context searching
a. indexing
What type of bottleneck occurs when the applications you are running require more memory than is physically available in the computer? a. memory b. disk c. network d. processor
a. memory
Which of the following is responsible for enabling communications between Windows 10 and the network device in your computer? a. network driver b. kernel c. socket d. network protocol
a. network driver
After you install Client Hyper-V, what must you do before you can begin using it? a. reboot the computer b. install the Hyper-V driver package c. format a disk to store virtual machines d. update the Windows OS
a. reboot the computer
You have two processors on a computer running Client Hyper-V. You have two virtual machines running VM1 and VM2. You want to be sure VM1 is allocated twice as much processing power as VM2. What control setting should you configure? a. Relative weight b. Virtual machine reserve c. Virtual machine limit d. Percent of total system resources
a. relative weight
What Windows 10 feature is a user- specific data protection mechanism that protects local resources by allowing user files to be backed up to an external hard drive or a network location? a. relog b. schlog c. tsklog d. brklog
a. relog
Which profile is stored in a network location rather than on the local hard drive? a. roaming b. public c. mandatory d. default
a. roaming
Which of the following is NOT a typical scenario for using Client Hyper-V? a. to make use of old workstations with few resources b. testing updates to the OS c. to provide app compatibility with older apps d. to run an alternate operating system
a. to make use of old workstations with few resources
Each Microsoft account is allocated how much storage that can be used for file storage in OneDrive? a. 1 GB b. 5 GB c. 7 GB d. 10 GB
b. 5GB
User accounts that are enrolled to be managed by Microsoft Intune must be linked to which of the following? a. a local AD b. Azure AD c. A SAM account d. A DNS record
b. Azure AD
Which of the following is an automated mechanism used to assign IP addresses, subnet masks, default gateways, DNS servers, WINS servers, and other IP configuration information to network devices? a. IPX b. DHCP c. AIX d. X.25
b. DHCP (Dynamic Host Configuration Protocol)
Which of the following is a correct statement about Generation 1 and Generation 2 virtual machines? a. Generation 1 virtual machines can boot to a SCSI virtual disk; Generation 2 virtual machines can only boot to IDE virtual disks. b. Generation 1 virtual machines use BIOS-based firmware; Generation 2 virtual machine use UEFI-based firmware c. Generation 1 virtual machines support secure boot; Generation 2 virtual machines do not support secure boot d. Generation 1 virtual machines support USB disks; Generation 2 virtual machines support floppy disks
b. Generation 1 virtual machines use BIOS-based firmware; Generation 2 virtual machine use UEFI-based firmware
Selecting a counter to display will display information about that counter's collected data as a chart type. Which chart type displays the current value of each performance counter in decimal format? a. Line b. Histogram bar c. Report d. Vertical bar
b. Histogram bar
Account policies setting are located in which of the following? a. NAP b. local security policy c. EFS security policy d. remote policy
b. Local security policy
Intune can distribute third-party updates in which of the following formats? a. COM b. MSP c. XML d. BIN
b. MSP
Members of which group are able to monitor performance counters on the computer, but cannot access performance logs? a. Event log readers b. Performance Monitor Users c. Performance Log Users d. Guests
b. Performance Monitor Users
Which tool allows a user to connect to the active registry database and make changes that are effective immediately? a. EDITREG.EXE b. REGEDIT.EXE c. REGISTER.EXE d. CHGREG.EXE
b. REGEDIT.EXE
Which protocol is included with Windows 10 for Network communication? a. IPX b. TCP/IP c. NetBEUI d. AppleTalk
b. TCP/IP
Which part of the motherboard in your computer is used to store encryption keys and certificates? a. NTFS b. TPM c. EFS d. NAP
b. TPM - Trusted Platform Module
Which of the following is a default Intune user group. a. Administrator Users b. Ungrouped Users c. Standard Useres d. Power Users
b. Ungrouped Users
Which of the following is NOT an operating system supported by Microsft Intune as a mobile device? a. Windows 8.1 RT b. Windows 7 c. Mac OS X 10.9 d. Android 4.0
b. Windows 7
Instead of logging performance counters to disk, you can configure which of the following to occur? a. messages b. alerts c. tasks d. archives
b. alerts
What do applications use to request services from the application environment subsystem? a. .NET Framework b. Application Programming Interfaces (API) c. Kernel services d. Hardware services
