NOS-130 Ch 7-12 Exam Review

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Which of the following can be used to access ana pp installed on a different computer locally?

A virtual desktop

Ming is configuring security zones for Microsoft Edge browsers in her organization. Which of the following websites is best served by being added to the local intranet zone?

A website that need to be automatically authenticated using local workstation sign-in credentials.

Applications that are not designed for Windows 10 and that require administrative privileges do not properly request elevated privileges, generating an error. Which of the following can you use to eliminate this error?

Application Compatibility Toolkit

Applications that are not designed for Windows 10 and that require administrative privileges do not properly request elevated, generating an error. Which of the following can you use to eliminate this error?

Application Compatibility Toolkit

Which security process records the occurrence of specific operating system events in the Security log?

Auditing

Athena, a graphic designer, uses OneDrive to back up her work files across her home laptop and office laptop. One day, after completing her work in office, she backs up 5 GB of files to OneDrive. After she gets back home, she realizes that she forgot to send an email. The broadband network is down, so Athena tethers her laptop through her mobile to access her OneDrive, but did not intend for OneDrive to download these files. What option should Athena have enabled to prevent this from happening?

Automatically pause sync when this device is on a metered connection.

Which of the following can be used to create groups to organize users, but on the cloud?

Azure AD

Which of the following is a method for protecting data on removable storage, such as USB devices?

BitLocker ToGo

A multinational corporation owns offices in various locations. One of its offices has a slow WAN owing to its remote location. To speed up file access for users, the network administrator sets up an infrastructure where the file shares are stored in SERVER X in one location and are also stored on SERVER Y in the remote location. However, the files are not replicated in each server. Which of the following technologies is being used in the scenario?

BrandCache

EduTech, a learning company, develops a UWP app that replicates its online learning platform. Before distributing the app on the Microsoft Store, the company wants all its employees to install the app on their computers and experience it. How can the company deploy the app without uploading it to the Microsoft Store?

By distributing the APPX file of the app

How can a user access a Windows 2000 application on a Windows 10 computer without installing the app in the user's computer?

By using a virtual desktop

When file shares between two servers are cloned, which of the following synchronizes the data among the file shares?

DFS Namespaces

Which Active Directory component is responsible for authentication users when they sign in to a workstation?

Domain Controllers

The process of taking data and rendering it unreadable is known as which of the following?

Encryption

Kesha spends time analyzing datasets that are larger than 1 TB in job as a data scientist. This data is stored in databases on her Windows 10 system. While running an analysis on these databases, she does not want her code to be slowed down because of real-time scanning by Windows Defender. Which of the following settings should Kesha modify to solve this problem?

Exclusions

In File Explorer, which ribbon tab provides options to open a new File Explorer window, command prompt, or Windows PowerShell prompt that is focused on the current folder?

File

A more manageable way to deploy MSI-based applications in smaller environments would be to use which of the following?

Group Policy

The Local Security Policy is part of a larger Windows management system known as which of the following?

Group Policy

Which of the following can be pushed down to a computer and can be changed by the user?

Group Policy Preference

ShopKart is an e-commerce company with a small office for its developers. The company stores file backups in a cloud server and provides the employees in the IT department access to file shares via drive mapping. Which of the following has the company used to configure the computers used by developers?

Group Policy Preferences

Which registry hive contains details about the current hardware profile in use?

HKEY_CURRENT_CONFIG

Which registry hive contains global settings for the entire computer and the applications installed on it?

HKEY_LOCAL_MACHINE

Which of the following is not a primary have found in the Windows 10 registry?

HKEY_REMOTE_ADMIN

What is the most specific device identification string?

Hardware ID

What type of encrypted algorithm is one-way encryption, which means that it encrypts data, but the data cannot be decrypted?

Hashing

Which of the following terms is used to refer to the individual sections of the registry?

Hive

Sharon recently lost an encryption certificate that rendered some of her EFS-encrypted files unrecoverable. To prevent a similar situation from arising in the future, she wants to create a recovery certificate for recently encrypted files. She creates the recovery certificate. What should Sharon do next?

Import the recovery certificate into the local security policy as a data recovery agent.

Sharon recently lost an encryption certificate that rendered some of her EFS-encrypted files unrecoverable. To prevent a similar situation from arising in the future, she wants to create a recovery certificate for recently encrypted files. She creates the recovery certificate. What should Sharon do next?

Import the recovery certificate policy into the local security policy as a dats recovery agent

Windows 10 includes search functionality that can be used to find files and folders. Which of the following is used to increase the efficiency of searching in Windows 10?

Indexing

Which of the following is not true of the HKEY_CURRENT_USER hive in the Windows 10 registry?

It contains user-specific settings for the current user and system services

Which of the following is true of PDF?

