Win 10 chapter 1-14
Which registry hive contains details about the current hardware profile in use?
HKEY_CURRENT_CONFIG
Which tool lets you create system maintenance tasks that are performed on a regular schedule or when system events occur?
Task Scheduler
One problem with CHAP is that is easy to obtain credentials during authentication.
True
Public networks allow traveling users to obtain a remote network connection.
True
What type of firmware should you look for on a PC if you want the computer to support GPT partitions?
UEFI (Unified Extensible Firmware Interface)
Windows 10 introduces a newer version of Windows Backup. What did Microsoft decide to call this newer version?
Backup and Restore (Windows 7)
Which of the following can be used to define which programs are allowed/disallowed in the system?
AppLocker
What is the default format for an Office 365 tenant account?
nickname.onmicrosoft.com
Intune can distribute third-party updates in which of the following formats?
.MSP
When a client connects to a RD Web Access server, what type of file is downloaded that includes all of the necessary configuration information for connecting to the desktop of RemoteApp?
.rdp file
After credentials are cached locally, you can sign in to a computer using a domain user account. By default, how many user sign-ins are cached?
10
How much RAM is supported by the 32-bit version of Windows 10?
4GB
If you configure a virtual machine with dynamic memory, what is the default minimum RAM that will be configured?
512 MB
Which of the following identifies who can perform a given action to a file or folder and is found in ACLs?
ACE (Access Control Entries)
If Windows 10 is configured to use dynamic IP configuration and is unable to contact a DHCP server, the default action is to use which type of address?
APIPA
Which of the following is defined by IP subnets instead of physical locations?
Active Directory site
What is the most powerful local user account possible?
Administrator
An administrator account derives its privileges from being a member of what local group?
Administrators
Which of the following is a default Intune device group?
All Mobile Devices
Your Client Hyper-V host has a single network adapter. What option should be enabled to allow your virtual machines to communicate with the external network while not disrupting host network communication?
Allow management operating system to share this network adapter
To address the risks to data stored on computers and laptops, which encryption technology is available in Windows 10?
BitLocker Drive Encryption
What Windows 10 allows you to centralize the administration of printers for remote locations but still keep WAN link utilization low because the print jobs stay local?
Branch Office Direct Printing
In which technology are files stored in a file share in a central location, but are cached at the remote site to make it faster to open the files?
BranchCache
Which Policy controls password characteristics for local user accounts?
password policy
What system-specific data does the workstation create when a generalized image is applied to a workstation?
Computer SID
Which USMT file is generated by running ScanState.exe with the /genconfig option?
Config.xml
Which of the following is the subset of files in a distribution share that are required for a particular answer file?
Configuration Set
Which Windows feature automatically adjusts the display and input methods depending on the form factor being used and whether a hardware keyboard is active?
Continuum
Which registry key contains the default registry settings that are copied for new user profiles?
DEFAULT
Which processor feature monitors processes to ensure that they do not access unauthorized memory spaces, which is done by various types of malware, such as virus, to take control of systems?
DEP
Which of the following is used to perform offline servicing of WIM images?
DISM (Deployment Image Servicing and Management)
Applications can share code modules by using which Windows programming feature?
DLLs (Dynamic-link libraries)
Which of the following protocols is used for resolving host names to IP addresses?
DNS
Which of the following installation methods is the least suitable method for a large volume of computers?
DVD boot
Which profile is used when new user profiles are created?
Default
What does Windows need to properly communicate with and use the functionality of hardware?
Device Drivers
Which of the following is true about 64-bit drivers that run in kernel mode on Windows 10?
Digitally Signed By Microsoft
What type of bottleneck occurs when Windows 10 and running applications want to read and write information to the physical disk in the system faster than the disk can manage?
Disk
Which NTFS feature allows an administrator to restrict the amount of disk space used by a user?
Disk Quotas
Which of the following installation methods requires computers to be booted into Windows PE from removable storage and then run the Windows 10 installation from a server?
