Chapters 1-14 Implementing & Supporting COS flashcards (Microsoft Windows 10 Configuring Windows Devices)

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

USB, eSATA, wireless, and Thunderbolt

List four external disk interfaces.

Bad Cluster File

Which NTFS system file keeps a record of all the clusters that are considered unusable by the file system within that volume?

Get-DAConnectionStatus

Which PowerShell cmdlet shows the connection status for DirectAccess?

Config.xml

Which USMT file is generated by running ScanState.exe with the /genconfig option?

L2TP

Which VPN protocol uses IPsec to provide data encryption?

Modern Standby

Which Windows 10 feature allows a device to sleep but continue to perform basic tasks like downloading Windows updates?

Client Hyper-V

Which Windows 10 feature allows you to create virtual machines with a completely independent operating system that shares the hardware on the computer running Windows 10?

domain

Which of the following terms is a collection of computers and users that are identified by a common security database?

Event Viewer

Which utility is used to browse and manage the records of system events and messages stored in system event logs?

Sync Center

Which utility should be used to review any synchronization errors that might occur using the Offline files feature in Windows 10?

Windows NT

With which Windows version was NTFS first introduced?

member server

Within Active Directory, Windows servers can be either a(n) ____________________ or a domain controller.

True

Within a site, Active Directory replication is uncontrolled.

group Policy object

a collection of Group Policy settings applied to the Windows 10 computer

Password policy

a collection of settings to control password characteristics such as length and complexity

Onedrive

cloud-based storage that is provided when you create a Microsoft account

the number of pixels that are displayed on your display

Screen resolution

true

DirectAccess relies on IPv6 for connectivity.

auditpol.exe

Advanced auditing is enabled through the local security policy, by using Group Policy, or by using ____________________ .

recovery drive

A ____________________ is created from an earlier healthy OS installation on a computer, and contains a backup of the Windows system files and recovery tools to assist in the repair process.

False

A clean installation is an installation of Windows 10 performed on a computer that has existing data or applications.

ping

A command-line utility that can be used to test IP communications between the computer running the utility and a remote target

True

A company commonly sets up only one production Office 365 tenant account, and adds users to that account.

False

A distribution share installation is always faster than a DVD boot installation.

Bitlocker Drive Encryption

A feature in Windows 10 that can encrypt the operating system partition of a hard drive and protect system files from modification

Group Policy

A more manageable way to deploy .msi-based applications in smaller environments would be to use which of the following?

Printers & Scanners

A new interface for managing printers in Windows 10 is known as which of the following?

False

A private network uses a physical network adapter in the Hyper-V host to provide virtual machines with connectivity to a physical network.

WDS

A server role included with Windows Server 2008 and newer that can be used to deploy operating system images over the network is known as which of the following?

APNs

A service created by Apple that allows external apps to send notification data to apps installed on Apple devices

Users

A standard user account derives its privileges from being a member of the local ____________________ group.

snap-in

A(n) ____________________ is a component that adds control mechanisms to the MMC console for a specific service or object.

Default gateway

A(n) ____________________ is a router on the local network that is used to deliver packets to a remote network.

Baseline

A(n) ____________________ is a set of performance indicators captured when system performance is acceptable.

Network Driver

A(n) ____________________ is responsible for enabling communication between Windows 10 and the network device in your computer.

subnet mask

A(n) ____________________ is used to define which part of an IP address is the network ID and which part of the IP address is the host ID.

global catalog server

A(n) _________________________ is a domain controller that holds a subset of the information in all domain partitions.

local security policy

Account policies settings are located in which of the following?

multimaster

Active Directory information can be changed on any domain controller and those changes will be replicated to other domain controllers. What is this type of replication called?

False

Active Directory is a single monolithic database with all of the information about the network.

True

Active Directory uses the same naming convention for domains and objects contained in these domains as DNS.

True

ActiveX controls are not available in Microsoft Edge.

10

After credentials are cached locally, you can sign in to a computer using a domain user account. By default, how many user sign-ins are cached?

reboot the computer

After you install Client Hyper-V, what must you do before you can begin using it?

printer driver packages

All Internet Explorer zones can be configured to run in Protected Mode. Protected Mode works in conjunction with ___________________ to prevent malware from installing through Internet Explorer.

virtual

All file data stored in a __________ hard disk is actually stored in a single file on the file system of a real disk drive.

User mode

All of the application environments in Windows 10 restrict apps to running in which of the following modes?

host ID

An IP address is composed of a network ID and which of the following?

Administrators

An administrator account derives its privileges from being a member of which local group?

push

Apple requires the administrator to request an Apple _________ Notification service certificate using a certificate-signing request issued by Intune.

DLLs

Applications can share code modules by using which Windows programming feature?

Win32

Applications designed to interact with which subsystem were the most common type of application in use with earlier operating systems, such as Windows XP?

Application Compatibility Toolkit

Applications that are not designed for Windows 10 and that require administrative privileges do not properly request elevated privileges, generating an error. You can eliminate this error by using which of the following?

cloud

As a _________-based service, Microsoft Intune requires the use of two administrative websites.

Network Location Server

As part of DirectAccess configuration, which of the following is also configured?

Users

Automatic sign-in is configured on the ____________________ tab of the User Accounts applet.

an instant-on power-saving mode that keeps the system in the S0 state

Away Mode

recover deleted files

Besides access and recovery previous version of a file, which of the following is a function that can only be performed in the OneDrive website and not by the OneDrive client?

.NET 3.5

Besides the .NET Framework 4.6, what other version of the .NET Framework does Windows 10 provide as a feature?

a method used to organize disk space for x86 computers into primary, extended, and logical partitions.

Basic Disk

True

Both Hyper-V on Windows Server and Client Hyper-V on Windows 10 offer the same core functionality that allows you to run virtual machines.

The 64-bit version is becoming popular as users are running applications that demand more RAM than the 32-bit version can use. Most new computers, with the exception of some tablets and low-cost computers, are 64-bit devices.The 64-bit editions can support up to 2048 GB of RAM.The 64-bit version of Windows 10 has a greater theoretical limit for processing data, which may allow it to complete calculations faster than a 32-bit version, even on the same computer hardware.

Briefly describe Windows 10's 64-bit computing support.

• MigApp.xml—Used to include or exclude the setting for specifific applications. • MigUser.xml—Used to control which fifile types, user folders, and desktop settings are included in the migration. • MigApp.xml—Used to include or exclude the setting for specifific applications. • MigUser.xml—Used to control which fifile types, user folders, and desktop settings are included in the migration.

Briefly describe the .xml files used to control USMT.

Remote Assistance is a stand-alone application included with all versions of Windows 10. A user can ask for help from a trusted professional over the network using email, file transfer, or the Easy Connect service.

Briefly describe the Remote Assistance feature included with Windows 10.

provides real-time monitoring of the most common system performance indicators. Key performance indicators are also summarized in graphs at the side of the screen. The performance indicators are listed as tabs under the main menu for each system area that is monitored: CPU, Disk, Network, Memory.

Briefly describe the Resource Monitor tool.

• Install image—These are WIM images that include the operating system and may include applications that are deployed to workstations. You can use an unattend.xml file to modify the operating system as part of the deployment process. • Boot image—These are WIM images that include Windows PE. They are used to deploy install images. The default boot image (boot.wim) displays a menu that allows you to select which install image to deploy. • Capture image—These images are used to automate the collection of a deployment image from a computer that has been configured as a reference image. Sysprep is run on the com- puter before the image is captured. The capture image uses Windows PE as an operating system and runs imaging software to collect the image. • Discover image—These images are used to deploy the deployment images on computers that do not support PXE. Discover images are ISO files that can be stored on removable media, such as DVD or USB drive. At the client, you can boot from removable media to connect to the WDS server and download images

Briefly describe the four types of images used by WDS to accomplish different tasks in the deployment process.

Executable—These rules apply to mexe and mcom files Windows Installer—it applies to .msi and .msp files Scripts—These rules go to .ps1, .bat, .cmd, .vbs, and .js files DLL—These rules go to .dll and .ocx files

Briefly describe the rule collections used by AppLocker.

The registry is divided into sections and levels of data. Multiple sections exist to organize data by purpose. The individual sections are called hives. Each hive has a specific role to play and is stored in memory while it is in use. When the computer is shut down, the memory versions of the hives are written to files and folders typically found in the folder C:\Windows\System32\config. Each hive is composed of one or more files.

Briefly describe the structure of the Windows 10 registry.

• Session-based virtual desktops—This type of virtual desktop is hosted on a Remote Desktop Session Host (RD Session Host). A single RD Session Host is shared by multiple users at one time. When the users connect, they each get their own independent desktop and run their own applications. However, the core operating system services are shared, which allows many users to share the same server. • Virtual machine-based virtual desktops—This type of virtual desktop is hosted on a Windows server running Hyper-V. Each user has an independent virtual machine with a completely independent operating system. The hardware of the server is shared among the virtual machines, but each virtual machine is independent. This type of virtual desktop has lower density than session-based virtual desktops

Briefly describe the two types of virtual desktops that Remote Desktop Services can provide.

False

Business enhancements such as encrypted files, joining a domain, and processing Group Policy settings are available in Windows 10 Home.

a Windows PowerShell command in verb-noun format

CMDlet

False

Changes in the ownership of a file do not change the amount of data that is considered to belong to a user.

metadata

Characteristics of a file such as file name, creation data, and modified date are known as which of the following?

True

Client Hyper-V can use either VHD or VHDX virtual hard disks.

What three tasks are performed by Plug and Play to prepare a disk to work with the computer?

Components can be powered down to save power, others are unplugged, and some are wireless and are out of range. Plug and Play technology assumes that hardware components can be connected or activated at any time while the operating system is running. The device driver is automatically loaded by the plug and play system and, after a brief initialization period, the hardware is available for use.

False

Control Panel is no longer available in Windows 10, so you should use Settings for all configuration tasks.

True

Cortana can optionally link external accounts that the user has on services such as Office 365.

Windows PowerShell

Currently, administrators are more likely to create new scripts in ___________________ than to create batch files and use reg.exe

PPPoE

DSL connections usually use which protocol in order to secure connections?

Event Trace

Data Collector Sets organize multiple counters into a single unit. Which type of data can a Data Collector Set monitor to track when system events occur.

True

Data Execution Prevention (DEP) is a processor feature in Windows 10 that monitors processes to ensure that they do not access unauthorized memory spaces.

loopback address

Data sent to which of the following returns to the computer that sent it and does not appear on the actual network?