b. application programming interfaces (API)
Which distribution method delivers the critical components of an application first and allows the users to be using the application before installation is complete? a. sideloading b. Click-to-Run c. downloading d. RED.EXE
b. click-to-run
What type of virtual network should you create if your virtual machine should be able to communicate with the Internet? a. Internal b. external c. VPN d. private
b. external
The registry is divided into sections and levels of data. Multiple sections exist to organize data by purpose. What are these individual sections called? a. keys b. hives c. branches d. nests
b. hives
What happens if an APN certificate expires? a. the managed device is erased b. iOS device management will fail c. the administrator is warned and given 1 month grace period d. the device is locked until the Apple ID password is entered
b. iOS device management will fail
In Windows 10, which of the following is updated each time a file is changed to ensure that search results are current? a. search box b. index c. context d. file
b. index
Where in the Hyper-V architecture do device drivers reside? a. hypervisor b. parent partition c. child partition d. hardware
b. parent partition
Which rule condition identifies software by file location? a. publisher b. path c. file hash d. certificate
b. path
Which of the following is used to protect your computer from malware that may attempt to steal your password? a. Fast user switching b. Secure sign-in c. Windows Welcome d. Manual sign-in
b. secure sign-in
Each Win32 application runs in its own virtual memory space and is executed by the processor in which mode? a. DOS b. user c. kernel d. Win32
b. user
A NTFS partition has disk quotas enabled. You would like to run a weekly report that summarizes how much space each user is consuming. Which of the following utilities allows you to review quota details from the command line? A) get-diskquota B) diskpart C) fsutil D) convert E) dsquota
c) fsutil
Windows 10 introduces a newer version of Windows Backup. What did Microsoft decide to call this newer version? a. Windows Backup 10 b. Microsoft Backup for Windows 10 c. Backup and Restore (Windows 7) d. File History
c. Backup and Restore (Windows 7)
To address the risks to data stored on computers and laptops, which encryption technology is available in Windows 10? a. NAP b. Dual Locked Hard Drive c. BitLocker Drive Encryption d. TPM
c. BitLocker Drive Encryption
What Windows 10 allows you to centralize the administration of printers for remote locations but still keep WAN link utiliation low because the print jobs stay local? a. Windows Printing b. Windows Connectivity c. Branch Office Direct Printing d. Windows Remote Office
c. Branch Office Printing
Which of the following protocols is used for resolving host names to IP address? a. IPv6 b. IPv4 c. DNS d. TCP/IP
c. DNS
Data Collector Sets organize multiple counters into a single unit. Which type of data can a Data Collector Set monitor to track when system event occur? a. Configuration b. Performance counters c. Event Trace d. Bottleneck trace
c. Event Trace
The Guest account derives all of its privileges from being a member of the Guests groups and which other group? a. User b. Domain c. Everyone d. Initial
c. Everyone
You are running a virtual machine that must boot through the network adapter and provide the best networking performance. Which type of virtual machine and virtual network adapter should you choose? a. Generation 1, synthetic b. Generation 1, emulated c. Generation 2, synthetic d. Generation 2, emulated
c. Generation 2, synthetic
A more manageable way to deploy .msi-based application in smaller environments would be to use which of the following? a. a batch file b. msiexec.exe utility c. Group Policy d. System Center configuration manager
c. Group Policy
What Windows 10 feature simplifies the configuration of peer-to-peer networks by removing the need to synchronize users and passwords on each computer? a. Personal User Password b. Pass-through authentication c. HomeGroup d. Game control
c. HomeGroup
What is the name of the could-based storage that is automatically included for free when a Microsoft account is created? a. Windows Store b. Microsoft Cloud c. OneDrive d. WindowsDrive
c. OneDrive
Members of which of the following groups are able to monitor performance counters and access performance logs on the computer? a. Event Log Readers b. IIS_IUSRS c. Performance Log Users d. Guests
c. Performance log users
What type of software is silently installed on your computer, monitors your behavior, and performs actions based on you behavior? a. Adware b. Worm c. Spyware d. Virus
c. Spyware
Which Control Panel applet is considered a simplified interface for user management? a. Privileges b. Permissions c. User Accounts d. Accounts