It is most often thought of as a document format, but it is also supported by some printers as a page description language, which allows the documents to be sent directly to a printer without any processing

Which of the following do newer Windows applications use to describe the structure of an application?

Manifest

Marshall, a photographer, uses his Windows 10 laptop to process images shot on his DSLR camera. A few days after the installation of a new image manipulation software, he notices that the search function on his laptop has slowed. On troubleshooting this issue, he finds that the both the content and properties of output files from the application are being indexed. If Marshall is able to resolve this issue, which of the options did he most likely use?

Marshall modified the settings to index only metadata

Ariella configures a shared printer on the local network. Ryan logs on to his user account on a Windows 7 computer and installs the shared printer before printing a document. After a few hours, Maya logs on to the same computer using her account and tries to print a document. Which of the following is true of this scenario?

Maya needs to install the printer in order to be able to use it to print her document.

Which of the following is a newer browser included with Windows 10?

Microsoft Edge

Moses, an amateur photographer, drops some photos into a folder on OneDrive and sends the link to this folder to his friend Ezra. Ezra inadvertently sends this link to a group of people. One of her friends from that group takes these images, posts them on social media, and takes credit for these photos. Moses comes across these photos and is taken aback. What should Moses have done to decrease the risk of his photos being stolen?

Moses should have shared this file with Ezra by specifying Ezra's email address associated with a Microsoft account.

Active Directory information can be changed on any domain controller and those changes will be replicated to other domain controllers. What is this type of replication called?

Multimaster

Besides the .NET Framework 4.6, what other version of the .NET Framework does Windows 10 provide as a feature?

Net 3.5

Shawn signs into a Windows 10 system with administrative user privileges. The system has UAC enabled. Shawn accidently launches a malicious application that is infected with malware. If the malware is able to access and corrupt the system files, which of the following must be true?

On a prompt to continue or cancel running the program, he chose to continue

What is the name of the cloud based storage that is automatically included for free when a Microsoft account is created?

OneDrive

Orson is trying to open an encrypted file on his Windows 10 system. The file was encrypted using EFS, and he opened this as recently as last week. Which of the following is most likely the reason that Orson is unable to open the file?

Orson reset the password of his Windows user account.

Orson is trying to open an encrypted file on his Windows 10 system. The file was encrypted using EFS, and he opened this as recently as last week. Which of the following is most likely the reason that Orson is unable to open the file?

Orson reset the password to his Microsoft user account

What is used by Windows 10 to define the layout of content for a print job?

Page description language

Which policy controls password characteristics for local user accounts?

Password

Which rule condition identifies software by file location?

Path

Wemimo has a printer connected to her Windows 10 laptop. When she prints a document, the printed document does not have the same layout as the original file and there are formatting errors. She realizes that it must be an issue with the page description language. Which of the following page description languages would most likely resolve this printing issue?

PostScript

Software that Windows 10 uses to understand and use the features of a printer is known as which of the following?

Print Driver

Which printer management tool would you typically use to manage printer servers rather than individual computers?

Print Management snap in

Raphael, a system administrator, is setting up the password policy for local user accounts. He allows users to reuse a password after they have used 4 different passwords. He also modifies the policy to force users to change their old passwords every 60 days. After some time, he notices that users are modifying their passwords 4 times in a short time span and continuing to use their old passwords. This defeats the purpose of setting up the password restrictions. Which of the following settings should Raphael modify to control this behavior?

Raphael should set the minimum password age setting to at least one day

Hang owns a Windows 10 laptop that does not have any issues. She is configuring Windows Update settings on this laptop. Which of the following settings should Hang leave turned on?

Receive update for other Microsoft products when you update Windows.

Hang owns a Windows 10 laptop that does not have any issues. She is configuring Windows Update settings on this laptop. Which of the following settings should Hang leave turned on?

Receive updates for other Microsoft products when you update Windows

Besides accessing and recovering previous versions of a file, which of the following is a function that can be performed only on the OneDrive website and not by the OneDrive client?

Recovering deleted files

If you read or write registry entries from batch files, which of the following can you use?

Reg.exe

Which of the following registry editing tools has the built-in functionality to export a portion of a registry to a .reg file using commands?

Reg.exe

Joanna, a graphic designer at ChromaStage, has an application installed on her UAC-enabled Windows 10 system that was designed for an older version of Windows. Some of the application's features require administrative privileges. When she tries running the application, the application fails to run and generates an error instead. If Joanna's account already has administrative privileges, what can she do to resolve this issue?

She should use the Application Compatibility Toolkit to resolve the issue.

Laila is editing an image on her laptop using an image processing application. The application freezes frequently. When she contacts customer support, she is request for a screenshot of the frozen application to create a support ticket. Which of the following shortcuts can Laila use to take a screenshot of only the frozen application?