Microsoft Intune is a service based in the cloud that is used to manage computers and mobile devices.

Describe Microsoft Intune.

Name—Each service is given a name to identify it. You can modify the name of a service, but it is not recommended. For example If you call a vendor for support, the vendor will expect services to be using standard names.

Describe a service in Windows. Provide and example.

Each authentication factor is a different form of evidence confirming the user's identity. Instead of authenticating with one factor, like a password, the user must be able to prove at least two, a challenge known as two-factor authentication

Describe multifactor authentication and its benefits.

• Synchronization is based on templates for fine-grained control of specific application settings. • Synchronization can be performed between multiple operating systems where user profiles would not be compatible. • Settings are synchronized while the user is signed in rather than at sign-in or sign-out

Describe the advanced functionality that UE-V provides over roaming profiles?

• The Domain Admins group becomes a member of the local Administrators group. • The Domain Users group becomes a member of the local Users group. • The Domain Guests group becomes a member of the local Guests group.

Describe the changes that occur when a workstation joins a domain.

Windows Insider Preview Branch Current Branch Current Branch for Business Long Term Servicing Branch

Describe the four distinct servicing branches in Windows 10.

• The domain partition holds the user accounts, computer accounts, and other domain- specific information. This partition is replicated only to domain controllers in the same domain. • The configuration partition holds general information about the Active Directory forest. Also, applications such as Exchange Server use the configuration partition to store application specific information. This partition is replicated to all domain controllers in the Active Directory forest. • The schema partition holds the definitions of all objects and object attributes for the forest. This partition is replicated to all domain controllers in the Active Directory forest.

Describe the three domain partitions that Active Directory are divided into?

Software installs and uninstalls—Software tracked here includes driver and operating system updates. • Application failures—Any application that stops responding is logged here. • Windows failures—Any system failure that results in blue screen errors and boot failures is logged here. • Miscellaneous failures—Any event not included in other categories is logged here. One type of failure recorded here is improper shutdowns.

Describe the types of data that can be collected by Reliability Monitor.

True

Domain controllers download Group Policy settings every five minutes.

Device setup classes

During the installation process for a new device, what are used in order to describe how the installation should be performed?

can have a large number of volumes and also supports some fault-tolerant disk configurations

Dynamic disk

5 GB

Each Microsoft account is allocated how much storage that can be used for file storage in OneDrive?

User

Each Win32 application runs in its own virtual memory space and is executed by the processor in which mode?

cmdlet

Each ______________ in PowerShell is in a verb-noun format

organizational units (OUs)

Each domain can be subdivided into which of the following, that allow you to organize the objects in a domain?

pool

Each storage _________ is identified by the physical disk members that are grouped within it.

SAM

Each time a user logs on locally, which database is used to verify sign-in credentials?

True

Every object in Windows 10 has audit events related to it.

Data synchronization copies files locally to mobile computers. Then, users can work with the files whether they are connected to a network or not. At some point, the changed files are copied back (uploaded) to the server. The timing of the synchronization varies depending on the technology used for data synchronization.

Explain how data synchronization is a valid solution when there is either no connectivity or poor connectivity to connect to a workplace network

Local user accounts can be used to access resources on other computers in a workgroup or a domain.

False

allows multiple users to have applications running in the background on a Windows 10 computer at the same time

Fast user switching

Home

File Explorer contains ribbon tabs that can be used for various functions. Which ribbon tab has buttons for manipulating files and folders?

File

File Explorer contains ribbon tabs that can be used for various functions. Which ribbon tab provides options to open a new File Explorer window, command prompt, or Windows PowerShell prompt that is focused on the current folder?

False

Files and folders on an NTFS file system in Windows 7 cannot use Unicode characters in the filename.

OneDrive client

Files stored in OneDrive can be accessed directly from the OneDrive website or by using the

Group Policy Preferences

For domain-joined computers, what is the simplest way to configure VPN connections?

differencing

For virtual hard disks, creating a checkpoint triggers the creation of a ________________ disk.

Apps distributed through Microsoft Intune are defined by the administrator using a utility called the Microsoft Intune Software Publisher.

How are Apps managed by Microsoft Intune?

Microsoft Intune users are typically created as identities associated with an Office 365 tenant account.

How are users typically added to Intune?

Desktop computers can also be managed by Microsoft Intune if the Intune client is installed on them. Supported operating systems include: • Windows Vista—Business, Ultimate, and Enterprise editions • Windows 7—Professional, Ultimate, and Enterprise editions • Windows 8/8.1—Professional and Enterprise editions • Windows 10—Pro and Enterprise edition

How can Intune manage client desktop computers?

• Upgrade the disks • Implement mirrored Storage Spaces • Move the paging file to a nonsystem disk

How can you increase disk performance to avoid disk bottlenecks?

• Change to a faster processor • Add additional processors • Change to a multicore processor

How can you resolve a processor bottleneck?

Remote control technologies improve on remote access technologies by reducing the amount of data that needs to be sent between the client and the server. The remote client uses remote control software to send keyboard and mouse commands to the computer being remotely controlled. These commands are processed on the remote-controlled computer, not on the remote client computer. The remote client is sent a visual update of the screen from the remotely controlled computer.

How do remote control technologies improve on remote access technologies? Explain how this occurs.

I am unsure but I didn't see anything in the chapter on how to "Configure alters with Intune". I think you mean how to configure an alert. Hopefully the below answer is correct Part of configuring an alert is to determine the severity of the problem: Critical, Warning, or Informational.

How do you configure alters with Intune?

Intune groups are managed from the Groups workspace in the Microsoft Intune Admin console (https://manage.microsoft.com). The Intune user accounts are defined in Azure AD, usually as part of an Office 365 tenant account.

How does Intune work with groups of devices and users?

by using a Windows on Windows 64 (WOW64) virtualized environment to host Win32 apps.

How does the 64-bit version of Windows support 32-bit applications?

4GB

How much RAM is supported by the 32-bit version of Windows 10.

False

Hyper-V only allocates dynamic memory while the virtual machine is turned off.

Extensible Authentication Protocol (EAP)

IKEv2 requires the use of which of authentication protocol?

False

IPX is the most popular networking protocol in the world today.

Previous Versions

If File History or Backup and Restore (Windows 7), or both, had been configured to protect user data, that data can be recovered using which feature?

APIPA

If Windows 10 is configured to use dynamic IP configuration and is unable to contact a DHCP server, the default action is to use which type of address?

True

If a Windows 10 computer has multiple network interfaces active, each can be assigned a different network location, each with different firewall settings based on their assigned network location.

processor affinity

If a thread is not finished running, perhaps because it had to wait or it was preempted, it is typically restarted on the same processor that previously ran it. What is this known as?

512 MB

If you configure a virtual machine with dynamic memory, what is the default minimum RAM that will be configured?

False

If you do have a legacy DOS or Win16 application that you need to run, you can use a 64-bit version of Windows 10.

unattend.xml

If you do not specify an answer file, then which of the following will Sysprep search for to use as an answer file?

package management

If you have obtained the .appx file for a Windows Store app, you can install the app from a source other than the Windows Store. What is this ability known as?

reg.exe

If you need to read or write registry entries from a batch files, then you can use ______________________.

Personalization

If you want to change the background of your display, which settings category should you open?

Accounts

If you want to configure connectivity for a user's work or Office 365, which settings category should you open?

configuration

In Active Directory, which partition holds general information about the Active Directory forest?

Quick access—When you select this node, a list of recently accessed files and folders are displayed. You also have the option to pin folders in Quick access. For example, if you are working on several projects, you can pin the folder that stores files for each project in Quick access. • OneDrive—This node provides access to OneDrive cloud storage that is associated with a Microsoft account. • This PC—This node displays the fifiles and folder for locally attached storage. This includes hard disks, USB drives, and DVDs. • Network—Use this node to display computers on the local area network (LAN). If the computers have shared resources, you can browse file shares and shared printers. • Homegroup—Use this node to browse and connect to existing homegroups. You can also create a new homegroup from this node

In File Explorer, the left navigation pane provides a way to move quickly to various locations where files may be stored. Describe the file storage locations available by default in the left navigation pane.

Experience tab

In Remote Desktop Connection, which tab allows you to enable and disable various display-related settings that can impact the amount of data sent between the local and remote computers?

Windows Defender

In Windows 10, ____________________ provides both antivirus and antispyware capabilities.

ntvdm.exe

In Windows 10, a virtual instance of DOS is created for each DOS application that is executed. What is another name for this virtual instance of DOS?

False

In Windows 10, advanced audit policies can only be edited at a command-line.

True

In Windows 10, most actions that are triggered by an Administrator do not result in a prompt from User Account Control.

Sysprep

In Windows 10, the only supported method to configure the default profile is to use which utility?

False

In Windows 10, the standard protocol for computers to format and exchange data across a network is Remote Assistance.

index

In Windows 10, which of the following is updated each time a file is changed to ensure that search results are current?

Quarantined items Allowed items Allowed items

In Windows Defender, you can view the history of items that were deleted. Describe the three options for viewing the history.

generalization

In a corporate environment the most common use for Sysprep is preparing workstations to capture an image. What is this process known as?

file types

In addition to defining which locations are indexed, what else are you able to configure to be indexed by Windows 10?

System Center Configuration Manager

In large environments, a better option for .msi application deployment is to use ______________________.

Shift

In order to stop the automatic sign-in from occurring, which key should be held down during the boot process?

BranchCache

In which technology are files stored in a file share in a central location, but are cached at the remote site to make it faster to open the files?

alerts

Instead of logging performance counters to disk, you can configure which of the following to occur?

MSP

Intune can distribute third-party updates in which of the following formats?

False

Layer 2 Tunneling Protocol provides both authentication and data encryption for the VPN client and remote access server.

False

Like Resource Monitor, Performance Monitor allows you to select the counters you wish to view.

Mobile application management Password management Manage corporate-owned Apple iOS devices Deploy profiles for VPN, certificates, email, Wi-Fi Manage device capabilities Reset, wipe or retire devices

List the Intune capabilities for managing mobile devices.

Live virtual machine migration Hyper-V replica

List two features that are available in Hyper-V on Windows server OSs that are not available in Client Hyper-V.

True

Local printing requires that a printer be connected directly to a Windows 10 computer by using a cable.

Security Accounts Manager (SAM)

Local user accounts are stored in the ___________________________________ database of Windows 10.

exists at the very first sector of an IBM-formatted hard disk

MBR

Performance Monitor Users

Members of which group are able to monitor performance counters on the computer, but cannot access performance logs.

