Enterprise Client Final

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

The OneDrive Recycle Bin is limited in capacity. What percentage of the storage limit purchased for OneDrive storage is the typical capacity of the OneDrive Recycle Bin? a. 5% b. 10% c. 15% d. 25%

10%

What is the default value for the "Maximum password age" setting in the Password Policy? a. 0 days b. 45 days c. 42 days d. 30 days

42 days

What is used to store permissions? a. User rights b. ACL c. UAC d. GPT

ACL

When accessing an object, which of the following lists each user that can access the object and what each user can do with the object? a. ACE b. UAC c. User rights d. ACL

ACL

Which of the following expands on the domain concept by linking domains in logical structures named trees, and multiple trees into forests? a. Active Directory b. WSU c. NAP d. Enterprise Directory

Active Directory

Which of the following is defined by IP subnets instead of physical locations? a. Active Directory DNS b. Active Directory controller c. Active Directory OU d. Active Directory site

Active Directory site

How do you share a folder so that it is invisible to users browsing the network? a. Right click the shared folder, and select hide from browsing option. b. Open the Share folder in the Control Panel to specify which folders can be browsed over the network. c. Open Computer Management console, select the shared folder under Share Management, and select hide from browsing option. d. Add a dollar sign ($) to the share name.

Add a dollar sign to the share name.

Which of the following can be used to define which programs are allowed or disallowed in the system? a. AppLocker b. Local policies c. A network zone d. A password policy

AppLocker

Applications that are not designed for Windows 10 and that require administrative privileges do not properly request elevated privileges, generating an error. You can eliminate this error by using which of the following? a. Private Toolkit b. Secure Toolkit c. Application Compatibility Toolkit d. Administrative Privileges Toolkit

Application Compatibility Toolkit

Which security process records the occurrence of specific operating system events in the Security log? a. Hashing b. Encrypting c. Filtering d. Auditing

Auditing

Which of the following is the process of verifying the identity of the person operating the computer? a. Rights manipulation b. Authorization c. Authentication d. Auditing

Authentication

Which of the following is the process of granting an authenticated user a specific degree of access to specific computer or data resources? a. Rights manipulation b. Authentication c. Authorization d. Auditing

Authorization

Windows 10 introduces a newer version of Windows Backup. What did Microsoft decide to call this newer version? a. Microsoft Backup for Windows 10 b. Windows Backup 10 c. Backup and Restore (Windows 7) d. File History

Backup and Restore (Windows 7)

To address the risks to data stored on computers and laptops, which encryption technology is available in Windows 10? a. TPM b. Dual Locked Hard Drive c. BitLocker Drive Encryption d. NAP

BitLocker Drive Encryption

In which technology are files stored in a file share in a central location, but are cached at the remote site to make it faster to open the files? a. Windows Server Update Services b. Distributed File System c. User Experience Virtualization d. BranchCache

BranchCache

This share permission allows the user to see and make changes to files over a network. a. Write b. Full Control c. Read d. Change

Change

Which of the following permissions is the minimum that allows you to add files to a Shared folder? a. Modify b. Full Control c. Change d. Read

Change

Which USMT file is generated by running ScanState.exe with the /genconfig option? a. Config.xml b. MigUser.xml c. MigSys.xml d. MigApp.xml

Config.xml

Which processor feature monitors processes to ensure that they do not access unauthorized memory spaces, which is done by various types of malware, such as viruses, to take control of systems? a. LOGO b. XPS c. DEP d. WEI

DEP

Which of the following appears to be a single, large file structure, but can really be composed of shared folders on multiple servers? a. DNS b. DFS replication c. BranchCache d. DFS namespace

DFS namespace

During the installation process for a new device, what are used in order to describe how the installation should be performed? a. Device setup classes b. hardware IDs c. HDIDs d. Device identification strings

Device setup classes

What is a collection of computers that all utilize a central directory service for authentication and authorization and is usually associated with Active Directory? a. Group b. Workgroup c. Domain d. Homegroup

Domain

Which Active Directory component is responsible for authenticating users when they log on to a workstation? a. Forests b. Domain controllers c. OUs d. Trees

Domain controllers

Data Collector Sets organize multiple counters into a single unit. Which type of data can a Data Collector Set monitor to track when system events occur. a. Event Trace b. Performance counters c. Configuration d. Bottleneck trace

Event Trace

Which utility is used to browse and manage the records of system events and messages stored in system event logs? a. Device Manager b. WMI Control c. Event Viewer d. Shared Folders

Event Viewer

Active Directory is a single monolithic database with all of the information about the network. T/F

False

In Windows 10, advanced audit policies can only be edited at a command-line. T/F

False

Like Resource Monitor, Performance Monitor allows you to select the counters you wish to view. T/F

False

Network bottlenecks are more common for computers than servers running Windows 10.

