Final Exam Practice

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

The OneDrive Recycle Bin is limited in capacity. What percentage of the storage limit purchased for OneDrive storage is the typical capacity of the OneDrive Recycle Bin?

10%

What is the default value for the "Maximum password age" setting in the Password Policy?

42 days

What is used to store permissions?

ACL

When accessing an object, which of the following lists each user that can access the object and what each user can do with the object?

ACL

Which policy allows you to configure an account to be temporarily disabled after a number of incorrect log-on attempts?

Account Lockout

Which of the following expands on the domain concept by linking domains in logical structures named trees, and multiple trees into forests?

Active Directory

Which of the following is defined by IP subnets instead of physical locations?

Active Directory site

How do you share a folder so that is invisible to users browsing the network?

Add a dollar sign ($) to the share name

Instead of logging performance counters to disk, you can configure which of the following to occur?

Alerts

Which of the following can be used to define which programs are allowed or disallowed in the system?

AppLocker

Applications that are not designed for Windows 10 and that require administrative privileges do not properly request elevated privileges, generating an error. You can eliminate this error by using which of the following?

Application Compatibility Toolkit

What type of encryption algorithm uses two keys to encrypt and decrypt data?

Asymmetric

Which security process records the occurrence of specific operating system events in the Security log?

Auditing

Which of the following is the process of verifying the identity of the person operating the computer?

Authentication

Which of the following is the process of granting an authenticated user a specific degree of access to specific computer or data resources?

Authorization

Windows 10 introduces a newer version of Windows Backup. What did Microsoft decide to call this newer version?

Backup and Restore (Windows 7)

To address the risks to data stored on computers and laptops, which encryption technology is available in Windows 10?

BitLocker Drive Encryption

When a limitation in a single computer system component slows down the entire system, which of the following occurs?

Bottleneck

In which technology are files stored in a file share in a central location, but are cached at the remote site to make it faster to open the files?

BranchCache

Which of the following permissions is the minimum that allows you to add files to a Shared folder?

Change

Which USMT file is generated by running ScanState.exe with the /genconfig option?

Config.xml

In Active Directory, which partition holds general information about the Active Directory forest?

Configuration

Which processor feature monitors processes to ensure that they do not access unauthorized memory spaces, which is done by various types of malware, such as viruses, to take control of systems?

DEP

Which of the following appears to be a single, large file structure, but can really be composed of shared folders on multiple servers?

DFS namespace

When a new device is installed into a Windows 10 computer, the operating system uses a device setup class and which of the following in order to properly install the new device?

Device Identification String

During the installation process for a new device, what are used in order to describe how the installation should be performed?

Device setup classes

What type of bottleneck occurs when Windows 10 and running applications want to read and write information to the physical disk in the system faster than the disk can manage?

Disk

Which area of the Resource Monitor is used to monitor disk performance and determine whether the disk subsystem is a bottleneck?

Disk

What is a collection of computers that all utilize a central directory service for authentication and authorization and is usually associated with Active Directory?

Domain

Which Active Directory component has a central security database that is used by all computers that are members of it?

Domain

Which Active Directory component is responsible for authenticating users when they log on to a workstation?

Domain controllers

The process of taking data and making it unreadable is known as which of the following?

Encryption

Data Collector Sets organize multiple counters into a single unit. Which type of data can a Data Collector Set monitor to track when system events occur.

Event Trace

Which utility is used to browse and manage the records of system events and messages stored in system event logs?

Event Viewer

Active Directory is a single monolithic database with all of the information about the network (T/F)`

False

In Windows 10, advanced audit policies can only be edited at a command-line. (T/F)

False

Like Resource Monitor, Performance Monitor allows you to select the counters you wish to view (T/F)

False

Network bottlenecks are more common for computers than servers running Windows 10 (T/F)

False

The Account Policies in the Local Security Policy can be used to control domain accounts (T/F)

False

The Services tab in Task Manager shows all user applications running on the computer (T/F)

False

When accessing a resource over the network, the least restrictive permission of share and NTFS permissions applies (T/F)

False

Windows 10 is a desktop operating system and is able to function as either a member server or a domain controller (T/F)

False

This NTFS and or share permission should be only assigned to administrative users.

Full Control

This NTFS permission allows the user to change permissions and take ownership of a folder.

Full Control

This share permission allows the user to configure share permissions for other users.

Full Control

Which NTFS permission allows you to take ownership of a folder on an NTFS volume?

Full Control

The local security policy is part of a larger Windows management system known as which of the following?

Group Policy

Which of the following can be pushed down to a computer and can be changed by the user?

Group Policy Preference

The Group Policy settings used by Windows 10 are contained in which of the following?

Group Policy object

What is the most specific device identification string?

Hardware ID

What type of encryption algorithm is one-way encryption, which means that it encrypts data, but the data cannot be decrypted?

Hash

Selecting a counter to display will display information about that counter's collected data as a chart type. Which chart type displays the current value of each performance counter in decimal format?

Histogram bar

What do you call permissions that run downward through a hierarchy?

Inheritance

Account policies settings are located in which of the following?

Local Security Policy

To enable centralized management of BitLocker, you need to install which of the following on each computer?

MBAM agent

Newer Windows applications use which of the following to describe the structure of an application?

Manifest

Running fewer applications at once is a way to resolve which type of bottleneck?

Memory

What type of bottleneck occurs when the applications you are running require more memory than is physically available in the computer?

