Windows Configuration: Windows 10 - Chapters 11 - 12, Windows Configuration: Windows 10 - Chapter 7 & 8, Windows Configuration: Windows 10 - Chapters 9/10, Windows Configuration: Windows 10 - Chapter 5-6
A file for installing a Windows Store app
.appx file
An app packaged for installation by the Windows Installer service
.msi file
Which processor feature monitors processes to ensure that they do not access unauthorized memory spaces, which is done by various types of malware, such as virus, to take control of systems? a. DEP b. XPS c. WEI d. LOGO
A. DEP
To help identify and resolve app compatibility issues, the Windows 10 ______________________ includes the Application Compatibility Toolkit (ACT)
ADK
A service created by Apple that allows external apps to send notification data to apps installed on Apple devices.
APNs
A software layer that exists between apps and the operating system to simplify app development
Application Environment Subsystem
A technology that deploys applications by streaming and isolates them in a virtual environment
Application Virtualization (App-V)
The security process that records the occurrence of specific operating system events in the Security log.
Auditing
An identity and access management cloud solution.
Azure AD
Policy that allows employees to bring their own computers, smartphones, and tablets to work.
BYOD
A feature in Windows 10 that can encrypt the operating system partition of a hard drive and protect system files from modification.
BitLocker Drive Encryption
______________________________is a method for protecting data on removable storage such as USB drives?
BitLocker To-Go
Policy that allows employees to choose a computer, smartphone, or tablet from a corporate-owned pool of devices
CYOD
As a _______________-based service, Microsoft Intune requires the use of two administrative websites.
Cloud
A(n) ___________________________is a router on the local network that is used to deliver packets to a remote network.
Default Gateway
For virtual hard disks, creating a checkpoint triggers the creation of a _______________________disk.
Differencing
A Microsoft tool for synchronizing copies of local identity information into Azure AD
DirSync
An encryption technology for individual files and folders that can be enabled by users
EFS- Encrypting File System
A license suite available for purchase from Microsoft that includes Azure AD Premium, Microsoft Intune, and Azure Rights Management Services
EMS
T/F Local user account can be used to access resources on other computers in a workgroup or a domain.
FALSE
T/F The administrator and a user-specified initial account are called built-in accounts because they are created on every Windows 10 computer.
FALSE
Most organizations use the 32-bit version of Windows 10 rather than the 64-bit version of Windows 10.
False
New in Windows 10 is a virtual printer for PDF documents names Microsoft XPS Document Writer?
False
T/F Network bottlenecks are more common for computers than servers running Windows 10.
False
T/F The Services tab in Task Manager shows all the user applications running on the computer.
False
T/F Microsoft Intune policies apply only to domain joined devices
Fasle
A one-way encryption algorithm that creates a unique identifier that can be used to determine whether data has been changed.
Hashing Algorithm
Software and services responsible for provisioning and controlling access to mobile apps
MAM
Security software used to monitor, manage, and secure employee mobile devices.
MDM
Malicious software designed to perform unauthorized acts on your computer.
Malware
When a Windows 10 computer is not part of an Active Directory domain, you can sign in by using a local user account or a _______________________account.
Microsoft
A system that allows multiple computers to share a single IP address when connecting to the Internet.
NAT
_________________________________is a central point in Windows 10 for managing the configuration of the network you are currently connected to.
Network & Sharing Center
A setting that controls how your computer views other computers on the network and advertises its presence on the network.
Network Discovery
The ability for Windows 10 to detect when it is connected to a different network and perform actions based on the change
Network Location Awareness
A command-line utility that can be used to test IP communications between the computer running the ulility and a remote target.
PINS
__________________ is an MMC snap-in that is used to monitor system performance indicators.
Performance Monitor
A standard set of rules that defines how different components of a system operate together.
Protocol
A ___________________________is created from an earlier healthy OS installation on a computer, and contains a backup of the Windows system files and recovery tools to assist in the repair process.
Recovery Drive
A central store for application and operating system configuration information in Windows 10
Registry
A feature in Remote Desktop Services that presents clients with a single app in a window
RemoteApp
___________________provides real-time monitoring of the most common system performance indicators.
Resource Monitor
Local user accounts are stored in the ___________________database of Windows 10.
SAM- Security Accounts Manager
A command-line tool that is used to apply, export, or analyze security templates.
Secedit
A(n) _____________________is used to define which part of an IP address is the network ID and which part of the IP address is the host ID.