Shift + Print Screen

Which of the following is an application framework that an application can distribute?

The .NET Framework

Which of the following can you use to run a Win16 application?

The 32-bit version of Windows 10

Identify the Active Directory partition that holds the computer accounts in a domain.

The Domain Partition

Which of the following is considered one of the biggest sources of malware (malicious software)?

The Internet

TEXMII Consultants, a tax consulting firm, uses legacy web-based applications. To allow these applications to run on Microsoft Edge, Ablorde adds these websites to IE Mode. Some of the users report that all the legacy applications are still being launched in Microsoft Edge on their computers. Which of the following is the most likely reason for this issue?

The Internet Explorer 11 optional feature has been uninstalled on the computers.

TropicMaze is a manufacturer of processed foods. The packaging at the plant is automated by machines that are controlled by a Windows 10 computer. Which of the following indicates that this computer receives updates using Long Term Servicing Branch?

The Operating System on the computer will receive Windows Updates for 10 years.

When applications or Windows 10 starts and are running, they read their configuration information from which of the following?

The Registry

Merwyn's laptop has Windows 10 installed on the C drive. He creates a new folder, Work, on the D drive and adds this folder to the Documents library. He then navigates to the Work folder file in the Documents library and creates a Word file. Which of the following is true of this scenario?

The Word file is created in the Work folder on the D drive

Dorothy, a system administrator, uses BitLocker To Go to protect USB drives that are used in the organization. She chooses the Use a password to unlock the drive option when picking between unlocking options. Warren wants to print some files, so he copies these files from his work laptop onto a USB drive. Next, he plugs in this drive on a computer that is connected to a printer. If Warren is able to print the files on the USB drive successfully without entering any password, which of the following must be true of the computer connected to the printer?

The computer is marked as a trusted environment

Hannah, a system administrator, wants to use Windows Update for Business in her organization to control updates for Windows 10 systems. While she is able to use Group Policy to apply these settings to most computers, she is unable to apply these settings to some computers. Which of the following is the most likely reason that Hannah is not able to apply the Windows Update for Business settings to these computers?

The computers are running the Windows 10 Home edition.

Oluseyi receives a link to a free download of a premium application in his email. He clicks the link and the application downloads. Before installing it, he wants to verify the authenticity of the download. He verifies the MD5 value of the downloaded application against the MD5 value listed for the application on the original website. The MD5 values do not match. Which of the following is true in this scenario?

The downloaded application has been modified from its original and authentic version.

Macy works as a system administrator at an accounting firm. Sensitive data is stored on all Windows 10 client systems. She wants to audit all access to files on these systems, so she decides to edit the Global Object Access Auditing category. In order to complete this task, which of the following conditions should be met?

The files and folders must be on NTFS-formatted volumes

Vishal is considering switching to BitLocker Drive Encryption because of the inefficiencies of EFS. When he tries to use this encryption feature on Windows 10 Professional, he is unsuccessful. Which of the following is the most likely reason?

The hard drive does not contain a system volume

Vishal is considering switching to BitLocker Drive Encryption because of the inefficiencies of EFS. When he tries to use this encryption feature on Windows 10 Professional, he is unsuccessful. Which of the following is the most likely reason?

The hard drive does not contain a system volume.

Your organization has two OUs, one each for the Finance and Administration departments. A GPO setting has been applied to the computers in the Administration OU to prevent the instillation of new applications. Another GPO setting has been applied to some users in the Finance OU that provides them administrative privileges. What will happen if a user with administrative privileges from the Finance OU tries to install an application on a computer in the Administration OU?

The user will not be able to install the application

A small game development company has many Windows 10 computers installed on its premises. As a routine, the network administrator applies several GPOs to users and the computers. Which of the following would be true if all the GPOs were successfully applied to a user?

There would be no conflict between the policies

Which of the following is not true of App-V?

Updates are installed directly on the client computers

Linda works as a network administrator in a multinational corporation. It has come to her notice that some updates lead to a significant computer downtime because they are either incompatible or not installed properly. In order to resolve this issue, she decides to use the Windows Server Update Services to control the updates that are sent to the computers. How would this move help resolve the current issue?

Updates can be tested before they are applied

All the application environments in Windows 10 restrict apps to running in which of the following modes?

User Mode

Esmeralda creates a rule with the Deny permission for photo.exe in the Executable Rules collection for a group with all users. Which of the following is true in this scenario?

Users will not be able to run other applications that do not have an allow rule

Alex, a system administrator want to uninstall a Windows update that was recently installed on around 200 Windows 10 computers in the organization. Which of the following options is best suited to this scenario?

