Configuring Windows Devices Final Exam Review
If you want to configure authentication to Windows 10 or create and manage local user accounts, which Settings category should you open?
Accounts
What type of technology allows users to work with files whether they are connected to a network or not by copying files locally to mobile computers?
Data synchronization
Which of the following can be used to capture and apply images used for installing Windows 10 as well as mount and modify images that are offline?
Deployment Image Servicing and Management (DISM)
Where should you go on the Windows 10 desktop if you want to see important notifications from the operating system?
The Action Center
Which of the following commands will you use to check the basic connectivity between your computer and a computer with the IP address 192.168.1.100? You need to send a minimum of six requests.
ping 192.168.1.100 -n
When a limitation in a single computer system component slows down the entire system, which of the following occurs?
A bottleneck
Jimmy downloaded a game from the Internet and installed it on his Windows 10 system. A couple of days after the installation, his computer's performance degraded drastically. Assuming that the game had slowed it down, he uninstalled the game and used software to get rid of residual files. Despite this, his computer's performance did not improve. Inspecting the Resource Monitor revealed that the Memory and CPU were running close to 100% capacity. He suspects that the computer is infected with malware. Which of the following scans would you recommend to Jimmy?
A full scan
Which of the following is a domain controller that holds a subset of the information in all domain partitions?
A global catalog server
Which of the following illustrates the use of a domain network?
A group policy setting is used to update the settings of all computers in the network
Which of the following expands on the domain concept by combining domains in logical structures named trees and multiple trees into forests?
Active Directory
Identify a difference between a standard user account and an administrator account.
An administrator account can update device drivers, whereas a standard account cannot
Zen Corp. has developed a new word processor. Customers can download the app on a subscription basis. After a new customer purchases a subscription, the app is automatically streamed to the customer's computer and installed. Zen Corp. regularly updates the source app installed on its server, which in turn pushes the updates to the customer's computer. Which of the following has the company used to deploy its app?
App-V
Eva, a graphic designer, uses a Windows 10 PC. Her PC recently crashed, so she wants to use the Reset this PC option to recover her PC. Which of the following items will Eva be unable to restore with the Reset this PC option?
Apps that she installed on the PC after purchasing it
Which of the following can be used to configure a dynamic IPv4 address in a Windows 10 computer?
Automatic assignment
Which of the following can be used to create groups to organize users, but on the cloud?
Azure AD
Which of the following is a method for protecting data on removable storage, such as USB drives?
BitLocker To Go
Your organization is transitioning to a cloud-based infrastructure. However, several of its services rely on the use of an on-premise Active Directory. Since you are a network administrator, the management has reached out to you to provide a suitable transition plan that would least affect the day-to-day operations of the company. Which of the following suggestions would you provide?
Configure Windows as hybrid Azure AD-joined
Which of the following is a cloud-based solution to compatibility issues?
Desktop Analytics
Xervent Corp. uses the domain name "www.Xervent.com" and the IP address 172.225.120.40 to provide employees access to its services. Several employees report intermittent connectivity issues. When the network administrator troubleshoots the issue, the communication to the remote host works with the IP address but fails when the name is used. Identify the cause of the connectivity issue
Domain name server resolution
Which utility is used to browse events stored in system event logs?
Event Viewer
How often do domain controllers download Group Policy settings?
Every 5 minutes
Suresh works as a network administrator. He is asked to update the security settings of all the workstations under the HR organizational unit. Which of the following can he use for this purpose?
Group Policies
A firm purchases five hundred computers for its new office. A system administrator installs Windows 10 on all the computers. The administrator wants all the computers in the new office to have a consistent configuration. Which of the following features included in Windows 10 would be appropriate to complete this task?
Group Policy
Gina is viewing the permission settings for a folder, D:\Labs\TestFolder, in the Advanced Security Settings window. She wants to identify where the permission setting was first applied to this particular folder. Which of the following columns will give her this information?
Inherited From
Which Windows 10 security zone includes all Internet websites that are not specifically assigned to another zone?
Internet
Orson is trying to open an encrypted file on his Windows 10 system. The file was encrypted using EFS, and he opened this as recently as last week. Which of the following is most likely the reason that Orson is unable to open the file?
Orson reset the password of his Windows user account
Which type of network consists of multiple Windows computers that share information, but no computer on the network serves as an authoritative source of user information?
Peer-to-Peer
Elizabeth has a printer connected to her Windows 10 laptop. When she prints a document, the printed document does not have the same layout as the original file and there are formatting errors. She realizes that it must be an issue with the page description language. Which of the following page description languages would most likely resolve this printing issue?
PostScript
Which printer management tool would you typically use to manage printer servers rather than individual computers?
Print Management snap-in
Software that Windows 10 uses to understand and use the features of a printer is known as which of the following?
Print driver
Which advanced audit policy setting tracks when tasks are performed that require a user-rights assignment, such as changing the system time?
Privilege Use
Claire is assigned the Read permission to a shared folder as user. She is also part of the Marketing group that has List Folder permissions to the shared folder. What is Claire's effective permission to this folder?
Read & Execute
The _____ option in the Services tool allows you to specify which action is taken after first, second, and subsequent failures.
Recovery
Yunha, a college student, uses a Windows 10 laptop to study and play games. During the past month, Yunha updated the operating system and drivers on his laptop. Some of the games began crashing after these updates. Which of the following tools should Yunha use to identify the underlying issue?
Reliability Monitor
Selecting a counter displays information about that counter's collected data as a chart type. Which chart type displays the current value of each performance counter in decimal format?
Report
Which term best describes a snapshot of system files and settings created at a specific point in time?
