Enterprise Client Final
The OneDrive Recycle Bin is limited in capacity. What percentage of the storage limit purchased for OneDrive storage is the typical capacity of the OneDrive Recycle Bin? a. 5% b. 10% c. 15% d. 25%
10%
What is the default value for the "Maximum password age" setting in the Password Policy? a. 0 days b. 45 days c. 42 days d. 30 days
42 days
What is used to store permissions? a. User rights b. ACL c. UAC d. GPT
ACL
When accessing an object, which of the following lists each user that can access the object and what each user can do with the object? a. ACE b. UAC c. User rights d. ACL
ACL
Which of the following expands on the domain concept by linking domains in logical structures named trees, and multiple trees into forests? a. Active Directory b. WSU c. NAP d. Enterprise Directory
Active Directory
Which of the following is defined by IP subnets instead of physical locations? a. Active Directory DNS b. Active Directory controller c. Active Directory OU d. Active Directory site
Active Directory site
How do you share a folder so that it is invisible to users browsing the network? a. Right click the shared folder, and select hide from browsing option. b. Open the Share folder in the Control Panel to specify which folders can be browsed over the network. c. Open Computer Management console, select the shared folder under Share Management, and select hide from browsing option. d. Add a dollar sign ($) to the share name.
Add a dollar sign to the share name.
Which of the following can be used to define which programs are allowed or disallowed in the system? a. AppLocker b. Local policies c. A network zone d. A password policy
AppLocker
Applications that are not designed for Windows 10 and that require administrative privileges do not properly request elevated privileges, generating an error. You can eliminate this error by using which of the following? a. Private Toolkit b. Secure Toolkit c. Application Compatibility Toolkit d. Administrative Privileges Toolkit
Application Compatibility Toolkit
Which security process records the occurrence of specific operating system events in the Security log? a. Hashing b. Encrypting c. Filtering d. Auditing
Auditing
Which of the following is the process of verifying the identity of the person operating the computer? a. Rights manipulation b. Authorization c. Authentication d. Auditing
Authentication
Which of the following is the process of granting an authenticated user a specific degree of access to specific computer or data resources? a. Rights manipulation b. Authentication c. Authorization d. Auditing
Authorization
Windows 10 introduces a newer version of Windows Backup. What did Microsoft decide to call this newer version? a. Microsoft Backup for Windows 10 b. Windows Backup 10 c. Backup and Restore (Windows 7) d. File History
Backup and Restore (Windows 7)
To address the risks to data stored on computers and laptops, which encryption technology is available in Windows 10? a. TPM b. Dual Locked Hard Drive c. BitLocker Drive Encryption d. NAP
BitLocker Drive Encryption
In which technology are files stored in a file share in a central location, but are cached at the remote site to make it faster to open the files? a. Windows Server Update Services b. Distributed File System c. User Experience Virtualization d. BranchCache
BranchCache
This share permission allows the user to see and make changes to files over a network. a. Write b. Full Control c. Read d. Change
Change
Which of the following permissions is the minimum that allows you to add files to a Shared folder? a. Modify b. Full Control c. Change d. Read
Change
Which USMT file is generated by running ScanState.exe with the /genconfig option? a. Config.xml b. MigUser.xml c. MigSys.xml d. MigApp.xml
Config.xml
Which processor feature monitors processes to ensure that they do not access unauthorized memory spaces, which is done by various types of malware, such as viruses, to take control of systems? a. LOGO b. XPS c. DEP d. WEI
DEP
Which of the following appears to be a single, large file structure, but can really be composed of shared folders on multiple servers? a. DNS b. DFS replication c. BranchCache d. DFS namespace
DFS namespace
During the installation process for a new device, what are used in order to describe how the installation should be performed? a. Device setup classes b. hardware IDs c. HDIDs d. Device identification strings
Device setup classes
What is a collection of computers that all utilize a central directory service for authentication and authorization and is usually associated with Active Directory? a. Group b. Workgroup c. Domain d. Homegroup
Domain
Which Active Directory component is responsible for authenticating users when they log on to a workstation? a. Forests b. Domain controllers c. OUs d. Trees
Domain controllers
Data Collector Sets organize multiple counters into a single unit. Which type of data can a Data Collector Set monitor to track when system events occur. a. Event Trace b. Performance counters c. Configuration d. Bottleneck trace
Event Trace
Which utility is used to browse and manage the records of system events and messages stored in system event logs? a. Device Manager b. WMI Control c. Event Viewer d. Shared Folders
Event Viewer
Active Directory is a single monolithic database with all of the information about the network. T/F
False
In Windows 10, advanced audit policies can only be edited at a command-line. T/F
False
Like Resource Monitor, Performance Monitor allows you to select the counters you wish to view. T/F
False
Network bottlenecks are more common for computers than servers running Windows 10.