False

The Account Policies in the Local Security Policy can be used to control domain accounts. T/F

False

The Services tab in Task Manager shows all user applications running on the computer. T/F

False

When accessing a resource over the network, the least restrictive permission of share and NTFS permissions applies. T/F

False

Windows 10 is a desktop operating system and is able to function as either a member server or a domain controller. T/F

False

This share permission allows the user to configure share permissions for other users. a. Change b. Read c. Full Control d. Write

Full Control

The local security policy is part of a larger Windows management system known as which of the following? a. Group Policy b. Domain Policy c. Network Policy d. Local Policy

Group Policy

Which of the following can be pushed down to a computer and can be changed by the user? a. Group Domain object b. Group Policy Preference c. Group Policy Object d. Group Policy Setting

Group Policy Preference

The Group Policy settings used by Windows 10 are contained in which of the following? a. Domain Policy object b. Group object c. Controller object d. Group Policy object

Group Policy object

What is the most specific device identification string? a. Driver ID b. GenID c. Hardware ID d. HDID

Hardware ID

To enable centralized management of BitLocker, you need to install which of the following on each computer? a. WSUS node b. MBAM agent c. UE-V profile d. WDS client

MBAM agent

This NTFS permission allows the user to delete folders and includes all permisisons in Write and Read & Execute permission. a. Write b. Full Control c. Read d. Modify

Modify

Which type of permissions are considered the most basic level of data security in Windows 10? a. EFS b. FAT c. NAP d. NTFS

NTFS

You have a PC named PC-Z that is on the same network as PC-A. You have a c:\Data folder that is shared as Data from PC-Z. You log on over the network from PC-A to PC-Z and access the \\PC-Z\Data share. Which permissions apply? a. Share permissions only b. NTFS permissions combined with Share Permissions as least restrictive c. NTFS permissions combined with Share Permissions as most restrictive d. NTFS permissions only

NTFS permissions combined with Share Permissions as most restrictive

You have a PC named PC1. You have a c:\Data folder that is shared as Data. You log on directly to PC1 and access the c:\Data folder using File Explorer. Which permissions apply? a. Share permissions only b. NTFS permissions combined with Share Permissions as least restrictive c. NTFS permissions only d. NTFS permissions combined with Share Permissions as most restrictive

NTFS permissions only

Each domain can be subdivided into which of the following, that allow you to organize the objects in a domain? a. trees b. organizational units (OUs) c. domain controllers d. forests

OUs

What utility allows you to visually display the data generated by counters, and allows you to select the individual counters you want to view? a. Disk Monitor b. Performance Monitor c. Network Monitor d. Resource Monitor

Performance Monitor

Which of the following enables the user to manage, configure, or perform certain tasks on an object? a. Authentication b. Permissions c. Authorization d. User rights

Permissions

If File History or Backup and Restore (Windows 7), or both, had been configured to protect user data, that data can be recovered using which feature? a. Data Collector Set b. Previous Versions c. File Retriever d. System Restore

Previous Versions

This NTFS permission allows the user to view files, folders and subfolders along with viewing ownership, permissions and attributes. a. Modify b. Full Control c. Write d. Read

Read

Which NTFS permission allows you to navigate through restricted folders to reach other files and folders? a. Write b. Modify c. Read & Execute d. Full Control

Read & Execute

Which feature enables users to access computers from remote locations with no interaction required from the remote site? a. Microsoft Management Console b. Windows Remote Management c. Windows Remote Assistance d. Remote Desktop Connection

Remote Desktop Connection

Selecting a counter to display will display information about that counter's collected data as a chart type. Which chart type displays the current value of each performance counter in decimal format? a. Report b. Histogram bar c. Line d. Vertical bar

Report

Which of the following are used to process log file data and display it in a meaningful way? a. Counters b. Data Collector Sets c. Reports d. Data Managers

Reports

What type of software is silently installed on your computer, monitors your behavior, and performs actions based on your behavior? a. Worm b. Spyware c. Adware d. Virus

Spyware

What Windows 10 feature captures a screenshot each time the user clicks on a screen item and saves the screenshots and users actions in a report that can be emailed or saved to a shared storage location? a. Event Viewer b. File Recovery c. Steps Monitor d. Steps Recorder

Steps Recorder

Which of the following tools can be used to deploy operating systems to the point where you do not need to physically touch the computer? a. System Center Configuration Manager b. Windows System Image Manager (Windows SIM) c. Windows Imaging and Configuration Designer (Windows ICD) d. Deployment Imaging Servicing and Management (DISM)

System Center Configuration Manager

Which part of the motherboard in your computer is used to store encryption keys and certificates? a. NAP b. TPM c. EFS d. NTFS

TPM

Which utility can be used to provide an overview of the current state of a computer? a. Data Collector Set b. Task Manager c. Performance Monitor d. Data Manager

Task Manager

Active Directory uses the same naming convention for domains and objects contained in these domains as DNS. T/F

True

Data Execution Prevention (DEP) is a processor feature in Windows 10 that monitors processes to ensure that they do not access unauthorized memory spaces. T/F

True

Domain controllers download Group Policy settings every five minutes. T/F

True

Every object in Windows 10 has audit events related to it. T/F

True

Mapping a network drive that points to a shared folder creates an alias to the network drive that makes it easier to access. T/F

True

NTFS permissions can be easily circumvented when you have physical access to a computer. T/F

True

Public folder sharing is a way to share folders across the network without configuring permissions for individual folders. T/F

True

T/F Within a site, Active Directory replication is uncontrolled.

