CISC 144 Final Review
To encrypt a drive, what is the minimal amount of space that must be available?
64 MB
What is the default password expiration value in Office 365?
90 days
When you install the CAS role on Exchange, you automatically install what type of digital certificate?
A self-signed certificate
What type of MAPS membership will you need to configure to send information on the location of the malware including file names, how the malware operates, and how it has impacted your computer?
Advanced membership
Which MAPS option provides you with the best option for responding to and stopping the spread of new viruses and malware?
Advanced membership
What will you be prompted to do the first time you encrypt a file or folder using EFS?
Back up your file encryption certificate and key
Which of the following represents the correct command to use to set the boot timeout value that controls the length of time the computer waits to load the default operating system?
Bcdedit /timeout <value>
When setting up a policy that determines how to best manage device drivers that are not digitally signed in your organization, which of the following options provide the best stability for your Windows 8 systems?
Block
In older versions of Windows, such as Windows XP, the boot.ini file was used to provide the function that is now provided by which of the following items?
Boot Configuration Data (BCD) file
GPOs are assigned to users by which of the following actions?
By being linked to a container in Active Directory
Which of the following scenarios will cause BitLocker to go into Recovery mode?
Changing the boot order to another fixed drive Moving the BitLocker-protected drive to another computer Pressing the F8 or F10 key during the boot process
What is the effect of selecting the "Use the Update Services console" value on the "Enable client-side targeting policy" Group Policy setting?
Clients will all be placed into the Unassigned Computers computer group
How do you assign a recovery agent for EFS?
Configure a DRA in a GPO
Which of the following tools is best to use when you have bookmarked your favorite sites and want to make sure they are available across multiple PCs?
Configure them to sync via PC Settings.
What is used to convert a DHCP client's broadcast message into a unicast message for traversal over a router?
DHCP relay agent
You have several files and more will be added in the future. You want to define the NTFS permissions for these files that contain the word "legal" for users who are part of the Legal department. What should you do?
Enable and configure DAC.
What do you need to do if you run the Reliability Monitor but it is blank? a. Check the Event logs.
Enable the Reliability Monitor.
When configuring ActiveSync policies, you have three options available to select from that modify how passwords must be configured on devices after you enable the Require a password option. Which of the following listed items is not one of these options?
Enforce maximum password age
Which WPA mode of operation uses a session key that is changed each time the wireless client communicates with the AP?
Enterprise mode
What technology is natively provided by Microsoft Exchange Server for managing mobile devices?
Exchange ActiveSync
While running Windows 8 and connecting to a shared print queue using a v4 driver, which of the following locations is the least likely location from which the driver will be downloaded?
From the print server itself
In Windows 8, what wizard can you use to make the process of setting up a VPN profile and connecting to a VPN much simpler?
Get Connected Wizard
Which role is given to the person who creates the Office 365 account for your company?
Global Administrator
Which of the following are methods to connect to a Work Folder?
Group Policy URL entry Auto Discovery
What does Windows Defender do when you install another antivirus product?
It will completely disable itself
Which Windows Intune report would be best to get information about the software that is installed versus what is licensed?
License Installation Reports
What is the net effect of the following combination of share and NTFS permissions when the share is accessed over the network? Share permission (Share tab)—Sales group: Full Control NTFS permission (Security tab)—Sales group: Read & Execute, Modify, Write
Members of the Sales group will be able to edit content and delete files
What administrative interface is provided for setting encryption policies, monitoring computers against those policies, and reporting the encryption status across your organization?
Microsoft BitLocker Administration and Monitoring
Which of the following applications can be monitored by UE-V for seamless roaming profiles between devices?
Microsoft Office 2010 applications Internet Explorer 8, 9, and 10 Windows accessories (Notepad, Calculator)
In Exchange Server 2013, by default, what must you do to enable a user's mailbox for ActiveSync?
Nothing, it's enabled by default
Which of the following tools provides a central location from which the print services can be managed for the entire network?
Print Management snap-in.
Which of the following are options for backing up a BitLocker recovery key when encrypting your removable media?
Print it Save it to a file Back it up to your Microsoft user account
In the Windows Defender console, where will you find items that were not allowed to run, but were not removed from the computer?
Quarantined items
When implementing disk quotas there are several requirements that you must meet. Which of the following items is not one of those requirements for implementing disk quotas?
Quotas apply to all users, including administrators
You currently cannot print to a USB print device after updating its driver files. Which of the following tasks is the quickest way to return your print device back to normal operation?
Rolling back the driver.
Windows Server 2008 R2/2012 running the File Service server role and the BranchCache for Network Files role service use what network protocol to send content?
SMB
What feature of Windows is designed to provide warnings before you run unrecognized apps or download files from the Internet?
SmartScreen
The process of caching a print request to hard disk is referred to as what?
Spooling
When configuring synchronization for offline files to occur when a trigger event happens, you have several options available to choose from. Which of the following is not one of those options?
Sync when you restart Windows
Which Windows Intune report would be best to get information about the software updates that succeeded or failed?
Update Reports
How can you configure client computers to add themselves automatically to a desired computer group in the WSUS console?
Use client-side targeting
When configuring two-factor authentication using digital certificates in Windows 8 on hardware with TPM chips, which of the following methods is the most cost effective and secure?
Using virtual smart cards
To ensure computers in three branch offices (with no IT support onsite) receive Windows Updates on a regular basis along with those in a main office, which WSUS configuration provides the best solution with the least amount of administrative for the approval and distribution of updates and the least amount of traffic over the WAN link?
WSUS server at main office and downstream WSUS servers at each branch office running in replica mode. PCs configured to use the local WSUS server.
When creating a BYOD policy, your questions usually revolve around three core areas of concern. Of the items listed below, which one of them is not usually one of these core areas of concern?
When will the mobile devices be allowed to connect?
Which of the following operating systems does User Experience Virtualization (UE-V) work with? =
Windows 7 Windows 8 RDP sessions with App-V
What organization is responsible for the testing and verification of compatibility, reliability, and functionality of drivers for hardware devices?
Windows Hardware Quality Labs
What happens when an offline file has been changed locally and in the remote location since the last synchronization has occurred?
You are prompted to choose a way to resolve the conflict
To use EFS on a file or folder, which of the following conditions must you first meet?
You must be using an NTFS volume You must decompress the file or folder first
When using the CMAK to create a VPN profile, what must you do if you select the Allow the user to choose a VPN server before connecting option?
You must provide a text listing of VPN servers
To examine performance correctly, you must establish a performance baseline. When do you perform this task?
during normal usage
You have configured WSUS settings to be applied via a Group Policy Object linked to a specific OU in your organization. You have recently moved a new computer into the OU and want it to show up in the WSUS console immediately. What command can you use to help with this situation?
gpupdate /force
Which of the following statements are true concerning share permissions?
For drives formatted with the FAT/FAT32 file system, share permissions are the only option available. They determine the type of access that others will have to the folder when they connect to it over the network.
Which of the following basic security components is used to support Virtual Smart Cards?
Trusted Platform Module
Where are the certified drivers that ship with Windows 8 stored?
%systemroot%\system32\driverstore