Subnet mask
T/F NTFS permissions can be easily circumvented when you have a physical access to a computer.
TRUE
T/F Secure sign-in increases security on your computer by forcing you to press Ctrl+Alt+Delete before signing in.
TRUE
T/F With fast user switching, only one user can be actively using the computer at a time
TRUE
A system to tunnel IPv6 addressed packets over an IPv4 network, even if NAT is used on the IPv4 network.
Teredo
Data Execution Prevention (DEP) is a processor feature in Windows 10 that monitors processes to ensure that they do not access unauthorized memory spaces.
True
Local printing requires that a printer be connected directly to a Windows 10 computer by using a cable?
True
T/F A company commonly sets up only one production Office 365 tenant account, and adds users to that account.
True
T/F Both Hyper-V on Windows Server and Client Hyper-V on Windows 10 offer the same core functionality that allows you to run virtual machines.
True
T/F Client Hyper-V can use either VHD or VHDX virtual hard disks
True
T/F If a Windows 10 computer has multiple network interfaces active, each can be assigned a different network location, each with a different firewall settings based on their assigned network location.
True
T/F The option to manage printers in Settings is new for Windows 10?
True
T/F The simplest automated deployment method is to create a batch file that does a silent install of the application.
True
T/F When deploying Apps with Microsoft Intune, required installs can have a deadline for installation defined.
True
T/F Windows 10 includes several interfaces that make it easier for developers to create clients, services, protocols, and network drivers?
True
The most recent iteration of Windows Store apps is _________________________ also known as Universal apps.
Universal Windows Platform Apps
A standard user account derives its privileges from being a member of the local________________group.
Users
Automatic sign-in is configured on the __________________ tab of the User Accounts applet.
Users
A system used to resolve computer NetBIOS names to IP address.
WINS
Anti-malware software included with Windows 10.
Windows Defender
Currently, administrators are more likely to create new scripts in ________________________than to create batch files and use reg.exe
Windows PowerShell
The newest application environment that is designed to be cross platform with phones, tablets, and desktop computers
Windows Store Apps
A system in Windows that allows 32-bit Windows apps to run on a 64-bit operating system
Windows on Windows 64 (WOW64)
Which utility is used to browse and manage the records of system events and messages stored in system event logs? a. Event Viewer b. shared folders c. device managers d. WMI Control
a. Event Viewer
File Explorer contains ribbon tabs that can be used for various functions. Which ribbon tab provides options to open a new file explorer window, command prompt, or Windows PowerShell prompt that is focused on the current folder? a. File b. Home c. Share d. View
a. File
Which of the following is NOT an Intune policy category? a. Firewall policies b. Configuration Policies c. Compliance Policies d. Corporate Device Enrollment Policies
a. Firewall policies
The local security policy is part of a larger Windows management system known as which of the following? a. Group Policy b. Local Policy c. Network Policy d. Domain Policy
a. Group Policy
What feature is supported in Client Hyper-V that is not supported in the server version? a. hibernate b. checkpoints c. replica d. live migration
a. hibernate
You have two processors on a computer running Client Hyper-V. You have two virtual machines running VM1 and VM2. You want to be sure VM1 is allocated twice as much processing power as VM2. What control setting should you configure? a. Relative weight b. Virtual machine reserve c. Virtual machine limit d. Percent of total system resources
a. relative weight
What Windows 10 feature is a user- specific data protection mechanism that protects local resources by allowing user files to be backed up to an external hard drive or a network location? a. relog b. schlog c. tsklog d. brklog
a. relog
Which profile is stored in a network location rather than on the local hard drive? a. roaming b. public c. mandatory d. default
a. roaming
Which of the following is NOT a typical scenario for using Client Hyper-V? a. to make use of old workstations with few resources b. testing updates to the OS c. to provide app compatibility with older apps d. to run an alternate operating system
a. to make use of old workstations with few resources
Each Microsoft account is allocated how much storage that can be used for file storage in OneDrive? a. 1 GB b. 5 GB c. 7 GB d. 10 GB
b. 5GB
User accounts that are enrolled to be managed by Microsoft Intune must be linked to which of the following? a. a local AD b. Azure AD c. A SAM account d. A DNS record