True

When accessing a resource over the network, both share and NTFS permissions are needed.

True

When you establish a baseline, it is important to ensure that you are measuring the normal state of the performance indicators. T/F

True

What utility can be used to migrate user settings, documents, and application configuration settings from the previous operating system to Windows 10? a. Windows System Image Manager (Windows SIM) b. Deployment Imaging Servicing and Management (DISM) c. Windows Imaging and Configuration Designer (Windows ICD) d. User State Migration Tool (USMT)

USMT

Which of the following enables users to perform specific operating system tasks such as shut down the system or perform backups? a. Authorization b. User rights c. Auditing d. Authentication

User rights

A server role included with Windows Server 2008 and newer that can be used to deploy operating system images over the network is known as which of the following? a. WSUS b. PXE c. WDS d. USMT

WDS

Which of the following contacts Microsoft Update and downloads updates rather than each client computer downloading updates? a. PXE b. USMT c. WSUS d. WDS

WSUS

Which Windows 10 feature provides an automated diagnosis and repair of boot problems plus a centralized platform for advanced recovery tool? a. System Reset b. Windows Recovery Environment (WinRE) c. Windows Preinstallation Environment (Windows PE) d. Recovery Drive

WinRE

What is a collection of computers that are all peers? a. Workgroup b. Domain c. Objects d. Group

Workgroup

Which of the following do you have to create the same user account for on each computer that a user needs to access? a. NFS b. Workgroup c. Domain d. Group

Workgroup

This NTFS permission allows the user to create new files and folders, change folder attributes and view ownership and permissions. a. Read b. Full Control c. Write d. Modify

Write

Which policy allows you to configure an account to be temporarily disabled after a number of incorrect log-on attempts? a. account lockout b. password c. group d. domain

account lockout

Instead of logging performance counters to disk, you can configure which of the following to occur? a. tasks b. messages c. alerts d. archives

alerts

In Active Directory, which partition holds general information about the Active Directory forest? a. domain b. application c. schema d. configuration

configuration

When a new device is installed into a Windows 10 computer, the operating system uses a device setup class and which of the following in order to properly install the new device? a. device identification string b. device controller c. service string d. identification service

device identification string

Which Active Directory component has a central security database that is used by all computers that are members of it?

domain

What type of encryption algorithm is one-way encryption, which means that it encrypts data, but the data cannot be decrypted? a. signing b. asymmetric c. hash d. symmetric

hash

Account policies settings are located in which of the following? a. local security policy b. NAP c. EFS security policy d. remote policy

local security policy

Newer Windows applications use which of the following to describe the structure of an application? a. record b. manifest c. log d. hash

manifest

Active Directory information can be changed on any domain controller and those changes will be replicated to other domain controllers. What is this type of replication called? a. anycast b. multimaster c. multicast d. unicast

multimaster

Which policy controls password characteristics for local user accounts? a. domain b. account lockout c. user control d. password

password

Which advanced audit policy setting tracks when tasks are performed that require a user rights assignment, such as changing the system time? a. object access b. privilege use c. account management d. process tracking

privilege use

What Windows 10 feature is a user-specific data protection mechanism that protects local resources by allowing user files to be backed up to an external hard drive or a network location? a. brklog b. relog c. tsklog d. schlog

relog

Which term best describes a snapshot of operating system and program files at a specific point in time that can be restored to roll back to a point in time when the operating system or applications were stable? a. restore point b. system restore c. steps recorder d. recovery point

restore point

To make Active Directory more manageable, it is divided into the domain partition, configuration partition, and what other partition? a. forest b. controller c. OU d. schema

schema


Kaugnay na mga set ng pag-aaral

Oxytocin and Emotion Recognition

View Set

HESI EAQs - Immunologic System and Infectious Diseases

View Set

Turning Points U.S. History Chapter 5

View Set

acute and late site-specific effects of radiation therapy

View Set

5.1 Write Equations in Slope-intercept form

View Set

RHIT Exam Prep 2017 Domain 1: Data Content, Structure, and Information Governance, RHIT Exam Prep 2018 Domain 2: Access, Disclosure, Privacy, and Security, RHIT Exam Prep 2018 Domain 3: Data Analytics and Use, Domain 4: Revenue Cycle Management, Doma...

View Set