Performance Log Users

Members of which of the following groups are able to monitor performance counters and access performance logs on the computer?

Backup Operators

Members of which of the following groups can back up and restore all files and folders on the computer?

False

Microsoft Intune cannot share the responsibility of managing mobile devices with other services.

False

Microsoft Intune policies apply only to domain joined devices.

False

Microsoft Intune requires an on-premises server infrastructure before it can be deployed.

What is the Microsoft Management Console?

Microsoft Management Console (MMC) snap-ins. A snap-in is the standardized format for creating system management utilities in Windows 2000 and later versions of Windows.

on-premises

Mobile devices can be managed directly or through ______________ connectors.

the computer remains in the S0 state but powers down as much hardware as possible

Modern Standby

partition table

Most of the partition attributes are stored in a data table that is part of the MBR or GPT specification. What is this table is commonly called?

False

Most organizations use the 32-bit version of Windows 10 rather than the 64-bit version of Windows 10.

True

Multitasking settings control how you work with multiple windows and apps in Windows 10.

True

NTFS permissions can be easily circumvented when you have physical access to a computer.

True

NTFS stores files and folders in a way that looks very similar to the FAT file system.

a file that stores user-specific registry information

NTUSER.DAT

a standard process for creating names on a network or standalone computer

Naming convention

False

Network bottlenecks are more common for computers than servers running Windows 10.

Microsoft Print to PDF

New in Windows 10 is a virtual printer for PDF documents named

False

New in Windows 10 is a virtual printer for PDF documents named Microsoft XPS Document Writer.

manifest

Newer Windows applications use which of the following to describe the structure of an application?

System

Notification & actions can be found in which category of the Settings tool?

a profile that is merged with all other user profiles

Ntuser.ini

volumes

On dynamic disks, the term partition is not used to define the space where a file system is installed. What term is used?

Advanced

On the ______________________ tab in Remote Desktop Connection, you can configure server authentication settings and Remote Desktop Gateway (RD Gateway) settings.

True

One problem with CHAP is that is easy to obtain credentials during authentication.

GUID

Part of the UEFI specification defines the _________ Partition Table (GPT) as a replacement for MBR disk partitioning.

counters

Performance indicators are often called ____________________ because they display values for system characteristics.

threads

Programmers compile a list of instructions to build their applications. These instructions are typically grouped into units of code called

True

Public networks allow traveling users to obtain a remote network connection.

3389

Remote Desktop listens on which TCP port number?

Protocols

Rules for communicating across a network that define how much data can be sent and the format of that data is known as which of the following?

User

Running apps in which mode ensures that a poorly written app does not affect system stability?

memory

Running fewer applications at once is a way to resolve which type of bottleneck?

increases security on your computer by forcing you to press Ctrl+Alt+Delete before logging on

Secure sign-in

True

Secure sign-in increases security on your computer by forcing you to press Ctrl+Alt+Delete before signing in.

value assigned to each user account within the SAM database

Security Identifier (SID)

Histogram bar

Selecting a counter to display will display information about that counter's collected data as a chart type. Which chart type displays the current value of each performance counter in decimal format?

Home Professional Enterprise Education

What are the four mainstream versions of Windows 10

Printer driver

Software Windows 10 uses to understand and use the features of a printer is known as which of the following?

True

The ACPI standard defines a number of global power management states.

Password

The Account Policies category contains the ____________________ policy and the account lockout policy.

False

The Account Policies in the Local Security Policy can be used to control domain accounts.

False

The Administrator and a user-specified initial account are called built-in accounts because they are created on every Windows 10 computer.

False

The DVD boot installation method is the most suitable method for a large volume of computers.

False

The Devices and Printers applet is capable of installing printers on remote computers.

False

The Ease of Access category of settings is for people that have a touch screen instead of a mouse.

Group Policy object

The Group Policy settings used by Windows 10 are contained in which of the following?

Everyone

The Guest account derives all of its privileges from being a member of the Guests group and which other group?

tenant

The Office 365 __________ account has to be identified with a name in Azure AD after which, users can be created as part of that account.

10%

The OneDrive Recycle Bin is limited in capacity. What percentage of the storage limit purchased for OneDrive storage is the typical capacity of the OneDrive Recycle Bin?

True

The Recovery option in the Services tool allows you to specify which action is taken after first, second, and subsequent failures.

False

The Services tab in Task Manager shows all user applications running on the computer.

smart paging

The _______________ area is used only when overuse of dynamic memory is preventing virtual machines from starting.

iSCSI Initiator

The ____________________ tool lets you configure Windows 10 to communicate with iSCSI targets and use the iSCSI targets as external disks over the network.

Microsoft deployment Toolkit (MDT)

The _________________________ is a solution that helps you configure scripted installations of operating systems and applications.

True

The choice of file system can limit the total amount of data stored in a partition or volume.

False

The domain network category is used when the computer is connected as part of a peer-to-peer network in a trusted location.

Offline Files

The file locations indexed by default are ____________________, the Start Menu, and C:\Users (except the AppData subfolder in each profile).

as part of the EMS

The full Intune product is available through which of the following?

ImageX

The functionality provided by which of the following Windows 7 features has now been included in DISM for Windows 10?

True

The installation process of Windows 10 takes a snapshot of the computer's hardware and calculates a digital signature to identify that computer.

Group Policy

The local security policy is part of a larger Windows management system known as which of the following?

Azure AD

User accounts that are enrolled to be managed by Microsoft Intune must be linked to which of the following?

True

The most common use for AppLocker is malware prevention.

True

The most recent iteration of Windows Store apps is Universal Windows Platform apps, also known as Universal apps.

Universal Windows Platform apps

The most recent iteration of Windows Store apps is _____________________, also known as Universal apps.

True

The option to manage printers in Settings is new for Windows 10.

Universal Naming Convention (UNC)

The path to the distribution share should always be referred to by which path to ensure that it can be accessed over the network during unattended installations?

True

The preferred method for configuring applications and Windows 10 is to use the interfaces provided for that purpose.

Encryption

The process of taking data and making it unreadable is known as which of the following?

hives

The registry is divided into sections and levels of data. Multiple sections exist to organize data by purpose. What are these individual sections called?

True

The simplest automated deployment method is to create a batch file that does a silent install of the application.

ICS

The two most common mechanisms for sharing an IP address are a router or which of the following?

a collection of desktop and environment configurations for a specific user or group of users

User profile

BitLocker Drive Encryption

To address the risks to data stored on computers and laptops, which encryption technology is available in Windows 10?

MBAM agent

To enable centralized management of BitLocker, you need to install which of the following on each computer?

Assessment and Deployment Kit (ADK)

To help identify and resolve app compatibility issues, the Windows 10 ____________________ includes the Application Compatibility Toolkit (ACT).

schema

To make Active Directory more manageable, it is divided into the domain partition, configuration partition, and what other partition?

SSL

To prove that an app can be trusted by a device, the developer signs the code using an _______ code signing certificate.

Health Attestation Reports

To see a list of Intune-managed devices for which Secure Boot is not enabled, which report should you check?

Effective Access

To see the permissions a user has to a file that takes into account their group memberships, what tab should you open in the Advanced Security Settings window for the file?

.msi

Traditional Win32 or .NET Framework apps are commonly packaged as which type of file?

With fast user switching, only one user can be actively using the computer at a time.

True

Unknown

Until a new disk is initialized, what is its status reported as?

SharePoint Online

Using Office 365, you can synchronize files from libraries located in which of the following?

False

Virtualization allows the software of multiple physical computers to be shared by multiple operating systems running at the same time.

a virtual disk

Volume

mount points

Volume ______________ are also known as junction points and are created with the Disk Management console.

Get-Service | Get-Member

What PowerShell cmdlet shows all the properties and methods available for services?

Hyper-Threading presents logical processor cores to Windows instead of physical processor cores.

What is Hyper-Threading?

Branch Office Direct Printing

What Windows 10 allows you to centralize the administration of printers for remote locations but still keep WAN link utilization low because the print jobs stay local?

Steps Recorder

What Windows 10 feature captures a screenshot each time the user clicks on a screen item and saves the screenshots and users actions in a report that can be emailed or saved to a shared storage location?

relog

What Windows 10 feature is a user-specific data protection mechanism that protects local resources by allowing user files to be backed up to an external hard drive or a network location?

Client Hyper-V

What Windows 10 feature should you use if you need to run an older application on an earlier version of Windows using the same computer you are using to run Windows 10?

HomeGroup

What Windows 10 feature simplifies the configuration of peer-to-peer networks by removing the need to synchronize users and passwords on each computer?

• Log an entry in the application • Start a Data Collector • Run a scheduled task

What actions can be performed once an alert has been triggered?

Allow the connection Allow the connection if it is secure Block the connection

What actions can be specified for a Windows firewall rule?

• Access files from anywhere • Back up automatically to the cloud • Recover deleted or modified files • Edit files from a web browser • Edit files on mobile devices • Share files with others

What are some benefits of using OneDrive to store files?

a /q /quiet option for the setup.exe file

What are some of the automated deployment options available in Windows 10?

Initial account is visible on the sign in screen. the admin account is not visible on the sign in screen The administrator account has a blank password by default. the initial account does not have a blank password by default The initial account can be deleted. The admin account cannot be deleted

What are some of the differences between the Administrator account and the initial account?

• When you browse down into a folder from the root of a library, you are viewing a specific location and any files created are in that specific location. • When you are viewing the root of a library and create a new file or folder, the new item is created in the location specified as the default save location in the properties of the library. • If you share a library via a homegroup, then other users can create files in the folder set as the public save location

What are some of the file management issues to consider for libraries?

Increased address space Hierarchical routing to reduce the load on Internet backbone routers Simpler configuration through automatic address management Inclusion of encryption services for data security Quality of service Extensibility to support new features

What are some of the improvements found in IPv6?

File Settings—You can select whether encrypted files are indexed. You can also select whether words with different accents are treated the same, for example, whether resume and resumé are indexed as the same word. • Troubleshooting—You can rebuild the index if you believe it has become corrupted. You can also run a troubleshooter that guides you through the troubleshooting process. • Index location—You can move the index from the default location of C:\ProgramData\ Microsoft to another location. This can be useful if the C drive is becoming full and you have free space on a different partition.

What are some of the index settings that can be configured on the Index Settings tab of the Advanced Options dialog box?