b. Azure AD
Which of the following is an automated mechanism used to assign IP addresses, subnet masks, default gateways, DNS servers, WINS servers, and other IP configuration information to network devices? a. IPX b. DHCP c. AIX d. X.25
b. DHCP (Dynamic Host Configuration Protocol)
Selecting a counter to display will display information about that counter's collected data as a chart type. Which chart type displays the current value of each performance counter in decimal format? a. Line b. Histogram bar c. Report d. Vertical bar
b. Histogram bar
Account policies setting are located in which of the following? a. NAP b. local security policy c. EFS security policy d. remote policy
b. Local security policy
Intune can distribute third-party updates in which of the following formats? a. COM b. MSP c. XML d. BIN
b. MSP
Members of which group are able to monitor performance counters on the computer, but cannot access performance logs? a. Event log readers b. Performance Monitor Users c. Performance Log Users d. Guests
b. Performance Monitor Users
Which tool allows a user to connect to the active registry database and make changes that are effective immediately? a. EDITREG.EXE b. REGEDIT.EXE c. REGISTER.EXE d. CHGREG.EXE
b. REGEDIT.EXE
Which protocol is included with Windows 10 for Network communication? a. IPX b. TCP/IP c. NetBEUI d. AppleTalk
b. TCP/IP
Which part of the motherboard in your computer is used to store encryption keys and certificates? a. NTFS b. TPM c. EFS d. NAP
b. TPM - Trusted Platform Module
Which of the following is a default Intune user group. a. Administrator Users b. Ungrouped Users c. Standard Useres d. Power Users
b. Ungrouped Users
Which of the following is NOT an operating system supported by Microsft Intune as a mobile device? a. Windows 8.1 RT b. Windows 7 c. Mac OS X 10.9 d. Android 4.0
b. Windows 7
Instead of logging performance counters to disk, you can configure which of the following to occur? a. messages b. alerts c. tasks d. archives
b. alerts
What do applications use to request services from the application environment subsystem? a. .NET Framework b. Application Programming Interfaces (API) c. Kernel services d. Hardware services
b. application programming interfaces (API)
Which distribution method delivers the critical components of an application first and allows the users to be using the application before installation is complete? a. sideloading b. Click-to-Run c. downloading d. RED.EXE
b. click-to-run
What type of virtual network should you create if your virtual machine should be able to communicate with the Internet? a. Internal b. external c. VPN d. private
b. external
Which rule condition identifies software by file location? a. publisher b. path c. file hash d. certificate
b. path
Which of the following is used to protect your computer from malware that may attempt to steal your password? a. Fast user switching b. Secure sign-in c. Windows Welcome d. Manual sign-in
b. secure sign-in
Each Win32 application runs in its own virtual memory space and is executed by the processor in which mode? a. DOS b. user c. kernel d. Win32
b. user
Windows 10 introduces a newer version of Windows Backup. What did Microsoft decide to call this newer version? a. Windows Backup 10 b. Microsoft Backup for Windows 10 c. Backup and Restore (Windows 7) d. File History
c. Backup and Restore (Windows 7)
To address the risks to data stored on computers and laptops, which encryption technology is available in Windows 10? a. NAP b. Dual Locked Hard Drive c. BitLocker Drive Encryption d. TPM
c. BitLocker Drive Encryption
You are running a virtual machine that must boot through the network adapter and provide the best networking performance. Which type of virtual machine and virtual network adapter should you choose? a. Generation 1, synthetic b. Generation 1, emulated c. Generation 2, synthetic d. Generation 2, emulated
c. Generation 2, synthetic
A more manageable way to deploy .msi-based application in smaller environments would be to use which of the following? a. a batch file b. msiexec.exe utility c. Group Policy d. System Center configuration manager
c. Group Policy
Which Windows 10 feature provides an automated diagnosis and repair of boot problems plus a centralized platform for advanced recovery tool? a. Windows Preinstallation Environment (Windows PE) b. System Reset c. Windows Recovery Environment (WinRE) d. Recovery Drive
c. Windows Recovery Environment (WinRE)
You can modify the locations included in a library, but the locations must be indexed by which of the following? a. File Explorer b. Libraries c. Windows Search d. Documents
c. Windows Search
In addition to defining which locations are indexed, what else are you able to configure to be indexed by Windows 10? a. libraries b. folders c. file types d. metadata
c. files types