Distribution Share
When Windows 10 can communicate with a domain controller, the network connection is automatically placed in which location category?
Domain Network
Which Active Directory component is responsible for authenticating users when they log on to a workstation?
Domain controllers
Which of the following is NOT a possible state for a virtual machine?
Down
What feature of NTFS encrypts the contents of files?
EFS (Encrypting File System)
To see the permissions a user has to a file that takes into account their group memberships, what tab should you open in the Advanced Security Settings window for the file?
Effective Access
Which of the following is a system cleanup action you can select when you run Sysprep to generalize an image?
Enter System Audit Mode
Which setting in the Network & Internet category allows you to view information about connections to wired networks such as a connection's IP address?
Ethernet
Which tool in Administrative Tools should you open if you want to view messages to troubleshoot errors?
Event Viewer
Which utility is used to browse and manage the records of system events and messages stored in system event logs?
Event Viewer
The Guest account derives all of its privileges from being a member of the Guests group and the what group?
Everyone
In Remote Desktop Connection, which tab allows you to enable and disable various display-related settings that can impact the amount of data sent between the local and remote computers?
Experience tab
What type of virtual network should you create if your virtual machine should be able to communicate with the Internet?
External
A clean installation is an installation of Windows 10 performed on a computer that has existing data or applications.
False
A private network uses a physical network adapter in the Hyper-V host to provide virtual machines with connectivity to a physical network.
False
Business enhancements such as encrypted files, joining a domain, and processing Group Policy settings are available in Windows 10 Home.
False
Changes in the ownership of a file do not change the amount of data that is considered to belong to a user.
False
Control Panel is no longer available in Windows 10, so you should use Settings for all configuration tasks.
False
Files and folders on an NTFS file system in Windows 7 cannot use Unicode characters in the filename.
False
Hyper-V only allocates dynamic memory while the virtual machine is turned off.
False
In Windows 10, advanced audit policies can only be edited at a command-line.
False
Local user accounts can be used to access resources on other computers in a workgroup or a domain.
False
Microsoft Intune policies apply only to domain joined devices.
False
The Account Policies in the Local Security Policy can be used to control domain accounts.
False
Virtualization allows the software of multiple physical computers to be shared by multiple operating systems running at the same time.
False
When a new hard disk is added to a computer it is initially configured as a dynamic disk.
False
Which Windows 10 feature ensures that a second user can log on to a locked computer without logging off the first user and losing their work?
Fast user switching
File Explorer contains ribbon tabs that can be used for various functions. Which ribbon tab provides options to open a new File Explorer window, command prompt, or Windows PowerShell prompt that is focused on the current folder?
File
In addition to defining which locations are indexed, what else are you able to configure to be indexed by Windows 10?
File Types
What will the Disk Management console report as the status of a disk when it recognizes that the disk does not belong to that computer?
Foreign Disk
In a corporate environment the most common use for Sysprep is preparing workstations to capture an image. What is this process known as?
Generalization
Which of the following is a correct statement about Generation 1 and Generation 2 virtual machines?
Generation 1 virtual machines use BIOS-based firmware; Generation 2 virtual machines use UEFI-based firmware
What is the name of the power state in which the computer is in the S3 state, but prepared for the S4 state?
Hybrid Sleep
Which of the following types of CPUs have extra hardware built in to allow more than one thread to be processed at the same time on a single CPU?
Hyperthreading
Which component of the Hyper-V architecture controls all communication with the physical hardware on the computer?
Hypervisor
Which of the following is an updated version of TCP/IPv4 with a larger address space and additional features?
IPv6
Which CPU feature must be present to run Client Hyper-V?
Intel VT
Which Internet Explorer security zone includes all Internet Web sites that are not specifically assigned to another zone?
Internet
Which of the following is considered to be the biggest source of malware?
Internet
Which protocol is responsible for discovering network devices on the network, such as computers and routers?
Link-Layer Topology Discovery Mapper I/O Driver
What tool should you use to configure password policies and auditing policies?