Automatic discovery of the Work Folders If there are multiple Work Folder servers, you can still use automatic discovery, but you also need to configure each user object in Active Directory with the appropriate Work Folders URL. Another simple method that works when devices are not domain joined is manually entering the Work Folders URL.

What are some of the methods that can be used to configure clients for accessing Work Folders?

First Name First name and last initial First initial and last name

What are some of the most common naming conventions for user names?

The left-hand column displays small icons to identify the currently signed-in user and access File Explorer, system settings, and power controls. A description of each small icon can be seen by hovering the mouse over the icon. If desired, this column can be expanded by clicking the menu icon at the top of the column. The middle column lists a series of links, with the user's most used applications at the top, and a sorted list of installed applications below that. The right-hand column includes application live tiles that display up-to-date information from applications and allow the user to fully launch those applications. The application live tile feature was made popular by Windows 8; however, Windows 8 did not offer the blended experience of a Start menu together with application live tiles. Windows 10 offers the best of both worlds in its Start menu. Jump lists are reintroduced with Windows 10 to identify what content was recently opened by an application, or what content is automatically linked to the menu item. The left-hand column of the Start menu displays an arrow next to the Start menu item if the item has a jump list associated with it. Clicking the arrow will open the jump list for that item. If a user clicks an item on the jump list, the content or listed application is opened. If nothing is selected and the user clicks elsewhere, the jump list disappears

What are some of the new features of the Windows 10 Start menu?

Libraries Public Account Pictures Public Desktop Public Documents Public Downloads Public Music Public Pictures Public Recorded TV Public Videos

What are the folders included in the default public profile?

Direct memory access (DMA) channels—A legacy method for allowing devices to com- municate directly with system memory instead of passing data through the processor. This method is typically used for sound cards. Input/output (I/O) ranges—Addresses at which a device can be communicated with. A single device can have several addresses, with each address allowing access to a particular device feature or component. Interrupt request (IRQ) lines—A mechanism for devices to request time from the CPU. Memory address ranges—Address ranges in system memory that are dedicated to the device.

What are the four main resources a hardware component might use? Describe each.

Microsoft Edge is designed to perform much faster than Internet Explorer and many competing third-party browsers. Microsoft Edge presents a new way to surf and interact with the web. When a user signs in to a device running Windows 10 using a Microsoft account, data such as favorite sites and stored web content can be synchronized between all of the user's Windows 10 devices. The stored web content is known as a reading list, and can be viewed without a live Internet connection at the user's convenience. Web content can be cluttered with links, ads, and other formatting that make it hard to read some web text. Microsoft Edge allows the user to enable a reading view that can remove that visual clutter, improving the user's ability to focus on key content. To enrich the browsing experience, Microsoft Edge also allows the user to add notes, highlights, and free-form writing on a webpage. The annotated webpage can be saved for future reference or shared with others. Browsing the web has become a richer experience with Microsoft Edge, and finding information

What are some of the notable new features of Microsoft Edge

There is no easy way to move data from the virtual machine to the host computer. • The operating system in the virtual machine still needs to be managed with software up- dates and any other management considerations. • Some users find it confusing to use a separate virtual machine for some tasks.

What are some of the potential downsides to using Client Hyper-V?

User names must be unique user names must be 20 characters or less user names are not case sensitive user names cannot contain invalid characters

What are some of the restrictions imposed by Windows 10 on the user name?

Interactive logon Interactive logon Shutdown

What are some of the settings available in the security options of the local policy?

Allow log on locally Back up files and directories Change the system time Shut down the system

What are some of the settings available in the user rights assignment?

• Restarting a print job when there has been a paper jam and some pages have been destroyed • Pausing a large print job to let several other smaller print jobs be completed • Raising the priority of a print job to ensure that it prints next • Changing the schedule of a large print job to prevent it from printing during main office hours • Canceling a corrupted print job that is blocking other jobs in the queue

What are some of the situations where you might want to manage print jobs?

• Inventory • Standardized configuration • Software deployment • Operating system deployment • Software updates

What are some of the tasks you can accomplish with System Center Configuration Manager?

Name password group membership

What are some of the user account attributes that describe user and control access?

• Invitation file • Easy Connect • Administrator initiated

What are some of the ways Remote Assistance can be initiated?

The user profile is corrupted. The user profile is deleted accidentally The user is deleted from the system The user password is reset.

What are some ways EFS keys may be lost?

View your active networks Change your networking settings

What are the areas of Network and Sharing Center?

Network and Sharing Center Networks Connections

What are the basic components of Windows 10 that support networking?

• Easier for users • Clients are manageable

What are the benefits of using DirectAccess as a remote access solution?

Managing software updates— Antivirus/malware protection— Remote assistance— Software license management

What are the capabilities of the Intune desktop client?

System Devices network & Internet Personalization Accounts Time & language Ease of Access Privacy Update & Security

What are the categories available in Windows Settings?

Account policies Local policies Windows Firewall with Advanced Security Network List Manager Policies Public Key Policies Software Restriction Policies Application Control Policies IP Security Policies on Local Computer Advanced Audit Policy Configuration

What are the categories of local security policy settings?

It is not visible on the sign-in screen. It has a blank password by default. It cannot be deleted. It cannot be locked out due to incorrect sign-in attempts. It cannot be removed from the local Administrators group It can be disabled It can be renamed.

What are the characteristics of the Windows 10 Administrator account?

It cannot be deleted. It can be locked out. It is disabled by default. It has a blank password by default. It can be renamed. It is a member of the Guests group by default. It is a member of the Everyone group

What are the characteristics of the Windows 10 Guest account?

Client for Microsoft Networks File and Printer Sharing for Microsoft Networks QoS Packet Scheduler

What are the clients and services included with Windows 10?

Everyone—Allowed to print. • All Application Packages—Allowed to print and manage documents. This allows Windows Store apps to print and manage print jobs. • Creator Owner—Allowed to manage documents. This allows all users to manage their own print jobs. • User who installed printer (Userx)—Allowed to print, manage printers, and manage documents. • Administrators—Allowed to print, manage printers, and manage documents

What are the default permissions for printing?

Generation 1 Firmware is Bios - based Generation 2 is UEFI based Generation 1 Secure Boot is NA Generation 2 is enabled by default Generation 1 Disk Controller is IDE & SCSI Generation 2 is SCSI only Generation 1 Network adapter is Legacy and synthetic and Generation 2 is Synthetic only Generation 1 Floppy disk controller is Available and generation 2 is NA Generation 1 DVD drive is Included by default Generation 2 is available but without pass through option

What are the differences between Generation 1 and Generation 2 virtual machines?

• Enable-ComputerRestore • Disable-ComputerRestore • Checkpoint-Computer •Get-ComputerRestorePoint • Restore-Computer

What are the five PowerShell commands that can be used to update and automate the configuration of System Restore?

• Configuration Policies— Compliance Policies— • Conditional Access Policies— • Corporate Device Enrollment Policies— • Term and Conditions Policies—

What are the main categories of Intune policies?

domain-based networks are much easier to manage than user accounts for peer-to-peer networks. A central server called a domain controller is responsible for maintaining user accounts and computer accounts. All computers in the domain share the user accounts on the domain controller.

What are the main characteristics of a domain-based network?

Application Compatibility manager Inventory-collector package ACT Log Processing Service ACT database Microsoft Compatibility Exchange Runtime-analysis package

What are the main components of the Microsoft Application Compatibility Toolkit (ACT)?

• 64-bit version supports up to 2048 GB of RAM • Domain join • Group Policy management • Remote Desktop • Client Hyper-V • Enterprise Mode Internet Explorer (EMIE) • Assigned Access • Azure Active Directory join with single sign-on to cloud-hosted apps • Windows Store for Business • BitLocker drive encryption • Enterprise Data Protection • Windows Update for Business• Current Branch for Business • Easy Upgrade from Professional to Enterprise edition

What are the main features included with Windows 10 Professional

Workgroup Model When a computer is first connected to a network, it typically is configured as a member of a workgroup. A workgroup is a loosely knit collection of peer computers on a network where no computer has control or superior role to any other computer. The peers share resources with each other over the network. This can be useful for a small number of computers in a typical home or small business network. Domain Model The domain model is a client/server strategy that allows central administrative management of its members. A domain is a collection of computers and users that are identified by a common security database. The database is stored on one or more dedicated servers called domain controllers (DCs). Computers that are part of the domain can reference the domain database and read the user and computer accounts contained within.

What are the major differences between workgroup and domain models?

Add a printer—This option adds a new printer to the local computer. This printer can be physically attached or a network printer. This option scans the network just as when you add a printer in Printers & scanners. • See what's printing—This option allows you to see jobs in the print queue for the selected printer. Within the queue, you can pause or delete individual print jobs. • Set as default printer—This option allows you to configure a printer as the default printer for apps. In an app, such as Microsoft Word, when you click the Print button in the toolbar, the default printer is used. • Select printing preferences—This option allows you to configure basic printer settings and paper configuration. • Configure printer properties—This option allows you to edit all printer properties, including those for printing preferences, sharing, and security. • Configure print server properties—This option allows you to edit print server properties for the local computer. This includes setting available forms (page sizes), configuring ports, and managing drivers. • Remove device—This option removes the printer from your computer

What are the major tasks you can perform in Devices and Printers?

• Pause—Prevents the job from printing. If a job is partially finished printing, it stops at the end of a page. • Resume—Allows a paused print job to continue printing. • Restart—Restarts printing a job from the fifirst page. • Cancel—Stops a print job and removes it from the queue. The print job might not stop immediately, as it might take a few moments for the printer to remove the job from mem- ory and complete printing the final page. • Edit job properties—Allows you to change the priority of a print job or schedule the job

What are the management tasks that can be performed for each print job?

Windows can't verify the publisher of this driver software Windows cannot install this driver software This driver software has been altered

What are the messages that can appear if you attempt to install an unsigned device driver in Windows 10?

The most common bottlenecks to system performance are in the areas of disk, memory, processor, or the network.

What are the most common bottlenecks to system performance?

The most common DirectAccess issues are network connectivity and Group Policy application. If a client has never had DirectAccess working, verify that the computer account is in the proper group for Group Policy application. To troubleshoot the issue You can use gpresult.exe to help identify why the GPO is not being applied.

What are the most common issues with using DirectAccess? What can be done to troubleshoot those issues?

Modified boot files Lost encryption keys Lost or forgotten startup PIN

What are the most common reasons that the BitLocker Drive Encryption recovery password is required?

Turn on network discovery Turn off network discovery

What are the options for network discovery?