Data sent to which of the following returns to the computer that sent it and does not appear on the actual network? a. multicast address b. class D address c. loopback address d. MAC address
c. loopback address
Running fewer applications at once is a way to resolve which type of bottleneck? a. disk b. network c. memory d. processor
c. memory
What is the default format for an Office 365 tenant account? a. nickname.microsoftazure.com b. nickname.yourdomain.com c. nickname.onmicorsoft.com d. nickname.office365.com
c. nickname.onmicrosoft.com
When applications or Windows 10 starts, they read their configuration information from which of the following? a. kernel b. system core c. registry d. application environment
c. registry
Which of the following are used to process log file data and display it in a meaningful way? a. Counters b. Data managers c. Reports d. Data Collector Sets
c. reports
Which IP utility is used to display response times for every router on the path to the destination? a. ping b. route c. tracert d. arp
c. tracert
Running apps in which mode ensures that a poorly written app does not affect system stability? a. kernel b. environment c. user d. service
c. user
Which of the following simplifies folder and file sharing by controlling both NTFS permissions and share permissions at the same time? a. Advance sharing b. Single sharing c. Public sharing d. "Share with" method
d. "share with" method
Besides the .NET Framework 4.6, what other version of the .NET Framework does Windows 10 provide as a feature? a. .NET 2.0 b. .NET 4.8 c. .NET 2.5 d. .NET 3.5
d. .NET 3.5
Traditional WIn32 or .NET Framework apps are commonly packaged as which type of file? a. .xml b. .html c. .pdf d. .msi
d. .msi
If you configure a virtual machine with dynamic memory, what is the default minimum RAM that will be configured? a. 256 MB b. 1 GB c. None d. 512 MB
d. 512 MB
Applications that are not designed for Windows 10 and that require administrative privileges do no work properly request elevated privileges, generating an error. You can eliminate this error by using which of the following? a. Administrative Privileges Toolkit b. Private Toolkit c. Secure Toolkit d. Application Compatibility Toolkit
d. Application Compatibility Toolkit
Which security process records the occurrence of specific operating system events in the Security log? a. Encrypting b. Hashing c. Filtering d. Auditing
d. Auditing
You want to install Client Hyper-V on your new Windows 10 computer. Of the available choices which version of Windows 10 must be installed? a. Any 32-bit edition b. Windows 10 Home c. Windows 10 Mobile d. Windows 10 Education
d. Windows 10 Education
Characteristics of a file such as a file name, creation data, and modified date are known as which of the following? a. index b. category c. service d. metadata
d. metadata
If you have obtained the .appx file for a Windows Store app, you can install the app from a source other than the Windows Store. What is this ability known as? a. distribution b. download c. Click-to-Run d. package management
d. package management
Which page description language is the oldest and best supported? a. PDF b. PCL c. XPS d. Postscript
d. postscript
Software Windows 10 uses to understand and use the features of a printer is known as which of the following? a. shared printer b. print server c. print firewall d. printer driver
d. printer driver
Which type of virtual network should you create if you want to completely isolate test environment for a virtual machine? a. internal b. external c. VPN d. private
d. private
Which of the following is the name assigned to the WAP to identify itself to clients? a. netID b. access code c. security key d. security set identifier
d. security set identifier
A discrete body of registry keys and values stored in files as part of the operating system.
hive
A command-line utility that can be used to display, change, add, and delete network configuration settings on a computer, including basic and advanced settings.
netsh
A command-line utility that can be used to view or debug that data returned from a DNS server in response to a DNS name resolution query.
nslookup
Which type of permissions are considered the most basic level of data security in Windows 10? a. EFS b. NTFS c. FAT d. NAP
B. NTFS
New in Windows 10 is a virtual printer for PDF documents named______________________________
Microsoft Print to PDF
A collection of settings to control password characteristics such as length and complexity.
Password Policy
All Internet Exploer zones can be configured to run in Protected Mode. Protected Mode works in conjunction with ________________ to prevent malware from installing through Internet Explorer.
UAC
A feature in Windows 10 that elevates user privileges only when required.
UAC - User Account Control
The name that uniquely identifies a user within an identity directory.