Local Security Policy
Data sent to which of the following returns to the computer that sent it and does not appear on the actual network?
Loopback address
What should you open if you want to add snap-ins to create a custom management console?
MMC (Microsoft Management Console)
Which of the following is a profile that cannot be modified?
Mandatory
Which of the following is a feature built into Windows 10 that supports MFA and will use a TPM, if available?
Microsoft Passport
Which Windows 10 feature allows a device to sleep but continue to perform basic tasks like downloading Windows updates?
Modern Standby
Which of the following systems have more than one physical CPU?
Multiprocessor
Which type of permissions are considered the most basic level of data security in Windows 10?
NTFS
Which file system should you use if you want to use EFS?
NTFS (New Technology File System)
What is used to prevent users to connecting to Remote Desktop until the connection is authenticated?
Network Level Authentication
As part of DirectAccess configuration, which of the following is also configured?
Network Location Server
Which page description language is the oldest and best supported in windows?
Postscript
Which printer management tool would you typically use to manage printer servers rather than individual computers?
Print Management snap-in
Software Windows 10 uses to understand and use the features of a printer is known as which of the following?
Printer Driver
Which type of virtual network should you create if you want a completely isolated test environment for a virtual machine?
Private
Which location type is used when the computer is connected as part of a peer-to-peer network in a trusted location?
Private Network
Which of the following terms represents a collection of data, files, and instructions with a specific purpose while it is running?
Process
If a thread is not finished running, perhaps because it had to wait or it was preempted, it is typically restarted on the same processor that previously ran it. What is this known as?
Processor Affinity
Which setting in the Network & Internet category lets you configure Windows 10 to connect to a network through an intermediary server?
Proxy
Which profile is different from other profiles because is it not a complete profile?
Public Profile
What is a mirrored volume also known as?
RAID 1
Which file system is designed to verify and autocorrect data faults on the volume without having to bring the volume down for maintenance?
ReFS (Resilient File System)
When applications or Windows 10 starts, they read their configuration information from which of the following?
Registry
What is the secondary administrator that can be specified for Intune called?
Service Administrator
In order to stop the automatic sign-in from occurring, which key should be held down during the boot process?
Shift
What Windows 10 feature captures a screenshot each time the user clicks on a screen item and saves the screenshots and users actions in a report that can be emailed or saved to a shared storage location?
Steps Recorder
In Windows 10, the only supported method to configure the default profile is to use which utility?
Sysprep
Which of the following tools can be used to deploy operating systems to the point where you do not need to physically touch the computer?
System Center Configuration Manager
What tool should you use to configure which devices and services start when Windows boots?
System Configuration
Which protocol is included with Windows 10 for network communication?
TCP/IP
What is part of the motherboard in your computer and is used to store encryption keys and certificates?
TPM
A company commonly sets up only one production Office 365 tenant account, and adds users to that account.
True
Both Hyper-V on Windows Server and Client Hyper-V on Windows 10 offer the same core functionality that allows you to run virtual machines.
True
Client Hyper-V can use either VHD or VHDX virtual hard disks.
True
DirectAccess relies on IPv6 for connectivity.
True
Domain controllers download Group Policy settings every five minutes.
True
If a Windows 10 computer has multiple network interfaces active, each can be assigned a different network location, each with different firewall settings based on their assigned network location.
True
Local printing requires that a printer be connected directly to a Windows 10 computer by using a cable.
True
Multitasking settings control how you work with multiple windows and apps in Windows 10.
True
NTFS permissions can be easily circumvented when you have physical access to a computer
True
Secure sign-in increases security on your computer by forcing you to press Ctrl+Alt+Delete before signing in.
True
The most common use for AppLocker is malware prevention.
True
When you establish a baseline, it is important to ensure that you are measuring the normal state of the performance indicators.
True
With fast user switching, only one user can be actively using the computer at a time.
True
The path to the distribution share should always be referred to by which path to ensure that it can be accessed over the network during unattended installations?