c. User accounts
Which of the following are required for individuals to log on to Windows 10 and uses resources on the computer? a. Public Keys b. IP address c. User accounts d. Digital certificates
c. User accounts
Which Windows 10 feature provides an automated diagnosis and repair of boot problems plus a centralized platform for advanced recovery tool? a. Windows Preinstallation Environment (Windows PE) b. System Reset c. Windows Recovery Environment (WinRE) d. Recovery Drive
c. Windows Recovery Environment (WinRE)
You can modify the locations included in a library, but the locations must be indexed by which of the following? a. File Explorer b. Libraries c. Windows Search d. Documents
c. Windows Search
Which policy allows you to configure an account to be temporarily disabled after a number of incorrect log-on attempts? a. domain b. group c. account lockout d. password
c. account lockout
Which of the following is a default Intune device group? a. All desktop computers b. Windows Devices c. All mobile devices d. Non- Windows Devices
c. all mobile devices
In addition to defining which locations are indexed, what else are you able to configure to be indexed by Windows 10? a. libraries b. folders c. file types d. metadata
c. files types
Data sent to which of the following returns to the computer that sent it and does not appear on the actual network? a. multicast address b. class D address c. loopback address d. MAC address
c. loopback address
Running fewer applications at once is a way to resolve which type of bottleneck? a. disk b. network c. memory d. processor
c. memory
What is the default format for an Office 365 tenant account? a. nickname.microsoftazure.com b. nickname.yourdomain.com c. nickname.onmicorsoft.com d. nickname.office365.com
c. nickname.onmicrosoft.com
Which utility can be used by a user with administrative rights in order to stage a driver manually? a. xpsprnt.exe b. pdriver.exe c. pnputil.exe d. pinstall.exe
c. pnputil
Which advanced audit policy setting tracts when tasks are performed that require a user rights assignment, such as changing the system time? a. object access b. account management c. privilege use d. process tracking
c. privilege use
Rules for communication across a network that define how much data can be sent and the format of that data is known as which of the following? a. Network drives b. Network drivers c. Protocols d. clients and services
c. protocols
When applications or Windows 10 starts, they read their configuration information from which of the following? a. kernel b. system core c. registry d. application environment
c. registry
Which of the following are used to process log file data and display it in a meaningful way? a. Counters b. Data managers c. Reports d. Data Collector Sets
c. reports
Which of the following would prevent the Intune client to be installed on an OS? a. it's a 32-bit OS b. it's Windows Vista Enterprise c. the SMS client is installed d. the Windows Installer is version 3.2
c. the SMS client is installed
Which IP utility is used to display response times for every router on the path to the destination? a. ping b. route c. tracert d. arp
c. tracert
Running apps in which mode ensures that a poorly written app does not affect system stability? a. kernel b. environment c. user d. service
c. user
Which of the following simplifies folder and file sharing by controlling both NTFS permissions and share permissions at the same time? a. Advance sharing b. Single sharing c. Public sharing d. "Share with" method
d. "share with" method
Besides the .NET Framework 4.6, what other version of the .NET Framework does Windows 10 provide as a feature? a. .NET 2.0 b. .NET 4.8 c. .NET 2.5 d. .NET 3.5
d. .NET 3.5
Traditional WIn32 or .NET Framework apps are commonly packaged as which type of file? a. .xml b. .html c. .pdf d. .msi
d. .msi
If you configure a virtual machine with dynamic memory, what is the default minimum RAM that will be configured? a. 256 MB b. 1 GB c. None d. 512 MB
d. 512 MB
If Windows 10 is configured to use dynamic IP configuration and is unable to contact a DHCP server, the default action is to use which type of address? a. WINS b. NetBIOS c. IPv6 d. APIPA
d. APIPA
Which account is the most powerful local user account possible? a. Guest b. Initial c. Installation d. Administrator
d. Administrator
Your Client Hyper-V host has a single network adapter. What option should be enabled to allow your virtual machines to communicate with the external network while not disrupting host network communication? a. Enhanced session mode b. Generation 2 virtual machine c. Enable virtual LAN identification for management operating system d. Allow management operating system to share this network adapter.
d. Allow management operating system to share this network adapter.