Memory

This NTFS permission allows the user to delete folders and includes all permisisons in Write and Read & Execute permission.

Modify

Active Directory information can be changed on any domain controller and those changes will be replicated to other domain controllers. What is this type of replication called?

Multimaster

Which type of permissions are considered the most basic level of data security in Windows 10?

NTFS

Each domain can be subdivided into which of the following, that allow you to organize the objects in a domain?

Organizational units (OUs)

Which policy controls password characteristics for local user accounts?

Password

Which rule condition identifies software by file location?

Path

What utility allows you to visually display the data generated by counters, and allows you to select the individual counters you want to view?

Performance Monitor

Which of the following enables the user to manage, configure, or perform certain tasks on an object?

Permissions

If File History or Backup and Restore (Windows 7), or both, had been configured to protect user data, that data can be recovered using which feature?

Previous Versions

Which advanced audit policy setting tracks when tasks are performed that require a user rights assignment, such as changing the system time?

Privilege Use

This share permission allows the user to see, but not make changes to files over a network.

Read

What Windows 10 feature is a user-specific data protection mechanism that protects local resources by allowing user files to be backed up to an external hard drive or a network location?

Relog

Which feature enables users to access computers from remote locations with no interaction required from the remote site?

Remote Desktop Connection

Which term best describes a snapshot of operating system and program files at a specific point in time that can be restored to roll back to a point in time when the operating system or applications were stable?

Restore Point

To make Active Directory more manageable, it is divided into the domain partition, configuration partition, and what other partition?

Schema

What type of software is silently installed on your computer, monitors your behavior, and performs actions based on your behavior?

Spyware

Which of the following is a threat to privacy and is sometimes installed when you visit a website?

Spyware

What Windows 10 feature captures a screenshot each time the user clicks on a screen item and saves the screenshots and users actions in a report that can be emailed or saved to a shared storage location?

Steps Recorder

What type of encryption algorithm uses the same key to encrypt data and decrypt data?

Symmetric

Which of the following tools can be used to deploy operating systems to the point where you do not need to physically touch the computer?

System Center Configuration Manager

Which part of the motherboard in your computer is used to store encryption keys and certificates?

TPM

Data Execution Prevention (DEP) is a processor feature in Windows 10 that monitors processes to ensure that they do not access unauthorized memory spaces (T/F)

True

When accessing a resource over the network, both share and NTFS permissions are needed (T/F)

True

When you establish a baseline, it is important to ensure that you are measuring the normal state of the performance indicators (T/F)

True

Within a site, Active Directory replication is uncontrolled (T/F)

True

What utility can be used to migrate user settings, documents, and application configuration settings from the previous operating system to Windows 10?

User State Migration Tool (USMT)

Which of the following enables users to perform specific operating system tasks such as shut down the system or perform backups?

User rights

A server role included with Windows Server 2008 and newer that can be used to deploy operating system images over the network is known as which of the following?

WDS

Which of the following contacts Microsoft Update and downloads updates rather than each client computer downloading updates?

WSUS

Which of the following uses a USB drive as a memory cache similar to a paging file?

Windows ReadyBoost

Which Windows 10 feature provides an automated diagnosis and repair of boot problems plus a centralized platform for advanced recovery tool?

Windows Recovery Environment (WinRE)

What is a collection of computers that are all peers?

Workgroup

Which of the following do you have to create the same user account for on each computer that a user needs to access?

Workgroup

This share permission allows the user to see and make changes to files over a network

change

Which of the following is considered one of the biggest sources of malware (malicious software)?

the Internet

You have a PC named PC1. You have a c:\Data folder that is shared as Data. You log on directly to PC1 and access the c:\Data folder using File Explorer. Which permissions apply?

NTFS Permissions only

You have a PC named PC-Z that is on the same network as PC-A. You have a c:\Data folder that is shared as Data from PC-Z. You log on over the network from PC-A to PC-Z and access the \\PC-Z\Data share. Which permissions apply?

NTFS permissions combined with Share Permissions as most restrictive

This NTFS permission allows the user to view files, folders and subfolders along with viewing ownership, permissions and attributes

Read

Which NTFS permission allows you to navigate through restricted folders to reach other files and folders?

Read & Execute

Which of the following are used to process log file data and display it in a meaningful way?

Reports

Which utility can be used to provide an overview of the current state of a computer?

Task Manager

Active Directory uses the same naming convention for domains and objects contained in these domains as DNS. (T/F)

True

Domain controllers download Group Policy settings every five minutes (T/F)

True

The most common use for AppLocker is malware prevention (T/F)

True

This NTFS permission allows the user to create new files and folders, change folder attributes and view ownership and permissions.

Write

Every object in Windows 10 has audit events related to it

True

Mapping a network drive that points to a shared folder creates an alias to the network drive that makes it easier to access. (T/F)

True

NTFS permissions can be easily circumvented when you have physical access to a computer (T/F)

True

Public folder sharing is a way to share folders across the network without configuring permissions for individual folders.(T/F)

True


Ensembles d'études connexes

AP Calc AB (Serrano) 2.1-2.5 Notes

View Set

Financial Accounting - Final Exam

View Set

PrepU: Ch. 8 Fluid and Electrolyte Imbalance

View Set

Module 12: Suits Challenging State Official Action: The Eleventh Amendment and state sovereign immunity

View Set

3.08 Quiz: Common Factors of Polynomials

View Set