Win 10 Chapters 5-8
Which Windows 10 feature ensures that a second user can log on to a locked computer without logging off the first user and losing their work?
Fast user switching
Secure sign-in increases security on your computer by forcing you to press Ctrl+Alt+Delete before signing in.
True
With fast user switching, only one user can be actively using the computer at a time.
True
Which of the following can be used to define which programs are allowed/disallowed in the system?
AppLocker
Which profile is used when new user profiles are created?
Default
After credentials are cached locally, you can sign in to a computer using a domain user account. By default, how many user sign-ins are cached?
10
If Windows 10 is configured to use dynamic IP configuration and is unable to contact a DHCP server, the default action is to use which type of address?
APIPA
What is the most powerful local user account possible?
Administrator
An administrator account derives its privileges from being a member of what local group?
Administrators
To address the risks to data stored on computers and laptops, which encryption technology is available in Windows 10?
BitLocker Drive Encryption
What Windows 10 allows you to centralize the administration of printers for remote locations but still keep WAN link utilization low because the print jobs stay local?
Branch Office Direct Printing
Which Policy controls password characteristics for local user accounts?
password policy
Which of the following protocols is used for resolving host names to IP addresses?
DNS
When Windows 10 can communicate with a domain controller, the network connection is automatically placed in which location category?
Domain Network
The Guest account derives all of its privileges from being a member of the Guests group and the what group?
Everyone
In Windows 10, advanced audit policies can only be edited at a command-line.
False
Local user accounts can be used to access resources on other computers in a workgroup or a domain.
False
The Account Policies in the Local Security Policy can be used to control domain accounts.
False
File Explorer contains ribbon tabs that can be used for various functions. Which ribbon tab provides options to open a new File Explorer window, command prompt, or Windows PowerShell prompt that is focused on the current folder?
File
In addition to defining which locations are indexed, what else are you able to configure to be indexed by Windows 10?
File Types
Which of the following is an updated version of TCP/IPv4 with a larger address space and additional features?
IPv6
Which Internet Explorer security zone includes all Internet Web sites that are not specifically assigned to another zone?
Internet
Which of the following is considered to be the biggest source of malware?
Internet
Which protocol is responsible for discovering network devices on the network, such as computers and routers?
Link-Layer Topology Discovery Mapper I/O Driver
Data sent to which of the following returns to the computer that sent it and does not appear on the actual network?
Loopback address
Which of the following is a profile that cannot be modified?
Mandatory
Which type of permissions are considered the most basic level of data security in Windows 10?
NTFS
Which page description language is the oldest and best supported in windows?
Postscript
Which printer management tool would you typically use to manage printer servers rather than individual computers?
Print Management snap-in
Software Windows 10 uses to understand and use the features of a printer is known as which of the following?
Printer Driver
Which location type is used when the computer is connected as part of a peer-to-peer network in a trusted location?
Private Network
Which profile is different from other profiles because is it not a complete profile?
Public Profile
In order to stop the automatic sign-in from occurring, which key should be held down during the boot process?
Shift
In Windows 10, the only supported method to configure the default profile is to use which utility?
Sysprep
Which protocol is included with Windows 10 for network communication?
TCP/IP
What is part of the motherboard in your computer and is used to store encryption keys and certificates?
TPM
If a Windows 10 computer has multiple network interfaces active, each can be assigned a different network location, each with different firewall settings based on their assigned network location.
True
Local printing requires that a printer be connected directly to a Windows 10 computer by using a cable.
True
NTFS permissions can be easily circumvented when you have physical access to a computer
True
The most common use for AppLocker is malware prevention.
True
Which applet in Control Panel is a simplified interface for user management?
User Accounts
Which of the following are required for individuals to log on to Windows 10 and use resources on the computer?
User accounts
An IP address is composed of a network ID and which of the following?
host ID
Account policies settings are located in which of the following?
local security policy
Which Audit policy tracks when tasks are performed that require a user rights assignment, such as changing the system time?
privilege use
Applications that are not designed for Windows 10 and that require administrative privileges do not properly request elevated privileges, generating an error. You can eliminate this error by using which of the following?
Application Compatibility Toolkit (ACT)
What is the security process that records the occurrence of specific operating system events in the Security log?
Auditing
Members of what group can back up and restore all files and folders on the computer?
Backup Operators
What account has extremely limited access to resources and computer activities and is intended for occasional use by low-security users?
Guest
What encryption algorithm is one-way encryption, which means that it encrypts data, but the data cannot be decrypted?
Hash
What Windows 10 Feature simplifies the configuration of peer-to-peer networks by removing the need to synchronize users and passwords on each computer?
HomeGroup
Which rule condition identifies software by file location?
Path
Which network (or workgroup) consists of multiple Windows computers that share information, but no computer on the network serves as an authoritative source of user information?
Peer-To-Peer
Which profile is stored in a network location rather than on the local hard drive?
Roaming
Each time a user logs on locally, which database is used to verify sign-in credentials?
SAM
Which of the following is used to protect your computer from malware that may attempt to steal your password?
Secure sign-in
Which policy Temporarily disables an account after a number of incorrect log-on attempts?
account lockout policy
Which encryption algorithm uses two keys to encrypt and decrypt data?
asymmetric
Which of the following is the name assigned to the WAP to identify itself to clients?
security set identifier SSID
What type of encryption algorithm uses the same key to encrypt data and decrypt data?
symmetric