CIST 2411 ch 7-14 review
Besides the .NET Framework 4.6, what other version of the .NET Framework does Windows 10 provide as a feature? Answers: a. .NET 2.5 b. .NET 3.5 c. .NET 2.0 d. .NET 4.8
.NET 3.5
Each Microsoft account is allocated how much storage that can be used for file storage in OneDrive? Answers: a. 1 GB b. 7 GB c. 5 GB d. 10 GB
5 GB
If you configure a virtual machine with dynamic memory, what is the default minimum RAM that will be configured? Answers: a. 512 MB b. 1 GB c. None d. 256 MB
512 MB
If Windows 10 is configured to use dynamic IP configuration and is unable to contact a DHCP server, the default action is to use which type of address? Answer: a. APIPA b. NetBIOS c. IPv6 d. WINS
APIPA
Which of the following expands on the domain concept by linking domains in logical structures named trees and multiple trees into forests? Answers: a. NAP b. Enterprise Directory c. Active Directory d. WSU
Active Directory
Your Client Hyper-V host has a single network adapter. What option should be enabled to allow your virtual machines to communicate with the external network while not disrupting host network communication? Answers: a. Generation 2 virtual machine b. Enable virtual LAN identification for management operating system c. Allow management operating system to share this network adapter d. Enhanced session mode
Allow management operating system to share this network adapter
Which ACT component is the administrative console that can be used to control the overall discovery, collection, and analysis process for apps? Answers: a.Inventory-collector package b.ACT Log Processing Service c.ACT database d.Application Compatibility Manager
Application Compatibility Manager
What do applications use to request services from the application environment subsystem? Answers: a. Hardware Services b. Application programming interfaces (API) c. Kernel services d. .NET Framework
Application programming interfaces (API)
User accounts that are enrolled to be managed by Microsoft Intune must be linked to which of the following? Answers: a. Azure AD b. A DNS record c. A local AD d. A SAM account
Azure AD
Windows 10 introduces a newer version of Windows Backup. What did Microsoft decide to call this newer version? Answers: a.File History b.Backup and Restore (Windows 7) c.Microsoft Backup for Windows 10 d.Windows Backup 10
Backup and Restore (Windows 7)
What Windows 10 allows you to centralize the administration of printers for remote locations but still keep WAN link utilization low because the print jobs stay local? Answer: a.Branch Office Direct Printing b.Windows Remote Office c.Windows Connectivity d.Windows Printing
Branch Office Direct Printing
In which technology are files stored in a file share in a central location, but are cached at the remote site to make it faster to open the files? Answers: a. Distributed File System b. Windows Server Update Services c. User Experience Virtualization d. BranchCache
BranchCache
Which Windows 10 feature allows you to create virtual machines with a completely independent operating system that shares the hardware on the computer running Windows 10? Answers: a. App-V b. Client Hyper-V c. Virtual Desktop Infrastructure d. RemoreApp
Client Hyper-V
Which USMT file is generated by running ScanState.exe with the /genconfig option? Answers: a.MigApp.xml b.MigSys.xml c.Config.xml d.MigUser.xml
Config.xml
Which registry key contains the default registry settings that are copied for new user profiles? Answers: a.OWNER b.DEFAULT c.ADMIN d.SYSTEM
DEFAULT
Which processor feature monitors processes to ensure that they do not access unauthorized memory spaces, which is done by various types of malware, such as viruses, to take control of systems? Answers: a. LOGO b. WEI c. XPS d. DEP
DEP
Which of the following appears to be a single, large file structure, but can really be composed of shared folders on multiple servers? Answers: a.DNS b.DFS namespace c.DFS replication d.BranchCache
DFS namespace
Which of the following is an automated mechanism used to assign IP addresses, subnet masks, default gateways, DNS servers, WINS servers, and other IP configuration information to network devices? Answers: a. X.25 b. DHCP c. IPX d. AIX
DHCP
During the installation process for a new device, what are used in order to describe how the installation should be performed? Answers: a. Device setup classes b. HDIDs c. Device identification strings d. hardware IDs
Device setup classes
What type of bottleneck occurs when Windows 10 and running applications want to read and write information to the physical disk in the system faster than the disk can manage? Answers: a. Disk b. Network c. Memory d. Processor
Disk