UNC (Universal Naming Convention)
Which of the following is a default Intune user group?
Ungrouped Users
Until a new disk is initialized, what is its status reported as?
Unknown
Running apps in which mode ensures that a poorly written app does not affect system stability?
User
Which applet in Control Panel is a simplified interface for user management?
User Accounts
All of the application environments in Windows 10 restrict apps to running in which of the following modes?
User Mode
Which of the following is a Windows 10 tool for migrating user profiles to a new computer?
User State Migration Tool
Which of the following are required for individuals to log on to Windows 10 and use resources on the computer?
User accounts
Which of the following is a limited and non-GUI version of Windows based on Windows 10 technologies that can be used for installing, troubleshooting, and repairing Windows 10?
Windows PE
Which Windows 10 feature provides an automated diagnosis and repair of boot problems plus a centralized platform for advanced recovery tool?
Windows Recovery Environment (WinRE)
Which of the following terms is used to describe a virtualized environment that hosts Win32 apps on the 64-bit version of Windows 10?
Windows on Windows 64 (WOW64)
What feature is supported in Client Hyper-V that is not supported in the server version?
hibernate
An IP address is composed of a network ID and which of the following?
host ID
What do you need to install on a USB drive to use Windows to Go?
install.wim
What must be installed on a virtual machine to allow PowerShell Remoting from the Hyper-V host?
integration services
Account policies settings are located in which of the following?
local security policy
Running fewer applications at once is a way to resolve which type of bottleneck?
memory
What type of bottleneck occurs when the applications you are running require more memory than is physically available in the computer?
memory
You need to enable Client Hyper-V on a virtual machine; what feature do you need to use?
nested virtualization
Which of the following configuration passes is applied during the portion of the installation where users are asked for information after the second reboot?
oobeSystem (Out-Of-Box-Experience)
Each domain can be subdivided into which of the following, that allow you to organize the objects in a domain?
organizational units (OUs)
Which Audit policy tracks when tasks are performed that require a user rights assignment, such as changing the system time?
privilege use
After you install Client Hyper-V, what must you do before you can begin using it?
reboot the computer
If you do not specify an answer file, then which of the following will Sysprep search for to use as an answer file?
unattend.xml
Remote Desktop listens on which TCP port number?
3389
Where are the user accounts in office 365 stored?
Azure AD
Where in the Hyper-V architecture do device drivers reside?
Parent partition
Applications that are not designed for Windows 10 and that require administrative privileges do not properly request elevated privileges, generating an error. You can eliminate this error by using which of the following?
Application Compatibility Toolkit (ACT)
What do applications use to request services from the application environment subsystem?
Application programming interfaces (API)
What is the security process that records the occurrence of specific operating system events in the Security log?
Auditing
Which of the following is NOT an automatic start action you can choose for a virtual machine?
Automatically start at the following time
Members of what group can back up and restore all files and folders on the computer?
Backup Operators
You are running a virtual machine that must boot through the network adapter and provide the best networking performance. Which type of virtual machine and virtual network adapter should you choose?
Generation 2, synthetic
What PowerShell cmdlet shows all the properties and methods available for services?
Get-Service | Get-Member
A more manageable way to deploy .msi-based applications in smaller environments would be to use which of the following?
Group Policy
Which of the following can be pushed down to a computer and can be changed by the user?
Group Policy Preference
For domain-joined computers, what is the simplest way to configure VPN connections?
Group Policy Preferences
The Group Policy settings used by Windows 10 are contained in which of the following?
Group Policy object
What account has extremely limited access to resources and computer activities and is intended for occasional use by low-security users?
Guest
Which registry hive contains global settings for the entire computer and the applications installed on it?
HKEY_LOCAL_MACHINE
What is the most specific device identification string?
Hardware ID
What encryption algorithm is one-way encryption, which means that it encrypts data, but the data cannot be decrypted?
Hash
The registry is divided into sections and levels of data. Multiple sections exist to organize data by purpose. What are these individual sections called?
