Win 10 Chapters 5-8

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which Windows 10 feature ensures that a second user can log on to a locked computer without logging off the first user and losing their work?

Fast user switching

Secure sign-in increases security on your computer by forcing you to press Ctrl+Alt+Delete before signing in.

True

With fast user switching, only one user can be actively using the computer at a time.

True

Which of the following can be used to define which programs are allowed/disallowed in the system?

AppLocker

Which profile is used when new user profiles are created?

Default

After credentials are cached locally, you can sign in to a computer using a domain user account. By default, how many user sign-ins are cached?

10

If Windows 10 is configured to use dynamic IP configuration and is unable to contact a DHCP server, the default action is to use which type of address?

APIPA

What is the most powerful local user account possible?

Administrator

An administrator account derives its privileges from being a member of what local group?

Administrators

To address the risks to data stored on computers and laptops, which encryption technology is available in Windows 10?

BitLocker Drive Encryption

What Windows 10 allows you to centralize the administration of printers for remote locations but still keep WAN link utilization low because the print jobs stay local?

Branch Office Direct Printing

Which Policy controls password characteristics for local user accounts?

password policy

Which of the following protocols is used for resolving host names to IP addresses?

DNS

When Windows 10 can communicate with a domain controller, the network connection is automatically placed in which location category?

Domain Network

The Guest account derives all of its privileges from being a member of the Guests group and the what group?

Everyone

In Windows 10, advanced audit policies can only be edited at a command-line.

False

Local user accounts can be used to access resources on other computers in a workgroup or a domain.

False

The Account Policies in the Local Security Policy can be used to control domain accounts.

False

File Explorer contains ribbon tabs that can be used for various functions. Which ribbon tab provides options to open a new File Explorer window, command prompt, or Windows PowerShell prompt that is focused on the current folder?

File

In addition to defining which locations are indexed, what else are you able to configure to be indexed by Windows 10?

File Types

Which of the following is an updated version of TCP/IPv4 with a larger address space and additional features?

IPv6

Which Internet Explorer security zone includes all Internet Web sites that are not specifically assigned to another zone?

Internet

Which of the following is considered to be the biggest source of malware?

Internet

Which protocol is responsible for discovering network devices on the network, such as computers and routers?

Link-Layer Topology Discovery Mapper I/O Driver

Data sent to which of the following returns to the computer that sent it and does not appear on the actual network?

Loopback address

Which of the following is a profile that cannot be modified?

Mandatory

Which type of permissions are considered the most basic level of data security in Windows 10?

NTFS

Which page description language is the oldest and best supported in windows?

Postscript

Which printer management tool would you typically use to manage printer servers rather than individual computers?

Print Management snap-in

Software Windows 10 uses to understand and use the features of a printer is known as which of the following?

Printer Driver

Which location type is used when the computer is connected as part of a peer-to-peer network in a trusted location?

Private Network

Which profile is different from other profiles because is it not a complete profile?

Public Profile

In order to stop the automatic sign-in from occurring, which key should be held down during the boot process?

Shift

In Windows 10, the only supported method to configure the default profile is to use which utility?

Sysprep

Which protocol is included with Windows 10 for network communication?

TCP/IP

What is part of the motherboard in your computer and is used to store encryption keys and certificates?

TPM

If a Windows 10 computer has multiple network interfaces active, each can be assigned a different network location, each with different firewall settings based on their assigned network location.

True

Local printing requires that a printer be connected directly to a Windows 10 computer by using a cable.

True

NTFS permissions can be easily circumvented when you have physical access to a computer

True

The most common use for AppLocker is malware prevention.

True

Which applet in Control Panel is a simplified interface for user management?

User Accounts

Which of the following are required for individuals to log on to Windows 10 and use resources on the computer?

User accounts

An IP address is composed of a network ID and which of the following?

host ID

Account policies settings are located in which of the following?

local security policy

Which Audit policy tracks when tasks are performed that require a user rights assignment, such as changing the system time?

privilege use

Applications that are not designed for Windows 10 and that require administrative privileges do not properly request elevated privileges, generating an error. You can eliminate this error by using which of the following?

Application Compatibility Toolkit (ACT)

What is the security process that records the occurrence of specific operating system events in the Security log?

Auditing

Members of what group can back up and restore all files and folders on the computer?

Backup Operators

What account has extremely limited access to resources and computer activities and is intended for occasional use by low-security users?

Guest

What encryption algorithm is one-way encryption, which means that it encrypts data, but the data cannot be decrypted?

Hash

What Windows 10 Feature simplifies the configuration of peer-to-peer networks by removing the need to synchronize users and passwords on each computer?

HomeGroup

Which rule condition identifies software by file location?

Path

Which network (or workgroup) consists of multiple Windows computers that share information, but no computer on the network serves as an authoritative source of user information?

Peer-To-Peer

Which profile is stored in a network location rather than on the local hard drive?

Roaming

Each time a user logs on locally, which database is used to verify sign-in credentials?

SAM

Which of the following is used to protect your computer from malware that may attempt to steal your password?

Secure sign-in

Which policy Temporarily disables an account after a number of incorrect log-on attempts?

account lockout policy

Which encryption algorithm uses two keys to encrypt and decrypt data?

asymmetric

Which of the following is the name assigned to the WAP to identify itself to clients?

security set identifier SSID

What type of encryption algorithm uses the same key to encrypt data and decrypt data?

symmetric


Ensembles d'études connexes

Auditing Exam 2 Chapters 7,8,9,10,11

View Set

ECON Chapter 7 Dynamic Study Module

View Set

UNT MKTG 3650 - Exam 2 Concept Checks

View Set

CH 11 - DEVELOPING AND MANAGING PRODUCTS

View Set

The Voyage of the Dawn Treader Chapter 1 Questions

View Set

Reading: When the Referee Sees Red...

View Set

cop2000 quiz 6, cop2000 quiz 7, cop2000 quiz 8

View Set