False
The Account Policies in the Local Security Policy can be used to control domain accounts. T/F
False
The Services tab in Task Manager shows all user applications running on the computer. T/F
False
When accessing a resource over the network, the least restrictive permission of share and NTFS permissions applies. T/F
False
Windows 10 is a desktop operating system and is able to function as either a member server or a domain controller. T/F
False
This share permission allows the user to configure share permissions for other users. a. Change b. Read c. Full Control d. Write
Full Control
The local security policy is part of a larger Windows management system known as which of the following? a. Group Policy b. Domain Policy c. Network Policy d. Local Policy
Group Policy
Which of the following can be pushed down to a computer and can be changed by the user? a. Group Domain object b. Group Policy Preference c. Group Policy Object d. Group Policy Setting
Group Policy Preference
The Group Policy settings used by Windows 10 are contained in which of the following? a. Domain Policy object b. Group object c. Controller object d. Group Policy object
Group Policy object
What is the most specific device identification string? a. Driver ID b. GenID c. Hardware ID d. HDID
Hardware ID
To enable centralized management of BitLocker, you need to install which of the following on each computer? a. WSUS node b. MBAM agent c. UE-V profile d. WDS client
MBAM agent
This NTFS permission allows the user to delete folders and includes all permisisons in Write and Read & Execute permission. a. Write b. Full Control c. Read d. Modify
Modify
Which type of permissions are considered the most basic level of data security in Windows 10? a. EFS b. FAT c. NAP d. NTFS
NTFS
You have a PC named PC-Z that is on the same network as PC-A. You have a c:\Data folder that is shared as Data from PC-Z. You log on over the network from PC-A to PC-Z and access the \\PC-Z\Data share. Which permissions apply? a. Share permissions only b. NTFS permissions combined with Share Permissions as least restrictive c. NTFS permissions combined with Share Permissions as most restrictive d. NTFS permissions only
NTFS permissions combined with Share Permissions as most restrictive
You have a PC named PC1. You have a c:\Data folder that is shared as Data. You log on directly to PC1 and access the c:\Data folder using File Explorer. Which permissions apply? a. Share permissions only b. NTFS permissions combined with Share Permissions as least restrictive c. NTFS permissions only d. NTFS permissions combined with Share Permissions as most restrictive
NTFS permissions only
Each domain can be subdivided into which of the following, that allow you to organize the objects in a domain? a. trees b. organizational units (OUs) c. domain controllers d. forests
OUs
What utility allows you to visually display the data generated by counters, and allows you to select the individual counters you want to view? a. Disk Monitor b. Performance Monitor c. Network Monitor d. Resource Monitor
Performance Monitor
Which of the following enables the user to manage, configure, or perform certain tasks on an object? a. Authentication b. Permissions c. Authorization d. User rights
Permissions
If File History or Backup and Restore (Windows 7), or both, had been configured to protect user data, that data can be recovered using which feature? a. Data Collector Set b. Previous Versions c. File Retriever d. System Restore
Previous Versions
This NTFS permission allows the user to view files, folders and subfolders along with viewing ownership, permissions and attributes. a. Modify b. Full Control c. Write d. Read
Read
Which NTFS permission allows you to navigate through restricted folders to reach other files and folders? a. Write b. Modify c. Read & Execute d. Full Control
Read & Execute
Which feature enables users to access computers from remote locations with no interaction required from the remote site? a. Microsoft Management Console b. Windows Remote Management c. Windows Remote Assistance d. Remote Desktop Connection
Remote Desktop Connection
Selecting a counter to display will display information about that counter's collected data as a chart type. Which chart type displays the current value of each performance counter in decimal format? a. Report b. Histogram bar c. Line d. Vertical bar
Report
Which of the following are used to process log file data and display it in a meaningful way? a. Counters b. Data Collector Sets c. Reports d. Data Managers
Reports
What type of software is silently installed on your computer, monitors your behavior, and performs actions based on your behavior? a. Worm b. Spyware c. Adware d. Virus
Spyware
What Windows 10 feature captures a screenshot each time the user clicks on a screen item and saves the screenshots and users actions in a report that can be emailed or saved to a shared storage location? a. Event Viewer b. File Recovery c. Steps Monitor d. Steps Recorder
Steps Recorder
Which of the following tools can be used to deploy operating systems to the point where you do not need to physically touch the computer? a. System Center Configuration Manager b. Windows System Image Manager (Windows SIM) c. Windows Imaging and Configuration Designer (Windows ICD) d. Deployment Imaging Servicing and Management (DISM)
System Center Configuration Manager
Which part of the motherboard in your computer is used to store encryption keys and certificates? a. NAP b. TPM c. EFS d. NTFS
TPM
Which utility can be used to provide an overview of the current state of a computer? a. Data Collector Set b. Task Manager c. Performance Monitor d. Data Manager
Task Manager
Active Directory uses the same naming convention for domains and objects contained in these domains as DNS. T/F
True
Data Execution Prevention (DEP) is a processor feature in Windows 10 that monitors processes to ensure that they do not access unauthorized memory spaces. T/F
True
Domain controllers download Group Policy settings every five minutes. T/F
True
Every object in Windows 10 has audit events related to it. T/F
True
Mapping a network drive that points to a shared folder creates an alias to the network drive that makes it easier to access. T/F
True
NTFS permissions can be easily circumvented when you have physical access to a computer. T/F
True
Public folder sharing is a way to share folders across the network without configuring permissions for individual folders. T/F
True
T/F Within a site, Active Directory replication is uncontrolled.