Which area of the Resource Monitor is used to monitor disk performance and determine whether the disk subsystem is a bottleneck? Answers: a.Memory b.Disk c.CPU d.Network
Disk
When Windows 10 can communicate with a domain controller, the network connection is automatically placed in which location category? Answers: a. Work network b. Public network c. Domain network d. Home network
Domain network
IKEv2 requires the use of which authentication protocol? Answers: a. Password Authentication Protocol (PAP) b. Challenge Handshake Protocol (CHP) c. Point-to-Point Protocol (PPP) d. Extensible Authentication Protocol (EAP)
Extensible Authentication Protocol (EAP)
Which of the following is NOT an Intune policy category? Answers: a.Configuration Policies b.Compliance Policies c.Firewall Policies d.Corporate Device Enrollment Policies
Firewall Policies
Which of the following is a correct statement about Generation 1 and Generation 2 virtual machines? Answers: a. Generation 1 virtual machines use BIOS-based firmware; Generation 2 virtual machines use UEFI-based firmware b. Generation 1 virtual machines can boot to a SCSI virtual disk; Generation 2 virtual machines can only boot to IDE virtual disks c. Generation 1 virtual machines support secure boot; Generation 2 virtual machines do not support secure boot d. Generation 1 virtual machines support USB disks; Generation 2 virtual machines support floppy disks
Generation 1 virtual machines use BIOS-based firmware; Generation 2 virtual machines use UEFI-based firmware
Which of the following can be pushed down to a computer and can be changed by the user? Answers: a. Group Domain Object b. Group Policy Preference c. Group Policy Object d. Group Policy Setting
Group Policy Preference
For domain-joined computers, what is the simplest way to configure VPN connections? Answers: a.Group Policy Preferences b.Windows PowerShell c.manually d.CMAK
Group Policy Preferences
Which registry hive contains details about the current hardware profile in use? Answers: a. HKEY_LOCAL_MACHINE b. HKEY_CURRENT_USER c. HKEY_CLASSES_ROOT d. HKEY_CURRENT_CONFIG
HKEY_CURRENT_CONFIG
To see a list of Intune-managed devices for which Secure Boot is not enabled, which report should you check? Answers: a.Device History Reports b.Noncompliant Apps Reports c.Health Attestation Reports d.Detected Software Reports
Health Attestation Reports
File Explorer contains ribbon tabs that can be used for various functions. Which ribbon tab has buttons for manipulating files and folders? Answers: a.Share b.Home c.File d.View
Home
When a VPN connection loses connectivity due to a network interruption, which protocol can reconnect automatically once network connectivity is restored using a feature known as VPN Reconnect? Answers: a. IKEv2 b. PPTP c. L2TP d. SSTP
IKEv2
Which CPU feature must be present to run Client Hyper-V? Answers: a. Hyperthreading b. 2.4 GHz or faster c. 32-bit processor d. Intel VT
Intel VT
Which Internet Explorer security zone includes all Internet Web sites that are not specifically assigned to another zone? Answers: a. Restricted sites b. Internet c. Trusted sites d. Local intranet
Internet
Which protocol is responsible for responding to discovery requests from other computers? Answers: a. Link-Layer Topology Discovery Mapper I/O Driver b. IPv6 c. Link-Layer Topology Discovery Responder d. IPv4
Link-Layer Topology Discovery Responder
To enable centralized management of BitLocker, you need to install which of the following on each computer? Answers: a. UE-V profile b. WDS client c. WSUS node d. MBAM agent
MBAM agent
Intune can distribute third-party updates in which of the following formats? Answers: a. BIN b. XML c. COM d. MSP
MSP
Which of the following is a new Web browser included with Windows 10? Answers: a. Microsoft Edge b. Internet Explorer 10 c. Google Chrome d. Safari
Microsoft Edge and Internet Explorer 11
Which alert category in Microsoft Intune should you use to get a notification when an automatic service fails to run? Answers: a.Monitoring b.Endpoint Protection c.System d.Notices
Monitoring
What is used to prevent users to connecting to Remote Desktop until the connection is authenticated? Answers: a. Network Level Authentication b. Windows Firewall c. Remote Desktop Authentication d. IPsec Authentication
Network Level Authentication
As part of DirectAccess configuration, which of the following is also configured? Answer: a.Virtual Private Network Server b.Remote Desktop Server c.Remote Assistance Server d.Network Location Server
Network Location Server
Which of the following allows you to configure the security settings for each location type differently? Answers: a. Location oriented b. Connection awareness c. Connection oriented d. Network location awareness
Network location awareness?