Turn on sharing so anyone with network access can read and write files in the Public folder Turn off public folder sharing Turn on password protected sharing Turn off password protected sharing

What are the options for sharing the Public folder in Windows 10?

Off Starting Runing Paused Saved

What are the possible states for virtual machines?

With power management the latest hardware power standards can consume less power than ever before. This power economy can translate into laptops that can run longer on battery power and buildings full of computers that will reduce companies' energy bills significantly. Power management features include the Fast Startup feature of Windows 10 captures the state of the computer's operating system and drivers, saving them to a file on the local hard drive before the computer enters a low-power hibernation mode. When the computer is woken up, the hibernation image is loaded faster than starting the operating system from scratch. If a device running Windows 10 supports hibernation, this feature can be enabled primarily as a software feature. Power management features include the Modern Standby feature allows a device to sleep but continue to perform basic tasks like downloading Windows updates, checking for new email for the user, or notifying users when someone is trying to reach them through an online chat request. This feature is specific to computer hardware that supports Modern Standby and would be used as a shopping criterion during the device acquisition stage.

What are the power management features included with Windows 10?

You can install Client Hyper-V for Windows 10 Pro, Windows 10 Enterprise, and Windows 10 Education editions. 64-bit processor with Second Level Address Translation (SLAT) Processor support for VM Monitor Mode Extension Virtualization enabled in firmware— Hardware enforced data execution prevention (DEP)—

What are the prerequisites for installing Client Hyper-V in Windows 10?

Hkey_Classes_Root Hkey_Current_user Hkey_Local_Machine Hkey_users Hkey_current_config

What are the primary hives found in the Windows 10 registry?

• Active Directory—The WDS server must be a member server or domain controller in an Active Directory domain. • DHCP—DHCP is used by client computers to obtain an IP address and communicate with the WDS server. • DNS—DNS is used by client computers to resolve the host name of the WDS server. • An NTFS partition on the WDS server—The images must be stored on an NTFS-formatted volume on the WDS server.

What are the requirements for sucessful installation and use of WDS?

Account lockout duration Account lockout threshold Reset account lockout counter after

What are the settings available to control account lockouts?

Full control Change Read

What are the share permissions available in Windows 10?

Windows sign-in screen Secure sign-in Fast user switching Automatic sign-in Assigned access

What are the sign-in methods supported by Windows 10?

If the first octet is zero, the remaining octets identify local machines on the same network as the computer sending data. The special IPv4 address 0.0.0.0 is used in routing logic to represent "all other computers." • A first octet value of 127 identifies a destination that is local to the computer sending data. The address in this range that is commonly seen is 127.0.0.1, or the loopback address. Data sent to the loopback address returns to the computer that sent it and does not appear on the actual network. • A first octet identifying a Class D address represents a multicast address. Computers that belong to the same multicast group have the same multicast address assigned to them. Data sent to that multicast address attempts to deliver copies of the data to all multicast members with the same address. Class D addresses are not used to identify a single host computer with a unique IPv4 address. • A first octet identifying a Class E address is reserved for future use and special purposes. Class E addresses are not used to identify a single host computer with a unique IPv address. The special IPv4 address 255.255.255.255 is used as a broadcast address that rep- resents the destination "all computers in this network."

What are the special cases and consideration in the IPv4 class-based system?

Enable PXE in the client computer and configure it to boot from the network first. 2. Reboot the workstation and press F12 to perform a PXE boot. 3. The workstation obtains an IP address from a DHCP server and contacts the WDS server. 4. Select a PXE boot image if required. You may create additional boot images to support network drivers not available in the default Windows PE configuration. 5. The boot image is downloaded to a RAM disk on the client computer and Windows PE is booted. 6. Select an install image to deploy from the menu. 7. The install image is copied to the computer.

What are the steps taken by WDS when deploying an image?

1. Create a baseline for the computer. 2. Compare the baseline with current performance indicators. 3. Identify possible causes for variations from the baseline. 4. Identify possible fixes for variations from the baseline. 5. Select a fix to implement. 6. Implement the fix and monitor for changes. 7. If the problem is not resolved, undo the fix and repeat Step 5. 8. If the problem is resolved, document the solution for future reference

What are the steps to tune performance?

1. If there is no conflict, the settings for all policies are applied. 2. If there is a conflict, later settings overwrite earlier settings. For example, the setting from a domain policy overrides the setting from a local policy. This means that a child OU would be applied last and have the greatest priority by default. 3. If the settings in a computer policy and user policy conflict, the settings from the computer policy are applied

What are the steps used to determine which group policy settings to apply in Active Directory?

Analyze Configure Export

What are the tasks you can perform with the Security Configuration and Analysis tool?

Windows Firewall with Advanced Security utility Netsh Group Policy Windows Powershell

What are the tools available to perform advanced firewall configuration in Windows 10?

• Enable playback of sound from the remote computer on the local computer. • Allow printers from the local computer to be used in the remote session. • Allow copying of Clipboard data between the local and remote computers. • Allow hard drives from the local computer to be accessed in the remote session. • Allow smart cards on the local computer to be used in the remote session.

What can be configured within the Local Resources tab in Remote Desktop Connection?

• Increase the amount of physical memory • Run fewer applications at once

What can you do to reduce the use of virtual memory?

Application programming interfaces (API)

What do applications use to request services from the application environment subsystem?

install.wim

What do you need to install on a USB drive to use Windows to Go?

device drivers

What does Windows need to properly communicate with and use the functionality of hardware?

hibernate

What feature is supported in Client Hyper-V that is not supported in the server version?

enhanced session mode

What feature must you enable on a virtual machine to use RDP functionality?

checkpoints

What feature of Hyper-V virtual machines is very useful for testing because you can almost instantly reset a computer back to a previous state?

symbolic links

What feature of NTFS allows a file or folder to point to another file or folder located somewhere else in the file system?

EFS

What feature of NTFS encrypts the contents of files?

iOS device management will fail

What happens if an APN certificate expires?

an inexpensive way to combine, or pool, the storage of multiple physical disk drives. Storage Spaces can also provide fault tolerance with data redundancy across multiple disks. Implementing Storage Spaces is easier and less expensive than most consumer-level, hardware-based solutions for disk redundancy.

What is Storage Spaces?

a VHD Set is a single virtual hard disk, but it is composed of multiple files. You might use one if multiple virtual machines need to share access to the same virtual disk.

What is a VHD Set and why might you use one?

When you need to create many virtual machines, differencing disks can be used to minimize the amount of disk space used. Differencing disks have a single parent disk that does not change. All changes are stored in the differencing disk and there can be multiple differencing disks that attach to a single parent.

What is a differencing disk and when is it used?

RAID 1

What is a mirrored volume also known as?

A private network does not have connectivity to an external network or the host operating system. You can use a private network to create a completely isolated environment for testing.

What is a private network in Hyper-V and why might you use one?

A virtual hard disk (VHD) is an image format that replicates the contents of a hard drive, with all the data and structural elements of the drive, but is accessed and installed in a virtual ma- chine infrastructure.

What is a virtual hard disk?

Continuum is a feature on Windows 10 When Windows 10 is installed on a computer with a touch screen, it can be used in desktop mode or tablet mode. Continuum automatically adjusts the display and input methods depending on the form factor being used. When a keyboard is detached or folded away, the device automatically switches to tablet mode. On mobile phones running Windows 10, Continuum for phone allows you to use your phone like a desktop computer when appropriate peripherals are connected. You can attach a mouse, keyboard, monitor, or projector.

What is continuum?

screen resolution

What is expressed as the number of horizontal pixels by the number of vertical pixels?

Nested virtualization allows for a single physical computer enabled as a Hyper-V host to have a virtual machine that is also enabled as a Hyper-V host.

What is nested virtualization?

Performance tuning lets you optimize the performance of Windows 10 to function at acceptable standards.

What is performance tuning?

certificate

What is required for Apple iOS devices to establish a trust between the device and the Intune service?

The Memory buffer setting specifies the level of free memory required before additional memory is allocated. For example, with the default setting of 20%, a virtual machine with 2048 MB allocated and only 100 MB free would be allocated more memory because there is less than 20% free.

What is the Memory buffer setting for dynamic memory? Give an example.

The Office 365 tenant account is a subscription container for Office 365 services. A company commonly sets up only one production Office 365 tenant account, and adds users to that account. Purchased Office 365 licenses within the tenant account can be assigned to the user accounts that belong to that tenant.

What is the Office 365 tenant account and how is it used with Intune?

nickname.onmicrosoft.com

What is the default format for an Office 365 tenant account?

42 days

What is the default value for the "Maximum password age" setting in the Password Policy?

UPN

What is the format for user names used by Office 365 apps?

Hardware ID

What is the most specific device identification string?

OneDrive

What is the name of the cloud-based storage that is automatically included for free when a Microsoft account is created?

hybrid sleep

What is the name of the power state in which the computer is in the S3 state, but prepared for the S4 state?

automatic discovery

What is the preferred method to configure clients to use Work Folders?

These settings configure which types of notifications are displayed and where they are displayed. For example, you can enable or disable tips about Windows. You can also control whether notifications are displayed on the lock screen. You can also configure which system icons are displayed in the notification area of the taskbar.

What is the purpose and function of Notifications and actions in the System category of Settings?

it disables Wi-Fi and Bluetooth connectivity.

What is the purpose of Airplane mode in the Network & Internet category of Settings?

When Remote Desktop Connection is configured to use an RD Gateway, RDP traffic is tunneled in HTTPS packets to the RD Gateway server. The RD Gateway server sends the RDP packets on to the internal network.

What is the purpose of configuring an RD Gateway server in Remote Desktop?

This hive defines file types (classes) and properties associated with those types. for example, file type associations are stored here. This hive is a combination of HkCU\Software\Classes and HKLM\Software\Classes. If settings for a file type are defined in both locations, the user-specific settings take precedence

What is the purpose of the HKEY_CLASSES_ROOT hive?

This hive contains the user-specific registry information from ntuser.dat stored in the user profile. Any application or operating system settings that are user specific are stored in this hive. If you are attempting to fix a user-specific application issue, the support document will have you review and modify keys here.

What is the purpose of the HKEY_CURRENT_USER hive?

diskpart.exe

What utility should you use to perform a series of disk maintenance activities as part of a scheduled task?

Foreign Disk

What will the Disk Management console report as the status of a disk when it recognizes that the disk does not belong to that computer?