True
When accessing a resource over the network, both share and NTFS permissions are needed.
True
When you establish a baseline, it is important to ensure that you are measuring the normal state of the performance indicators. T/F
True
What utility can be used to migrate user settings, documents, and application configuration settings from the previous operating system to Windows 10? a. Windows System Image Manager (Windows SIM) b. Deployment Imaging Servicing and Management (DISM) c. Windows Imaging and Configuration Designer (Windows ICD) d. User State Migration Tool (USMT)
USMT
Which of the following enables users to perform specific operating system tasks such as shut down the system or perform backups? a. Authorization b. User rights c. Auditing d. Authentication
User rights
A server role included with Windows Server 2008 and newer that can be used to deploy operating system images over the network is known as which of the following? a. WSUS b. PXE c. WDS d. USMT
WDS
Which of the following contacts Microsoft Update and downloads updates rather than each client computer downloading updates? a. PXE b. USMT c. WSUS d. WDS
WSUS
Which Windows 10 feature provides an automated diagnosis and repair of boot problems plus a centralized platform for advanced recovery tool? a. System Reset b. Windows Recovery Environment (WinRE) c. Windows Preinstallation Environment (Windows PE) d. Recovery Drive
WinRE
What is a collection of computers that are all peers? a. Workgroup b. Domain c. Objects d. Group
Workgroup
Which of the following do you have to create the same user account for on each computer that a user needs to access? a. NFS b. Workgroup c. Domain d. Group
Workgroup
This NTFS permission allows the user to create new files and folders, change folder attributes and view ownership and permissions. a. Read b. Full Control c. Write d. Modify
Write
Which policy allows you to configure an account to be temporarily disabled after a number of incorrect log-on attempts? a. account lockout b. password c. group d. domain
account lockout
Instead of logging performance counters to disk, you can configure which of the following to occur? a. tasks b. messages c. alerts d. archives
alerts
In Active Directory, which partition holds general information about the Active Directory forest? a. domain b. application c. schema d. configuration
configuration
When a new device is installed into a Windows 10 computer, the operating system uses a device setup class and which of the following in order to properly install the new device? a. device identification string b. device controller c. service string d. identification service
device identification string
Which Active Directory component has a central security database that is used by all computers that are members of it?
domain
What type of encryption algorithm is one-way encryption, which means that it encrypts data, but the data cannot be decrypted? a. signing b. asymmetric c. hash d. symmetric
hash
Account policies settings are located in which of the following? a. local security policy b. NAP c. EFS security policy d. remote policy
local security policy
Newer Windows applications use which of the following to describe the structure of an application? a. record b. manifest c. log d. hash
manifest
Active Directory information can be changed on any domain controller and those changes will be replicated to other domain controllers. What is this type of replication called? a. anycast b. multimaster c. multicast d. unicast
multimaster
Which policy controls password characteristics for local user accounts? a. domain b. account lockout c. user control d. password
password
Which advanced audit policy setting tracks when tasks are performed that require a user rights assignment, such as changing the system time? a. object access b. privilege use c. account management d. process tracking
privilege use
What Windows 10 feature is a user-specific data protection mechanism that protects local resources by allowing user files to be backed up to an external hard drive or a network location? a. brklog b. relog c. tsklog d. schlog
relog
Which term best describes a snapshot of operating system and program files at a specific point in time that can be restored to roll back to a point in time when the operating system or applications were stable? a. restore point b. system restore c. steps recorder d. recovery point
restore point
To make Active Directory more manageable, it is divided into the domain partition, configuration partition, and what other partition? a. forest b. controller c. OU d. schema
schema