UPN
The two most common mechanisms for sharing an IP address are a router or which of the following? a. ICS b. DSL c. PPPoE d. IPsec
a. ICS
A new interface for managing printers in Windows 10 is known as which of the following? a. Printers and Scanners b. Connected devices c. Print Management snap-in d. Devices and Printers
a. Printers & Scanners
Each time a user logs on locally, which database is used to verify sign-in credentials? a. SAM b. SSID c. SID d. NID
a. SAM - Security Account Manager
In order to stop the automatic sign-in from occurring, which key should be held down during the boot process? a. Shift b. Ctrl c. Alt d. Esc
a. Shift
Which of the following allows you to begin using an application faster after printing by storing the print job as a file and sending the print job to the printer as a background process? a. Spooling b. Staging c. XPS d. PCL
a. Spooling
What is the format for user names used by Office 365 apps? a. UPN b. DNS c. UNC d. LDAP
a. UPN
Which of the following is NOT a desktop OS supported by Intune with an Intune client installed? a. Windows 8.1 RT b. Windows 10 Pro c. Windows 7 Ultimate d. Windows Vista Business
a. Windows RT 8.1
Which of the following terms is used to describe a virtualized environment that hosts Win32 apps on the 64-bit version of Windows 10? a. Windows on Windows 64 (WOW64) b. Client Hyper-V c. App-V d. Win64
a. Windows on WIndows 64 (WOW64)
Which of the following is NOT a benefit of using VHDX instead of VHD format virtual disks? a. better backward compatibility b. better resilience to corrution c. improved performance d. automatic trimming
a. better backward compatibility
Which component of the Hyper-V architecture controls all communication with the physical hardware on the computer? a. hypervisor b. child partition c. Integration Services d. Parent partition
a. hypervisor
Windows 10 includes search functionality that can be used to find files and folders. Which of the following is used to increase the efficiency of searching in Windows 10? a. indexing b. profiling c. viewing d. context searching
a. indexing
What type of bottleneck occurs when the applications you are running require more memory than is physically available in the computer? a. memory b. disk c. network d. processor
a. memory
Which of the following is responsible for enabling communications between Windows 10 and the network device in your computer? a. network driver b. kernel c. socket d. network protocol
a. network driver
After you install Client Hyper-V, what must you do before you can begin using it? a. reboot the computer b. install the Hyper-V driver package c. format a disk to store virtual machines d. update the Windows OS
a. reboot the computer
Which of the following is a correct statement about Generation 1 and Generation 2 virtual machines? a. Generation 1 virtual machines can boot to a SCSI virtual disk; Generation 2 virtual machines can only boot to IDE virtual disks. b. Generation 1 virtual machines use BIOS-based firmware; Generation 2 virtual machine use UEFI-based firmware c. Generation 1 virtual machines support secure boot; Generation 2 virtual machines do not support secure boot d. Generation 1 virtual machines support USB disks; Generation 2 virtual machines support floppy disks
b. Generation 1 virtual machines use BIOS-based firmware; Generation 2 virtual machine use UEFI-based firmware
The registry is divided into sections and levels of data. Multiple sections exist to organize data by purpose. What are these individual sections called? a. keys b. hives c. branches d. nests
b. hives
What happens if an APN certificate expires? a. the managed device is erased b. iOS device management will fail c. the administrator is warned and given 1 month grace period d. the device is locked until the Apple ID password is entered
b. iOS device management will fail
In Windows 10, which of the following is updated each time a file is changed to ensure that search results are current? a. search box b. index c. context d. file
b. index
Where in the Hyper-V architecture do device drivers reside? a. hypervisor b. parent partition c. child partition d. hardware
b. parent partition
What Windows 10 allows you to centralize the administration of printers for remote locations but still keep WAN link utiliation low because the print jobs stay local? a. Windows Printing b. Windows Connectivity c. Branch Office Direct Printing d. Windows Remote Office
c. Branch Office Printing
Which of the following protocols is used for resolving host names to IP address? a. IPv6 b. IPv4 c. DNS d. TCP/IP
c. DNS
Data Collector Sets organize multiple counters into a single unit. Which type of data can a Data Collector Set monitor to track when system event occur? a. Configuration b. Performance counters c. Event Trace d. Bottleneck trace
c. Event Trace
The Guest account derives all of its privileges from being a member of the Guests groups and which other group? a. User b. Domain c. Everyone d. Initial
c. Everyone
What Windows 10 feature simplifies the configuration of peer-to-peer networks by removing the need to synchronize users and passwords on each computer? a. Personal User Password b. Pass-through authentication c. HomeGroup d. Game control