If a user signs in locally, the SAM database is used to verify sign-in credentials. If a user signs in by using a Micro- soft account, the Microsoft account credentials for the user account in the SAM database are verified with Microsoft over the Internet. SAM database is not used If the computer is part of an Active Directory domain, and the user signs in using a domain user account

What is the purpose of the Security Accounts Manager (SAM) database? Describe how it is used in Windows 10? When is it not used by Windows 10?

This category allows you to configure connectivity to your work or Office 365. If you connect to your work, you are participating in Mobile Device Management (MDM) where policies from your work are applied to your Windows 10 device. For ex- ample, MDM could be used to wipe your device after you lose it

What is the purpose of the Work access settings in the Accounts category?

service administrator

What is the secondary administrator that can be specified for Intune called?

page description language

What is used by Windows 10 to define the layout of content for a print job?

ODBC

What is used to configure data sources for applications that require access to a database?

Windows Memory Diagnostics Tool

What is used to perform tests on the physical memory of a computer running Windows 10?

Network Level Authentication

What is used to prevent users to connecting to Remote Desktop until the connection is authenticated?

integration services

What must be installed on a virtual machine to allow PowerShell Remoting from the Hyper-V host?

Virtual Desktop

What new feature in Windows 10 allows the user to create multiple desktops that can host different open windows?

Before modifying the registry, you should export any keys that you will be changing to a .reg file. If the registry change does not go as planned, you can import the .reg file to restore the previous level of functionality. In this activity, you restore a .reg file and verify that the contents imported properly.

What precautions should be taken before modifying the registry?

• Verify that no unusual activity is happening on the workstation. For example, ensure that no applications are performing large queries to databases or processing batch jobs, unless that is the normal state of the computer. • Measure performance indicators over time. By measuring performance indicators over time, you can see an average value for the indicators. Average values are less volatile and more accurate than measuring with snapshots of short duration

What should you do to ensure that you are measuring the normal state when establishing a baseline?

MMC

What should you open if you want to add snap-ins to create a custom management console?

SID

What system-specific data does the workstation create when a generalized image is applied to a workstation? Answer: Computer

dial-up networking

What technology behaves like an "always-on" VPN connection?

• Pre-shared key • Certificates • Kerberos

What three things can authentication for IPsec be based upon?

Sysprep

What tool do you use to generalize an image and select a system cleanup action?

SIM

What tool is used to place a customized image on a distribution share?

iSCSI Initiator

What tool should you use to configure computers to communicate with external disks over standard Ethernet networks?

Local Security Policy

What tool should you use to configure password policies and auditing policies?

System Configuration

What tool should you use to configure which devices and services start when Windows boots?

Printer Management Tools

What tools are available for managing printers in Windows 10?

Disk

What type of bottleneck occurs when Windows 10 and running applications want to read and write information to the physical disk in the system faster than the disk can manage?

memory

What type of bottleneck occurs when the applications you are running require more memory than is physically available in the computer?

virtual

What type of disk can be stored in a single file on a physical disk?

hash

What type of encryption algorithm is one-way encryption, which means that it encrypts data, but the data cannot be decrypted?

symmetric

What type of encryption algorithm uses the same key to encrypt data and decrypt data?

asymmetric

What type of encryption algorithm uses two keys to encrypt and decrypt data?

UEFI

What type of firmware should you look for on a PC if you want the computer to support GPT partitions?

Spyware

What type of software is silently installed on your computer, monitors your behavior, and performs actions based on your behavior?

data synchronization

What type of technology allows users to work with files whether they are connected to network or not by copying files locally to mobile computers?

external

What type of virtual network should you create if your virtual machine should be able to communicate with the Internet?

internet Local intranet Trusted sites Restricted Sites

What types of zones are available in the Security tab in the Internet Options of Internet Explorer?

Performance Monitor

What utility allows you to visually display the data generated by counters, and allows you to select the individual counters you want to view?

User State Migration Tool (USMT)

What utility can be used to migrate user settings, documents, and application configuration settings from the previous operating system to Windows 10?

Windows Deployment Services (WDS)

When DISM is combined with which of the following, you can completely automate the deployment process to include partitioning and formatting hard drives?

deep-linking

When Intune adds a managed app as a pointer to an external website or store installation URL, what is this called?

Domain network

When Windows 10 can communicate with a domain controller, the network connection is automatically placed in which location category?

IKEv2

When a VPN connection loses connectivity due to a network interruption, which protocol can reconnect automatically once network connectivity is restored using a feature known as VPN Reconnect?

Microsoft

When a Windows 10 computer is not part of an Active Directory domain, you can sign in by using a local user account or a _________________________ account.

.rdp file

When a client connects to a RD Web Access server, what type of file is downloaded that includes all of the necessary configuration information for connecting to the desktop of RemoteApp?

bottleneck

When a limitation in a single computer system component slows down the entire system, which of the following occurs?

device identification string

When a new device is installed into a Windows 10 computer, the operating system uses a device setup class and which of the following in order to properly install the new device?

False

When a new hard disk is added to a computer it is initially configured as a dynamic disk.

the Intune service waits for the device to check in

When an Intune policy is deployed, what happens if the device doesn't acknowledge the notification?

registry

When applications or Windows 10 starts, they read their configuration information from which of the following?

True

When deploying Apps with Microsoft Intune, required installs can have a deadline for installation defined.

checkpoint

When using virtual machines, you can revert to a __________ and undo recent changes.

True

When you establish a baseline, it is important to ensure that you are measuring the normal state of the performance indicators.

cluster

When you format a drive, you must choose the size of which of the following file system attributes?

Work folders

When you implement ____________________, each user is given a unique folder for file storage that can be synchronized across multiple devices.

Azure AD

Where are user accounts inside the Office 365 tenant stored?

Parent partition

Where in the Hyper-V architecture do device drivers reside?

Action Center

Where should you go on the Windows 10 desktop if you want to see important notifications from the operating system?

Application Compatibility Manager

Which ACT component is the administrative console that can be used to control the overall discovery, collection, and analysis process for apps?

domain

Which Active Directory component has a central security database that is used by all computers that are members of it?

Domain controllers

Which Active Directory component is responsible for authenticating users when they log on to a workstation?

Intel VT

Which CPU feature must be present to run Client Hyper-V?

User Accounts

Which Control Panel applet is considered a simplified interface for user management?

NoRpFix

Which DISM option prevents files with reparse points outside the specified path from being captured?

tracert

Which IP utility is used to display response times for every router on the path to the destination?

Internet

Which Internet Explorer security zone includes all Internet Web sites that are not specifically assigned to another zone?

Web Slices

Which Microsoft Edge feature allows you to mark up a webpage with your own content?

Disk Quotas

Which NTFS feature allows an administrator to restrict the amount of disk space used by a user?

Volume mount points

Which NTFS feature allows an empty folder in an NTFS-formatted file system to point to another partition or volume in the local computer?

Write

Which NTFS permission allows a user to open and make changes to files but not delete them?

Fast user switching

Which Windows 10 feature ensures that a second user can log on to a locked computer without logging off the first user and losing their work?

Windows Recovery Environment (WinRE)

Which Windows 10 feature provides an automated diagnosis and repair of boot problems plus a centralized platform for advanced recovery tool?

PackageManagement

Which Windows 10 feature provides the ability to obtain software from a central repository?

QoS Packet Scheduler

Which Windows 10 service controls the flow of network traffic in Windows 10?

Continuum

Which Windows feature automatically adjusts the display and input methods depending on the form factor being used and whether a hardware keyboard is active?

Start menu

Which Windows feature includes three columns and includes live tiles in the right-hand column?

Cortana

Which Windows feature uses audio and speech to interact with a user to search for information?

Guest

Which account has extremely limited access to resources and computer activities and is intended for occasional use by low-security users?

Administrator

Which account is the most powerful local user account possible?

privilege use

Which advanced audit policy setting tracks when tasks are performed that require a user rights assignment, such as changing the system time?

Monitoring

Which alert category in Microsoft Intune should you use to get a notification when an automatic service fails to run?

Disk

Which area of the Resource Monitor is used to monitor disk performance and determine whether the disk subsystem is a bottleneck?

Hypervisor

Which component of the Hyper-V architecture controls all communication with the physical hardware on the computer?

downloading

Which distribution method delivers the critical components of an application first and allows the users to being using the application before installation is complete?

ReFS

Which file system is designed to verify and autocorrect data faults on the volume without having to bring the volume down for maintenance?

NTFS

Which file system should you use if you want to use EFS?

FAT32

Which file system was introduced with Windows 95 OSR2 to support hard disks that were becoming much larger than 2 GB in size.

DVD Boot

Which installation method is suitable for small organizations that only occasionally install Windows 10?

image based

Which installation method is the fastest type of installation and provides the highest level of customization?

Private network

Which location type is used when the computer is connected as part of a peer-to-peer network in a trusted location?

Public network

Which location type is used when the computer is connected in an untrusted public location such as an airport?

Remote Assistance

Which of the following allows a user to send an invitation to a remote user that invites them to remotely connect to the local computer?

Remote Access

Which of the following allows clients to access resources local to the server as if the client was on the same network as the server?

Snap

Which of the following allows windows to quickly be resized by clicking the title bar of the window and dragging it to the top, sides, or middle of the screen?

Spooling

Which of the following allows you to begin using an application faster after printing by storing the print job as a file and sending the print job to the printer as a background process?

Network location awareness

Which of the following allows you to configure the security settings for each location type differently?

DFS namespace

Which of the following appears to be a single, large file structure, but can really be composed of shared folders on multiple servers?

User accounts

Which of the following are required for individuals to log on to Windows 10 and use resources on the computer?

Distribution shares

Which of the following are software packages containing drivers, service packs, or security updates that are applied to an image during the offlineServicing configuration pass of the installation.

Reports

Which of the following are used to process log file data and display it in a meaningful way?

Plug and Play technology

Which of the following assumes that hardware components can be connected or activated at any time while the operating system is running?

Group Policy Preference

Which of the following can be pushed down to a computer and can be changed by the user?

AppLocker

Which of the following can be used to define which programs are allowed or disallowed in the system?

oobeSystem

Which of the following configuration passes is applied during the portion of the installation where users are asked for information after the second reboot?

offlineServicing

Which of the following configuration passes is used to apply packages to a Windows 10 image after it is copied to the computer hard drive, but before it is running?

WSUS

Which of the following contacts Microsoft Update and downloads updates rather than each client computer downloading updates?

Active Directory

Which of the following expands on the domain concept by linking domains in logical structures named trees, and multiple trees into forests?

FAT32

Which of the following file systems uses a 32-bit numbering system to increase the number of data blocks that can be managed and organized as part of a single partition?