Hives
What Windows 10 Feature simplifies the configuration of peer-to-peer networks by removing the need to synchronize users and passwords on each computer?
HomeGroup
What is used to configure data sources for applications that require access to a database?
ODBC (Open Database Connectivity)
Which of the following are software packages containing drivers, service packs, or security updates that are applied to an image during the offlineServicing configuration pass of the installation?
Offline Updates
Which of the following configuration passes is used to apply packages to a Windows 10 image after it is copied to the computer hard drive, but before it is running?
Offlineservicing
Which of the following storage space types can only be created with three or more physical disks?
Parity
Which rule condition identifies software by file location?
Path
Which network (or workgroup) consists of multiple Windows computers that share information, but no computer on the network serves as an authoritative source of user information?
Peer-To-Peer
You have two processors on a computer running Client Hyper-V. You have two virtual machines running, VM1 and VM2. You want to be sure VM1 is allocated twice as much processing power as VM2. What control setting should you configure?
Relative weight
What Windows 10 feature is a user- specific data protection mechanism that protects local resources by allowing user files to be backed up to an external hard drive or a network location?
Relog
Which of the following allows a user to send an invitation to a remote user that invites them to remotely connect to the local computer?
Remote Assistance
Which profile is stored in a network location rather than on the local hard drive?
Roaming
Windows Server 2016 can be configured as a remote access server by installing which server role?
Routing and Remote Access
Each time a user logs on locally, which database is used to verify sign-in credentials?
SAM
Which of the following is used to protect your computer from malware that may attempt to steal your password?
Secure sign-in
What new feature in Windows 10 allows the user to create multiple desktops that can host different open windows?
Virtual Desktop
What allows an empty folder in an NTFS-formatted file system to point to another partition or volume in the local computer?
Volume mount points
On dynamic disks, the term partition is not used to define the space where a file system is installed. What term is used?
Volumes
A server role included with Windows Server 2008 and newer that can be used to deploy operating system images over the network is known as which of the following?
WDS
Applications designed to interact with which subsystem were the most common type of application in use with earlier operating systems, such as Windows XP?
Win32
You want to install Client Hyper-V on your new Windows 10 computer. Of the available choices, which version of Windows 10 must be installed?
Windows 10 Education
Which settings in the Update & Security category control anti-malware functionality?
Windows Defender
With which Windows version was NTFS first introduced?
Windows NT
Which policy Temporarily disables an account after a number of incorrect log-on attempts?
account lockout policy
Instead of logging performance counters to disk, you can configure which of the following to occur?
alerts
The full Intune product is available through which of the following?
as part of the EMS
Which encryption algorithm uses two keys to encrypt and decrypt data?
asymmetric
Which of the following is NOT a benefit of using VHDX instead of VHD format virtual disks?
better backward compatibility
What feature of Hyper-V virtual machines is very useful for testing because you can almost instantly reset a computer back to a previous state?
checkpoints
In Active Directory, which partition holds general information about the Active Directory forest?
configuration
When a new device is installed into a Windows 10 computer, the operating system uses a device setup class and which of the following in order to properly install the new device?
device identification string
What utility should you use to perform a series of disk maintenance activities as part of a scheduled task?
diskpart.exe
Which Active Directory component has a central security database that is used by all computers that are members of it?
domain
Which distribution method delivers the critical components of an application first and allows the users to being using the application before installation is complete?
downloading
What feature must you enable on a virtual machine to use RDP functionality?
enhanced session mode
Which term best describes a snapshot of operating system and program files at a specific point in time that can be restored to roll back to a point in time when the operating system or applications were stable?
restore point
Which of the following is the name assigned to the WAP to identify itself to clients?
security set identifier SSID
What type of encryption algorithm uses the same key to encrypt data and decrypt data?
symmetric
When an Intune policy is deployed, what happens if the device doesn't acknowledge the notification?
the Intune service waits for the device to check in
Which of the following is NOT a typical scenario for using Client Hyper-V?
to make use of old workstations with few resources