DSL connections usually use which protocol in order to secure connections? Answers: a. IPv6 b. IPsec c. PPPoE d. L2TP
PPPoE
Which Windows 10 feature provides the ability to obtain software from a central repository? Answers: a. Remote Desktop b. PackageManagement c. Click-to-Run d. RemoteApp
PackageManagement
Where in the Hyper-V architecture do device drivers reside? Answer: a.Parent partition b.Hypervisor c.Hardware d.Child partition
Parent partition
What utility allows you to visually display the data generated by counters, and allows you to select the individual counters you want to view? Answers: a. Network Monitor b. Resource Monitor c. Disk Monitor d. Performance Monitor
Performance Monitor
Which page description language is the oldest and best supported? Answers: a. XPS b. PCL c. Postscript d. PDF
Postscript
If File History or Backup and Restore (Windows 7), or both, had been configured to protect user data, that data can be recovered using which feature? Answers: a.Data Collector Set b.Previous Versions c.System Restore d.File Retriever
Previous Versions
Which printer management tool would you typically use to manage printer servers rather than individual computers? Answers: a.Devices and Printers b.Connected devices c.Print Management snap-in d.Printers & Scanners
Print Management snap-in
A new interface for managing printers in Windows 10 is known as which of the following? Answers: a.Devices and Printers b.Printers & Scanners c.Connected devices d.Print Management snap-in
Printers & Scanners
Which location type is used when the computer is connected as part of a peer-to-peer network in a trusted location? Answers: a. Private network b. Domain network c. Public network d. Work network
Private network
Which location type is used when the computer is connected as part of a peer-to-peer network in a trusted location? Answers: a. Work network b. Public network c. Private network d. Domain network
Private network
Which of the following allows a user to send an invitation to a remote user that invites them to remotely connect to the local computer? Answers: a. Remote Desktop b. Remote Access c. Remote Control d. Remote Assistance
Remote Assistance
Which of the following is NOT a method for copying user accounts from on-premises Active Directory? Answers: a. SecureCopy b. Azure AD Connect c. Azure AD Sync d. DirSync
SecureCopy
Using Office 365, you can synchronize files from libraries located in which of the following? Answers: a.Offline Files b.SharePoint Online c.Remote Assistance d.Windows Store
SharePoint Online
What Windows 10 feature captures a screenshot each time the user clicks on a screen item and saves the screenshots and users actions in a report that can be emailed or saved to a shared storage location? Answer: a.File Recovery b.Steps Recorder c.Steps Monitor d.Event Viewer
Steps Recorder
Which utility should be used to review any synchronization errors that might occur using the Offline files feature in Windows 10? Answers: a. Work Folders b. File History c. OneDrive d. Sync Center
Sync Center
Which of the following tools can be used to deploy operating systems to the point where you do not need to physically touch the computer? Answers: a. System Center Configuration Manager b. Windows System Image Manager (Windows SIM) c. Deployment Imaging Servicing and Management (DISM) d. Windows Imaging and Configuration Designer (Windows ICD)
System Center Configuration Manager
Which protocol is included with Windows 10 for network communication? Answers: a. AppleTalk b. NetBEUI c. TCP/IP d. IPX
TCP/IP
Which of the following is an updated version of TCP/IPv4 with a larger address space and additional features? Answers: a.LLTPRD b.TCP/IPv6 c.AIX d.LLTP
TCP/IPv6
Which utility can be used to provide an overview of the current state of the computer? Answers: a. Performance Monitor b. Data Manager c. Data Collector Set d. Task Manager
Task Manager
Which of the following is a default Intune user group? Answers: a. Administrator Users b. Power Users c. Ungrouped Users d. Standard Users
Ungrouped Users
Which of the following is NOT an operating system supported by Microsoft Intune as a mobile device? Answers: a. Mac OS X 10.9 b. Windows 8.1 RT c. Windows 7 d. Android 4.0
Windows 7
Which of the following is NOT a desktop OS supported by Intune with an Intune client installed? Answers: a. Windows 8.1 RT b. Windows 7 Ultimate c. Windows Vista Business d. Windows 10 Pro
Windows 8.1 RT
Which of the following uses a USB drive as a memory cache similar to a paging file? Answers: a. Low-priority I/O b. Windows ReadyDrive c. Windows ReadyBoost d. Windows SuperFetch