Access Control Entries (ACE)

Which of the following identifies who can perform a given action to a file or folder and is found in ACLs?

DVD boot

Which of the following installation methods is the least suitable method for a large volume of computers?

distribution share

Which of the following installation methods requires computers to be booted into Windows PE from removable storage and then run the Windows 10 installation from a server?

better backward compatibility

Which of the following is NOT a benefit of using VHDX instead of VHD format virtual disks?

Windows 8.1 RT

Which of the following is NOT a desktop OS supported by Intune with an Intune client installed?

SecureCopy

Which of the following is NOT a method for copying user accounts from on-premises Active Directory?

Down

Which of the following is NOT a possible state for a virtual machine?

to make use of old workstations with few resources

Which of the following is NOT a typical scenario for using Client Hyper-V?

Firewall Policies

Which of the following is NOT an Intune policy category?

Automatically start at the following time

Which of the following is NOT an automatic start action you can choose for a virtual machine?

Windows 7

Which of the following is NOT an operating system supported by Microsoft Intune as a mobile device?

User State Migration Tool

Which of the following is a Windows 10 tool for migrating user profiles to a new computer?

Generation 1 virtual machines use BIOS-based firmware; Generation 2 virtual machines use UEFI-based firmware

Which of the following is a correct statement about Generation 1 and Generation 2 virtual machines?

All Mobile Devices

Which of the following is a default Intune device group?

Ungrouped Users

Which of the following is a default Intune user group?

Microsoft Passport

Which of the following is a feature built into Windows 10 that supports MFA and will use a TPM, if available?

Windows PE

Which of the following is a limited and non-GUI version of Windows based on Windows 10 technologies that can be used for installing, troubleshooting, and repairing Windows 10?

Internet Explorer 10

Which of the following is a new Web browser included with Windows 10?

mandatory

Which of the following is a profile that cannot be modified?

Enter System Audit Mode

Which of the following is a system cleanup action you can select when you run Sysprep to generalize an image?

Spyware

Which of the following is a threat to privacy and is sometimes installed when you visit a website?

service

Which of the following is a type of Windows application that runs in the background without user interaction?

DHCP

Which of the following is an automated mechanism used to assign IP addresses, subnet masks, default gateways, DNS servers, WINS servers, and other IP configuration information to network devices?

TCP/IPv6

Which of the following is an updated version of TCP/IPv4 with a larger address space and additional features?

the Internet

Which of the following is considered one of the biggest sources of malware (malicious software)?

dial-up networking

Which of the following is considered the oldest technology for remote access?

Active Directory site

Which of the following is defined by IP subnets instead of physical locations?

network driver

Which of the following is responsible for enabling communications between Windows 10 and the network device in your computer?

security set identifier

Which of the following is the name assigned to the WAP to identify itself to clients?

configuration set

Which of the following is the subset of files in a distribution share that are required for a particular answer file?

must be digitally signed by Microsoft

Which of the following is true about 64-bit drivers that run in kernel mode on Windows 10?

Deployment Image Servicing and Management

Which of the following is used to perform offline servicing of WIM images?

Secure sign-in

Which of the following is used to protect your computer from malware that may attempt to steal your password?

User State Migration Tool (USMT)

Which of the following moves desktop settings and applications from one computer to another?

DNS

Which of the following protocols is used for resolving host names to IP addresses?

"Share with" method

Which of the following simplifies folder and file sharing by controlling both NTFS permissions and share permissions at the same time?

remote control

Which of the following software does the remote client use to send keyboard and mouse commands to the computer being remotely controlled?

Parity

Which of the following storage space types can only be created with three or more physical disks?

Multiprocessor

Which of the following systems have more than one physical CPU?

Windows on Windows 64 (WOW64)

Which of the following terms is used to describe a virtualized environment that hosts Win32 apps on the 64-bit version of Windows 10?

process

Which of the following terms represents a collection of data, files, and instructions with a specific purpose while it is running?

System Center Configuration Manager

Which of the following tools can be used to deploy operating systems to the point where you do not need to physically touch the computer?

Hyperthreading

Which of the following types of CPUs have extra hardware built in to allow more than one thread to be processed at the same time on a single CPU?

Basic disk

Which of the following types of storage can be partitioned using MBR or GPT and are supported by all versions of Windows?

Windows ReadyBoost

Which of the following uses a USB drive as a memory cache similar to a paging file?

the SMS client is installed

Which of the following would prevent the Intune client to be installed on an OS?

Postscript

Which page description language is the oldest and best supported?

TPM

Which part of the motherboard in your computer is used to store encryption keys and certificates?

account lockout

Which policy allows you to configure an account to be temporarily disabled after a number of incorrect log-on attempts?

password

Which policy controls password characteristics for local user accounts?

Print Management snap-in

Which printer management tool would you typically use to manage printer servers rather than individual computers?

product activation

Which process is designed to inform a user that an unscrupulous retailer is selling illegitimate copies of Windows 10?

DEP

Which processor feature monitors processes to ensure that they do not access unauthorized memory spaces, which is done by various types of malware, such as viruses, to take control of systems?

public

Which profile is different from other profiles because it is not a complete profile?

roaming

Which profile is stored in a network location rather than on the local hard drive?

default

Which profile is used when new user profiles are created?

TCP/IP

Which protocol is included with Windows 10 for network communication?

Link-Layer Topology Discovery Mapper I/O Driver

Which protocol is responsible for discovering network devices on the network, such as computers and routers?

Link-Layer Topology Discovery Responder

Which protocol is responsible for responding to discovery requests from other computers?

HKEY_CURRENT_CONFIG

Which registry hive contains details about the current hardware profile in use?

HKEY_LOCAL_MACHINE

Which registry hive contains global settings for the entire computer and the applications installed on it?

DEFAULT

Which registry key contains the default registry settings that are copied for new user profiles?

path

Which rule condition identifies software by file location?

Auditing

Which security process records the occurrence of specific operating system events in the Security log?

issuing certificates

Which service is NOT supported by the Intune client for desktop computers?

Ethernet

Which setting in the Network & Internet category allows you to view information about connections to wired networks such as a connection's IP address?

Proxy

Which setting in the Network & Internet category lets you configure Windows 10 to connect to a network through an intermediary server?

Windows Defender

Which settings in the Update & Security category control anti-malware functionality?

restore point

Which term best describes a snapshot of operating system and program files at a specific point in time that can be restored to roll back to a point in time when the operating system or applications were stable?

REGEDIT.EXE

Which tool allows a user to connect to the active registry database and make changes that are effective immediately?

Windows Firewall with Advanced Security

Which tool in Administrative Tools allows you to configure IPSec settings?

Event Viewer

Which tool in Administrative Tools should you open if you want to view messages to troubleshoot errors?

Task Scheduler

Which tool lets you create system maintenance tasks that are performed on a regular schedule or when system events occur?

Image-based

Which type of installation requires the creation of a customized image that you apply to each computer?

peer-to-peer

Which type of network consists of multiple Windows computers that share information, but no computer on the network serves as an authoritative source of user information?

NTFS

Which type of permissions are considered the most basic level of data security in Windows 10?

private

Which type of virtual network should you create if you want a completely isolated test environment for a virtual machine?

pnputil.exe

Which utility can be used by a user with administrative rights in order to stage a driver manually?

Task Manager

Which utility can be used to provide an overview of the current state of a computer?

Incorrect DNS configuration can result in: • Slow user sign-ins • Inability to apply group policies • Failed replication between domain controllers

Why is a properly configured DNS essential for Active Directory?

This technology is seldom used now because it is very slow when compared with Internet connectivity. It is much more common for remote access to be done over a virtual private network (VPN). A VPN creates an encrypted connection between the VPN clients and the remote access server over a public network such as the Internet.

Why is dial-up networking no longer the most common method used for remote access? Explain why it is more common for remote access to be done over a virtual private network.

False

Windows 10 Enterprise and Education editions do not include support for tablet computers as a standard feature.

True

Windows 10 can use a different configuration depending on the network you are connected to.

printer driver store

Windows 10 has a ____________________ where installed printer drivers are added.

False

Windows 10 includes a Remote Desktop client, but not Remote Desktop Web access.

Cortana

Windows 10 includes a personalized virtual assistant application called

indexing

Windows 10 includes search functionality that can be used to find files and folders. Which of the following is used to increase the efficiency of searching in Windows 10?

True

Windows 10 includes several interfaces that make it easier for developers to create clients, services, protocols, and network drivers

true

Windows 10 includes several interfaces that make it easier for developers to create clients, services, protocols, and network drivers.

Backup and Restore (Windows 7)

Windows 10 introduces a newer version of Windows Backup. What did Microsoft decide to call this newer version?

False

Windows 10 is a desktop operating system and is able to function as either a member server or a domain controller.

GPOs

Windows 10 is configured for DirectAccess using ___________ which are created during the DirectAccess configuration process.

Windows as a Service

Windows 10 is continuously improved as if it were a service the user has subscribed to. This operating system update strategy is commonly referred to as

False

Windows 10 maximizes user involvement during attended installation with an abundance of prompts that user must answer in the middle part of the installation.

Active Directory

Windows 2000 Server and later versions include ____________________ to create domain-based networks.

biometric authentication functionality in Windows 10

Windows Hello

True

Windows PE includes networking components and allows you to use current Windows drivers for network connectivity.

Routing and Remote Access

Windows Server 2016 can be configured as a remote access server by installing the ____________________ server role.

Routing and Remote Access

Windows Server 2016 can be configured as a remote access server by installing which server role?

Generation 2, synthetic

You are running a virtual machine that must boot through the network adapter and provide the best networking performance. Which type of virtual machine and virtual network adapter should you choose?

scripts

You can create PowerShell ______________ using a simple text editor such as Notepad.

forest

You can create more complex Active Directory structures by combining multiple domains into a tree and multiple trees into a(n) ____________________.

Windows Search

You can modify the locations included in a library, but the location must be indexed by which of the following?

/admin

You can start Remote Desktop Connection from a command prompt by running mstsc.exe. Which option can be used with this command to prevent Remote Desktop Connection from saving information to the local computer?

Relative weight

You have two processors on a computer running Client Hyper-V. You have two virtual machines running, VM1 and VM2. You want to be sure VM1 is allocated twice as much processing power as VM2. What control setting should you configure?

ID

You must configure a VLAN _______ when a switch port allows hosts from multiple VLANs and the virtual machine needs to identify the VLAN where it is located.