Which of the following can be used to define which programs are allowed or disallowed in the system? a. Software restriction policies b. A network zone c. Local Policies d. AppLocker
d. AppLocker
Applications that are not designed for Windows 10 and that require administrative privileges do no work properly request elevated privileges, generating an error. You can eliminate this error by using which of the following? a. Administrative Privileges Toolkit b. Private Toolkit c. Secure Toolkit d. Application Compatibility Toolkit
d. Application Compatibility Toolkit
Which security process records the occurrence of specific operating system events in the Security log? a. Encrypting b. Hashing c. Filtering d. Auditing
d. Auditing
Which Windows 10 feature ensures that a second user can log on to a locked computer without logging off? a. Secure sign-in b. Window Welcome c. Automatic sign-in d. Fast user switching
d. Fast User switching
Which registry hive contains details about the current hardware profile in use? a. HKEY_CURRENT_USER b. HKEY_CLASSES_ROOT c. HKEY_LOCAL_MACHINE d. HKEY_CURRENT_CONFIG
d. HKEY_CURRENT_CONFIG
Which of the following is a threat to privacy and is sometimes installed when you visit a website? a. Windows Defender b. EFS c. Macro Script d. Spyware
d. Spyware
What Windows 10 feature captures a screenshot each time the user clicks on a screen item and saves the screen shots and users actions in a report that can be emailed or saved to a shared storage location? a. Steps Monitor b. Event Viewer c. File Recovery d. Steps Recovery
d. Steps Recovery
Which of the following is an updated version of TCP/IPv4 with a larger address space and additional features? a. LLTP b. LLTPRD c. AIX d. TCP/IPv6
d. TCP/IPv6
You want to install Client Hyper-V on your new Windows 10 computer. Of the available choices which version of Windows 10 must be installed? a. Any 32-bit edition b. Windows 10 Home c. Windows 10 Mobile d. Windows 10 Education
d. Windows 10 Education
The full Intune product is available through which of the following? a. from the Windows Features control panel b. free from the Microsoft Download site c. from the Windows Store d. as part of the EMS
d. as part of the EMS
What feature of Hyper-V virtual machines is very useful for testing because you can almost instantly reset a computer back to a previous state? a. backups b. clones c. exports d. checkpoints
d. checkpoints
Which of the following is NOT a possible state for a virtual machine. a. Starting b. Paused c. Saved d. Down
d. down
What type of encryption algorithm is one-way encryption, which means that it encrypts data, but the data cannot be decrypted? a. signing b. symmetric c. asymmetric d. hash
d. hash
Which service is NOT supported by the Intune client for desktop computers? a. software updates b. managing apps c. updating Windows Firewall settings d. issuing certificates
d. issuing certificates
Characteristics of a file such as a file name, creation data, and modified date are known as which of the following? a. index b. category c. service d. metadata
d. metadata
If you have obtained the .appx file for a Windows Store app, you can install the app from a source other than the Windows Store. What is this ability known as? a. distribution b. download c. Click-to-Run d. package management
d. package management
Which page description language is the oldest and best supported? a. PDF b. PCL c. XPS d. Postscript
d. postscript
Software Windows 10 uses to understand and use the features of a printer is known as which of the following? a. shared printer b. print server c. print firewall d. printer driver
d. printer driver
Which type of virtual network should you create if you want to completely isolate test environment for a virtual machine? a. internal b. external c. VPN d. private
d. private
Which of the following is the name assigned to the WAP to identify itself to clients? a. netID b. access code c. security key d. security set identifier
d. security set identifier
A discrete body of registry keys and values stored in files as part of the operating system.
hive
A command-line utility that can be used to display, change, add, and delete network configuration settings on a computer, including basic and advanced settings.
netsh
A command-line utility that can be used to view or debug that data returned from a DNS server in response to a DNS name resolution query.
nslookup