Windows ReadyBoost
You can modify the locations included in a library, but the location must be indexed by which of the following? Answers: a. Documents b. Windows Search c. File Explorer d. Libraries
Windows Search
Which of the following terms is used to describe a virtualized environment that hosts Win32 apps on the 64-bit version of Windows 10? Answers: a. Client Hyper-V b. Windows on Windows 64 (WOW64) c. Win64d. App-V
Windows on Windows 64 (WOW64)
Instead of logging performance counters to disk, you can configure which of the following to occur? Answers: a. alerts b. tasks c. messages d. archives
alerts
The full Intune product is available through which of the following? Answers: a. from the Windows Features control panel b. as part of the EMS c. free from the Microsoft Download site d. from the Windows Store
as part of the EMS
What is the preferred method to configure clients to use Work Folders? Answers: a. automatic discovery b. manually enter the Work Folders URL c. configure user object in Active Directory d. configure through the System and Security applet
automatic discovery
What is the preferred method to configure clients to use Work Folders? Answers: a. configure user object in Active Directory b. configure through the System and Security applet c. automatic discovery d. manually enter the Work Folders URL
automatic discovery
Which of the following is NOT a benefit of using VHDX instead of VHD format virtual disks? Answers: a. improved performance b. better resilience to corruption c. automatic trimming d. better backward compatibility
better backward compatibility
When a limitation in a single computer system component slows down the entire system, which of the following occurs? Answers: a. baseline b. counterdown c. bottleneck d. crashdown
bottleneck
What is required for Apple iOS devices to establish a trust between the device and the Intune service? Answer: a.certificate b.hash value c.PIN d.secret key
certificate
When a new device is installed into a Windows 10 computer, the operating system uses a device setup class and which of the following in order to properly install the new device? Answers: a. device controller b. identification service c. service string d. device identification string
device identification string
Which of the following is considered the oldest technology for remote access? Answers: a. dial-up networking b. virtual private network c. DirectAccess d. TCP/IP
dial-up networking
Which Active Directory component has a central security database that is used by all computers that are members of it? Answers: a. DNS b. WSU c. OU d. domain
domain
What feature must you enable on a virtual machine to use RDP functionality? Answers: a.virtual machine connection b.PowerShell Direct c.enhanced session mode d.Guest Service Interface
enhanced session mode
An IP address is composed of a network ID and which of the following? Answers: a. host ID b. type ID c. node ID d. location ID
host ID
What happens if an APN certificate expires? Answer: a.iOS device management will fail b.the managed device is erased c.the administrator is warned and given a 1 month grace period d.the device is locked until the Apple ID password is entered
iOS device management will fail
In Windows 10, which of the following is updated each time a file is changed to ensure that search results are current? Answers: a. index b. search box c. context d. file
index
Windows 10 includes search functionality that can be used to find files and folders. Which of the following is used to increase the efficiency of searching in Windows 10? Answers: a. viewing b. profiling c. indexing d. context searching
indexing
Which service is NOT supported by the Intune client for desktop computers? Answers: a. issuing certificates b. managing apps c. software updates d. updating Windows Firewall settings
issuing certificates
Data sent to which of the following returns to the computer that sent it and does not appear on the actual network? Answers: a. loopback address b. multicast address c. class D address d. MAC address
loopback address
Characteristics of a file such as file name, creation data, and modified date are known as which of the following? Answers: a. metadata b. index c. service d. category
metadata
Active Directory information can be changed on any domain controller and those changes will be replicated to other domain controllers. What is this type of replication called? Answers: a. multicast b. anycast c. unicast d. multimaster
multimaster?