Using a batch script with wuse.exe

An application installed on a Windows 10 system requires access to restricted areas on the system to place user data. However, this application is not UAC compliant. To enable this application to run properly, which of the following UAC options should be enabled?

Virtualize file and registry write failures to per-user locations

Which of the following downloads updates from Microsoft Update and stores them in a local datastore, rather than each client computer downloading updates individually?

WSUS

Nanxi is using an application that allows her to text her phone contacts from her laptop. She wants to display an emoji in one of her text messages. The physical keyboard does not have any emoji options. Which of the following shortcuts can Nanxi use to display the emoji keyboard?

Win+

Which of the following terms is used to describe a virtualized environment that hosts Win32 apps on the 64-bit version of Windows 10?

Windows on Windows 64

Jin enabled Personal Vault on OneDrive and added some important documents to the vault. To prevent anyone else from gaining access to the files, she immediately disabled the vault after adding the files. Which of the following is the most likely outcome in this scenario?

All of the files on the vault were removed and cannot be recovered.

When a new device is installed into a Windows 10 computer, the operating system uses a device setup class and which of the following in order to properly install the new device?

A Device Identification String

When a printer is plugged into a Windows 10 computer, which of the following is used to identify the appropriate driver?

A Device Identification String

Jimmy downloaded a game from the Internet and installed it on his Windows 10 system. A couple of days after the installation, his computer's performance degraded drastically. Assuming that the game had slowed it down, he uninstalled the game and used software to get rid of residual files. Despite this, his computer's performance did not improve. Inspecting the Resource Monitor revealed that the Memory and CPU were running close to 100% capacity. He suspects that the computer is infected with malware. Which of the following scans would you recommend to Jimmy?

A Full Scan

Jimmy downloaded a game from the Internet and installed it on his Windows 10 system. A couple of days after the instillation, his computer's performance degraded drastically. Assuming that the game has slowed down, he uninstalled the game and used software to get rid of residual files. Despite this, his computer's performance did not improve. Inspecting the Resource Monitor revealed that the Memory and CPU were running close to 100% capacity. He suspects that the computer is infected with Malware. Which of the following scans would you recommend to Jimmy?

A Full Scan

Which of the following is a domain controller that holds a subset of the information is all domain partitions?

A Global Catalog Server

Which of the following is a device identification string that can be used to control the instillation of a device?

A Hardware ID

In large organizations, where are the updates downloaded from Microsoft stored if the update process is controlled centrally?

A WSUS Server

Which policy allows you to configure an account to be temporarily disabled after a number of incorrect log-on attempts?

Account Lockout

Which of the following keys in the HKEY_LOCAL_MACHINE hive contains information from the boot configuration device?

BCD00000000

Guillaume has a Windows 10 personal laptop. He wants to ensure that the Microsoft Store apps on his computer are kept updated. What can Guillaume do to ensure this?

Change setting in Microsoft Store to automatically update apps

Guillaume has a Windows 10 personal laptop. He wants to ensure that the Microsoft Store apps on his computer are kept updated. What can Guillaume do to ensure this?

Change settings in Microsoft Store app to allow automatic updates.

In which of the following folders are memory versions of hives stored when a computer shuts down?

Config

Your organization is transitioning to a cloud-based infrastructure. However, several of its services rely on the use of an on-premise Active Directory. Since you are a network administrator, the management has reached out to you to provide a suitable transition plan that would least affect the day-to-day operations of the company. Which of the following suggestions would you provide?

Configure Windows as hybrid Azure AD-joined

Oshane is configuring security settings on his computer. Recently, his friend's computer was attacked by malware that encrypted data on all the hard disks and demanded a cryptocurrency ransom to decrypt this data. Which of the following options in Windows 10 is the best option to help Oshane avoid a similar situation?

Controlled Folder Access

Veronica copies an unencrypted file from one partition on her hard drive to an encrypted folder on another partition. From there, she moves the file to a folder on a flash drive. If the file on the flash drive is encrypted, which of the following must be true?

Copying the file to the encrypted folder encrypted the file

Veronica copies an unencrypted file from one partition on her hard drive to an encrypted folder on another partition. From there, she moves the file to a folder on a flash drive. If the file on the flash drive is encrypted, which of the following must be true?

Copying the file to the encrypted folder encrypted the file.

As a systems administrator, you have been asked to quicken the domain join process in your organization by allowing domain joined computers to join offline. Which of the following actions will you take?

Create a blob file on the Windows Server and import it to the computer


Kaugnay na mga set ng pag-aaral

Nursing Management During Pregnancy

View Set

Physio Chapter 4: NS 2 Nervous System: Neurotransmitters

View Set

Ch. 44 Drugs Used to Treat the Musculoskeletal System

View Set

math properties of equality & AAP, SAP

View Set

Holistic Assessment PrepU questions

View Set