c. HomeGroup
What is the name of the could-based storage that is automatically included for free when a Microsoft account is created? a. Windows Store b. Microsoft Cloud c. OneDrive d. WindowsDrive
c. OneDrive
Members of which of the following groups are able to monitor performance counters and access performance logs on the computer? a. Event Log Readers b. IIS_IUSRS c. Performance Log Users d. Guests
c. Performance log users
What type of software is silently installed on your computer, monitors your behavior, and performs actions based on you behavior? a. Adware b. Worm c. Spyware d. Virus
c. Spyware
Which Control Panel applet is considered a simplified interface for user management? a. Privileges b. Permissions c. User Accounts d. Accounts
c. User accounts
Which of the following are required for individuals to log on to Windows 10 and uses resources on the computer? a. Public Keys b. IP address c. User accounts d. Digital certificates
c. User accounts
Which policy allows you to configure an account to be temporarily disabled after a number of incorrect log-on attempts? a. domain b. group c. account lockout d. password
c. account lockout
Which of the following is a default Intune device group? a. All desktop computers b. Windows Devices c. All mobile devices d. Non- Windows Devices
c. all mobile devices
Which utility can be used by a user with administrative rights in order to stage a driver manually? a. xpsprnt.exe b. pdriver.exe c. pnputil.exe d. pinstall.exe
c. pnputil
Which advanced audit policy setting tracts when tasks are performed that require a user rights assignment, such as changing the system time? a. object access b. account management c. privilege use d. process tracking
c. privilege use
Rules for communication across a network that define how much data can be sent and the format of that data is known as which of the following? a. Network drives b. Network drivers c. Protocols d. clients and services
c. protocols
Which of the following would prevent the Intune client to be installed on an OS? a. it's a 32-bit OS b. it's Windows Vista Enterprise c. the SMS client is installed d. the Windows Installer is version 3.2
c. the SMS client is installed
If Windows 10 is configured to use dynamic IP configuration and is unable to contact a DHCP server, the default action is to use which type of address? a. WINS b. NetBIOS c. IPv6 d. APIPA
d. APIPA
Which account is the most powerful local user account possible? a. Guest b. Initial c. Installation d. Administrator
d. Administrator
Your Client Hyper-V host has a single network adapter. What option should be enabled to allow your virtual machines to communicate with the external network while not disrupting host network communication? a. Enhanced session mode b. Generation 2 virtual machine c. Enable virtual LAN identification for management operating system d. Allow management operating system to share this network adapter.
d. Allow management operating system to share this network adapter.
Which of the following can be used to define which programs are allowed or disallowed in the system? a. Software restriction policies b. A network zone c. Local Policies d. AppLocker
d. AppLocker
Which Windows 10 feature ensures that a second user can log on to a locked computer without logging off? a. Secure sign-in b. Window Welcome c. Automatic sign-in d. Fast user switching
d. Fast User switching
Which registry hive contains details about the current hardware profile in use? a. HKEY_CURRENT_USER b. HKEY_CLASSES_ROOT c. HKEY_LOCAL_MACHINE d. HKEY_CURRENT_CONFIG
d. HKEY_CURRENT_CONFIG
Which of the following is a threat to privacy and is sometimes installed when you visit a website? a. Windows Defender b. EFS c. Macro Script d. Spyware
d. Spyware
What Windows 10 feature captures a screenshot each time the user clicks on a screen item and saves the screen shots and users actions in a report that can be emailed or saved to a shared storage location? a. Steps Monitor b. Event Viewer c. File Recovery d. Steps Recovery
d. Steps Recovery
Which of the following is an updated version of TCP/IPv4 with a larger address space and additional features? a. LLTP b. LLTPRD c. AIX d. TCP/IPv6
d. TCP/IPv6
The full Intune product is available through which of the following? a. from the Windows Features control panel b. free from the Microsoft Download site c. from the Windows Store d. as part of the EMS
d. as part of the EMS
What feature of Hyper-V virtual machines is very useful for testing because you can almost instantly reset a computer back to a previous state? a. backups b. clones c. exports d. checkpoints
d. checkpoints
Which of the following is NOT a possible state for a virtual machine. a. Starting b. Paused c. Saved d. Down
d. down
What type of encryption algorithm is one-way encryption, which means that it encrypts data, but the data cannot be decrypted? a. signing b. symmetric c. asymmetric d. hash
d. hash
Which service is NOT supported by the Intune client for desktop computers? a. software updates b. managing apps c. updating Windows Firewall settings d. issuing certificates
d. issuing certificates