You need to enable Client Hyper-V on a virtual machine; what feature do you need to use? Answers: a. Hyper-V replica b. nested virtualization c. live migration d. tunneling protocol
nested virtualization
Which of the following is responsible for enabling communications between Windows 10 and the network device in your computer? Answers: a. network driver b. network protocol c. socket d. kernel
network driver
What is the default format for an Office 365 tenant account? Answer: a.nickname.yourdomain.com b.nickname.microsoftazure.com c.nickname.onmicrosoft.com d.nickname.office365.com
nickname.onmicrosoft.com
You can start Remote Desktop Connection from a command prompt by running mstsc.exe. Which option can be used with this command to prevent Remote Desktop Connection from saving information to the local computer? Answer: a./control b./public c./admin d./shadow
not /public or /shadow
In Windows 10, a virtual instance of DOS is created for each DOS application that is executed. What is another name for this virtual instance of DOS? Answers: a. kernel32.exe b. ntvdm.exe c. dosvdm.exe d. kernelDOS.exe
ntvdm.exe
If you have obtained the .appx file for a Windows Store app, you can install the app from a source other than the Windows Store. What is this ability known as? Answers: a. Click-to-Run b. package managment c. download d. distribution
package managment
Which utility can be used by a user with administrative rights in order to stage a driver manually? Answer: a.pdriver.exe b.pinstall.exe c.xpsprnt.exe d.pnputil.exe
pnputil.exe
What Windows 10 feature is a user-specific data protection mechanism that protects local resources by allowing user files to be backed up to an external hard drive or network location? Answers: a. brklog b. tsklog c. relog d. schlog
relog
Which of the following software does the remote client use to send keyboard and mouse commands to the computer being remotely controlled? Answer: a.remote resource b.remote control c.remote access d.remote admin
remote control
Which term best describes a snapshot of operating system and program files at a specific point in time that can be restored to roll back to a point in time when the operating system or applications were stable? Answers: a. recovery point b. restore point c. system restore d. steps recorder
restore point
To make Active Directory more manageable, it is divided into the domain partition, configuration partition, and what other partition? Answers: a. forest b. schema c. OU d. controller
schema
What is the secondary administrator that can be specified for Intune called? Answers: a. service administrator b. management user c. super user d. local administrator
service administrator
Which distribution method delivers the critical components of an application first and allows the users to being using the application before installation is complete? Answers: a. sideloading b. REG.EXE c. Click-to-Run d. downloading
should be Click-to-Run
Each Win32 application runs in its own virtual memory space and is executed by the processor in which mode? Answers: a. kernel b. user c. Win32 d. DOS
user
All of the application environments in Windows 10 restrict apps to running in which of the following modes? Answers: a. kernel mode b. user mode c. service mode d. Win64 mode
user mode