Import Foreign Disk

You must right-click the disk in the graphical portion of Disk Management and select which of the following from the pop-up menu to initiate the import process?

nested virtualization

You need to enable Client Hyper-V on a virtual machine; what feature do you need to use?

spoofing

You need to enable MAC address _____________ if any network communication from the virtual machine will use a MAC address other than the MAC address configured in the virtual machine.

Windows 10 Education

You want to install Client Hyper-V on your new Windows 10 computer. Of the available choices, which version of Windows 10 must be installed?

Allow management operating system to share this network adapter

Your Client Hyper-V host has a single network adapter. What option should be enabled to allow your virtual machines to communicate with the external network while not disrupting host network communication?

Security templates

____________________ are .inf files that contain settings that correspond with the Account Policies and Local Policies in the local security policy.

Remote Access

____________________ consists of a dedicated computer acting as a remote access server and clients connecting to that server.

AutoPlay

____________________ is a feature that automatically performs an action when new media is inserted into a removable device such as a DVD player or a USB drive.

BitLocker To Go

____________________ is a method for protecting data on removable storage such as USB drives.

Performance Monitor

____________________ is an MMC snap-in that is used to monitor system performance indicators.

Assigned Access

____________________ is an advanced sign-in option for configuring Windows 10 as a kiosk.

Resource monitor

____________________ provides real-time monitoring of the most common system performance indicators.

Network discovery

____________________ provides you with an easy way to control how your computer views other computers on the network and advertises its presence on the network.

Storage Spaces

____________________ technology combines selected physical disks into a managed logical group called a storage pool.

Network and Sharing Center

______________________________ is a central point in Windows 10 for managing the configuration of the network you are currently connected to.

DirSync

a Microsoft tool for synchronizing copies of local identity information into Azure AD

Windows Deployment Service (WDS)

a Windows Server service that is used to simplify the process of applying images to computers

Registry

a central store for application and operating system configuration information in Windows 10

Describe the DiskPart utility.

a command-line tool that allows disk and volume opera- tions to be performed from a text-based screen interactively or from within a scripted file using command-line parameters.

Secedit

a command-line tool that is used to apply, export, or analyze security templates

netsh

a command-line utility that can be used to display, change, add, and delete network configuration settings on a computer, including basic and advanced settings

nslookup

a command-line utility that can be used to view or debug the data returned from a DNS server in response to a DNS name resolution query

partition table

a data structure contained in the MBR that is used to identify reserved areas of disk space

hive

a discrete body of registry keys and value stored in files as part of the operating system

RemoteApp

a feature in Remote Desktop Services that presents clients with a single app in a window

Remote Assistance

a feature in Windows 10 that allows a helper to connect to a Windows 10 computer and view the screen or remotely control the computer

User Account Control (UAC)

a feature in Windows 10 that elevates user privileges only when required

Branch Office Direct Printing

a feature that allows Windows 10 computers to print directly to a printer shared from a printer server rather than sending the print job through the print server

File History

a feature that is used to backup user files to an external hard drive or files share.

.appx file

a file for installing a Windows Store app

Dynamic Link Library

a file that holds application code modules

Extensible Authentication protocol (EAP)

a framework that allows multiple authentication protocols to be integrated with the VPN sign-in process

EMS

a license suite available for purchase from Microsoft that includes Azure AD Premium, Microsoft Intune, and Azure Rights Management Services

Print Driver Store

a location in Windows 10 that caches printer drivers and is capable of storing multiple versions of a printer driver

Storage pool

a logical collection of disks

Internet Key Exchange V2 tunneling protocol (IKEV2)

a newer VPN protocol that uses IPsec to secure data, but can authenticate by using a user name and password

Hashing aligorithm

a one-way encryption algorithm that creates a unique identifier that can be used to determine whether data has been changed

Cortana

a personalized virtual search assistant

Action Center

a place to review and resolve system messages

Portable Document Format

a popular document format which is also supported as a page description language by some printers

checkpoint

a saved state of a virtual machine that you can revert to

domain controller

a server that hold a copy of Active Directory information

integration services

a set of drivers that allows operating systems to use virtualized hardware in a virtual machine

Baseline

a set of performance indicators gathered when system performance is acceptable

Network discovery

a setting that controls how your computer views other computers on the network and advertises its presence on the network

application envirnment subsystem

a software layer that exists between apps and the operating system to simplify app development

Protocol

a standard set of rules that defines how different components of a system operate together

Remote Control

a system for remote data or application access where only screen draw commands and keystrokes are sent between the client and computer being remote controlled

Windows on Windows 64(WOW 64)

a system in Windows that allows 32-bit Windows apps to run on a 64-bit operating system

Disk quota

a system of tracking owners for file data within an NTFS-formatted partition or volume and the total disk space consumed by each owner

remote access

a system that allows dial-up or VPN clients to remotely retrieve and save data as though they are on the local network, but with much slower performance

NAT

a system that allows multiple computers to share a single IP address when connecting to the Internet

Work Folders

a system that allows users to synchronize a single folder on a file server between multiple devices

Teredo

a system to tunnel IPv6 addressed packets over an IPv4 network, even if NAT is used on the IPv4 network

WINS

a system used to resolve computer NetBIOS names to IP addresses

hyperthreading

a technique used in certain Intel processors to improve their overall performance by working on more than one independent piece of code at a time

virtualization

a technology that allows the hardware of a single computer to be shared by multiple operating systems running at the same time

Application Virtualization (APP-V)

a technology that deploys applications by streaming and isolates them in a virtual environment

Steps Recorder

a tool that can be used to record the steps required to generate a problem and store the steps and screenshots in a file

shared set

a type of virtual hard disk that is designed to be shared between multiple virtual machines

fixed-size disk

a type of virtual hard disk that takes the same physical space on disk as the volume of data that it can store

differencing disk

a type of virtual hard disk that tracks changes that would have been made to a parent disk

Resource Monitor

a utility launched from Performance Monitor that provides real-time monitoring of the most common system performance indicators

Task Manager

a utility that allows you to view overall system information and manipulate processes

Dynamically expanding disk

a virtual hard disk that only uses the physical disk space required to store its contents

Print Management snap-in

allows you to manage the printers for your entire network from a single workstation

S3 state

an ACPI power-saving mode that disables power to all devices except RAM

S4 state

an ACPI power-saving mode that saves the contents of RAM to disk and then disables power to all devices including RAM

InPrivate Browsing

an Internet Explorer 11 and Microsoft Edge feature that prevents caching of web content and logging of web activity in Internet Explorer

Popup Blocker

an Internet Explorer and Microsoft Edge feature that prevents most popup advertising from being displayed while you browse websites

SmartScreen Filter

an Internet Explorer and Microsoft Edge feature that warns you about websites known to install malicious software or used in phishing attacks

DirectAccess

an always-on replacement for on-demand VPN connections

.msi file

an app packaged for installation by the Windows Installer service

Virtual Private network (VPN)

an encrypted connection from a client to a remote access server over a public network

Encrypting File System (EFS)

an encryption technology for individual files and folders that can be enabled by users

Alert

an event that is triggered when a count value is above or below the specified threshold value

device setup class

an identifier included with a hardware device driver that describes how the device driver is to be installed

Azure AD

an identity and access management cloud solution

Point-to-Point Tunneling Protocol (PPTP)

an older VPN protocol that authenticates based on user name and password

recovery drive

an optional drive that you can create with a system image from your currently installed operating system and apps

Windows Defender

anti-malware software included with Windows 10

driver store

central location in Windows 10 where drivers are located before they are installed

What is a device driver?

device drivers manage and communicate with hardware components. Device drivers are written specifically for a particular type and model of component.

Group Policy

feature integrated with Active Directory that can be used to centrally manage the configuration of a Windows 10 computer

Dynamic Memory

feature of Hyper-V that allows the memory allocated to a virtual machine to be increased and decreased based on demand

schema partition

holds the definitions of all objects and object attributes for the forest

Malware

malicious software designed to perform unauthorized acts on your computer

Desktop

mode is designed for a traditional computer with a mouse and keyboard.

an empty folder in an NTFS-formatted file system that is used to point to another FAT, FAT32, or NTFS partition

mount point

Preemptive

multitasking allows a single process to be interrupted by another process, even if the first process has not completed.

device identification string

one or more identifiers included in a hardware device that is used by Windows 10 to locate and install an appropriate driver for a hardware device

BYOD

policy that allows employees to bring their own computers, smartphones, and tablets to work

CYOD

policy that allows employees to choose a computer, smartphone, or tablet from a corporate-owned pool of devices

a user profile that is stored in a network location and is accessible from multiple computers

roaming profile

MDM

security software used to monitor, manage, and secure employee mobile devices

domain controller

server responsible for holding a domain security database

MAM

software and services responsible for provisioning and controlling access to mobile apps

Device driver

software written by the developer of a hardware component that tells the operating system how to talk to and control the hardware

Multitasking

term used to describe the appearance of more than one application sharing the CPU of the computer

Domain partition

the Active Directory partition that holds domain-specific information, such as user and computer accounts, that is replicated only between domain controllers within the domain

configuration partition

the Active Directory partition that holds general information about the Active Directory forest and application configuration information. It is replicated to all domain controllers in the Active Directory forest

Continuum

the Windows 10 feature that automatically adjusts Windows 10 between desktop mode and tablet mode as the device state changes

Network location awareness

the ability for Windows 10 to detect when it is connected to a different network and perform actions based on the change

Quantum

the amount of time allocated to a program running in a preemptive multitasking environment

ACPI

the current standard for power management that is implemented in Windows 10 and by computer manufacturers

UPN

the name that uniquely identifies a user within an identity directory

Windows Store apps

the newest application environment that is designed to be cross platform with phones, tablets, and desktop computers

Counters

the performance indicators that can be recorded in Performance Monitor

Performance tuning

the process for collecting system performance data, analyzing system performance data, and implementing system performance improvements

Auditing

the security process that records the occurrence of specific operating system events in the Security log

hypervisor

the software layer that controls access to hardware after virtualization is enabled

Desktop mode

the traditional configuration for a Windows 10 computer that is optimized for use with a mouse and keyboard

libraries

virtual folders in File Explorer that combine content from multiple locations to simplify file access


Ensembles d'études connexes

HS 3814 Intro to CTC: Review Quiz

View Set

Computer Science - Unit 2: Hardware

View Set

Government intervention - Subsidies

View Set

Azure Microsoft Practice Questions

View Set

CSCI121 - Module 1, Module 2, Module 3 Study Guide

View Set