Restore Point
One of your friends, Steve, wants to rename a local user account using the Computer Management Administrative Tool. He opens the properties window; however, he does not find any option to rename the user account. What should he do instead?
Right-click on the user account to rename it
Each time a user logs on locally, which database is used to verify sign-in credentials?
SAM
How will you configure your computer to be visible on a remembered network that is profiled as a public network?
Select the turn on network discovery option in the Network and Sharing Center
Ayesha is using the Windows 10 Home edition on her laptop. She navigates to a folder containing music files. She wants to burn these files to a CD. Which of the following tabs on the ribbon should Ayesha use to complete this task?
Share
Nicole, a system administrator, is configuring basic NTFS permissions on folders on a common computer used for miscellaneous tasks such as printing or browsing social networking sites. What is the scope that is automatically configured scope in this scenario?
This folder, subfolders, and files
Linda works as a network administrator in a multinational corporation. It has come to her notice that some updates lead to a significant computer downtime because they are either incompatible or not installed properly. In order to resolve this issue, she decides to use the Windows Server Update Services to control the updates that are sent to the computers. How would this move help resolve the current issue?
Updates can be tested before they are applied
Running apps in which mode ensures that a poorly written app does not affect system stability?
User mode
You have created accounts for five people on a Windows 10 computer. They are able to sign in, work on files, and save them; however, they are not able to install new software on the computer. Which of the following groups do these accounts belong to?
Users
Which of the following can you use to run a Win16 application?
The 32-bit version of Windows 10
Most of a basic disk's partition attributes are stored in a data table that is part of the MBR or GPT specification. What is this table commonly called?
A partition table
Which of the following allows backward compatibility in Windows 10?
.NET Framework 3.5
Which of the following is the CIDR notation of 255.255.255.0?
/24
Zachary is creating a script to use Sysprep for deploying Windows 10 by imaging. Because he's using batch files, he wants to prevent Sysprep from displaying any dialog boxes. Which of the following command-line options should he use in his script?
/quiet
Venona Inc., a food processing company, buys laptops that have the 64-bit version of Windows 10 preinstalled. On the first day of use, employees run into issues with the new laptops. They are unable to use a critical 16-bit business application that they were using without issues on their previous computers. Which of the following is the most likely reason the employees are not able to run the business application?
16-bit software cannot run on a 64-bit version of Windows 10
Remote Desktop listens on which TCP port number?
3389
What is the default value for the Maximum password age setting in the Password Policy?
42 days
How much RAM is supported by the 32-bit version of Windows 10?
4GB
When a new hard disk is added to a computer, it is initially configured as which type of disk?
A Basic Disk
Which of the following terms is a collection of computers and users that are identified by a common security database?
A Domain
Eric, an IT administrator, sets up a KMS server in his organization to enable KMS activation of Windows 10 licenses. The organization buys 20 new computers with generic volume license keys (GVLK) configured. Two days after the purchase, Talal tries to activate these 20 computers using the KMS server, but the licenses are not activated. Which of the following is a reason for the activation failure?
A KMS server has a minimum activation threshold of 25 instances for Windows 10
Which profile is stored in a network location rather than on the local hard drive?
A Roaming Profile
Which of the following are required for individuals to sign in to Windows 10 and use resources on the computer?
A User Account
Which of the following best describes a set of performance indicators captured when system performance is acceptable, effectively defining normal performance?
A baseline
You are the administrator at a software consulting firm. A Windows 10 user accesses an online learning website. However, some features of the website, such as pop-up windows, are blocked. You verify that the website is a legitimate website that does not have any malicious software. If the user is using Microsoft Edge, what should you do to resolve this issue?
Add the website to the Trusted sites zone
Which of the following can be used to define which programs are allowed or disallowed in the system?
AppLocker
Your organization is upgrading all existing computers to the 64-bit version of Windows 10. However, it needs to continue running a Windows XP app on some computers. As a systems administrator, you have been tasked with identifying a solution. How will you run the legacy app without dedicated resources?
By using Client Hyper-V
Diego has the Windows 10 Home edition installed on his personal laptop. As an avid gamer, he prefers having his computer update with the latest feature updates from Microsoft. He usually plays games at specific times, and he wants to prevent his computer from restarting to install an update during these time slots. Which of the following Windows Update settings should Diego modify?
Change active hours
Which of the following installations of Windows 10 is performed on a computer that does not have existing data or applications?
Clean
When file shares between two servers are cloned, which of the following synchronizes the data among the file shares?
DFS Namespaces
Martha works as a systems administrator in a multinational corporation. One of her colleagues is going on a sabbatical for six months. Martha must ensure that no one uses the colleague's user account until he returns. Which of the following actions can she take to ensure this?
Disable the account
Marshall, an IT administrator, wants to make changes to the disk configuration on a user's computer. He prefers using a tool that will give him a graphical view of the disks and volumes/partitions on the computer. Which of the following tools should Marshall use?
Disk Management console
Yemi needs to install Windows 10 on 25 custom-built computers in the organization. The computers do not have an OS installed. In addition to installing Windows 10, Yemi needs to install additional updates to the operating system and custom drivers for certain hardware and applications. Which of the following installation methods is best suited in this scenario?
Distribution share installation
Which Active Directory component is responsible for authenticating users when they sign in to a workstation?
Domain Controllers
Which feature of NTFS encrypts the contents of files?
EFS
For domain-joined computers, what is the simplest way to configure VPN connections automatically?
Group Policy Preferences
Identify the hive registry that contains the global settings of an entire computer.
HKEY_LOCAL_MACHINE
Jason is using video editing software to edit large video files to create a short movie. The application keeps freezing on his Windows 10 computer. Upon investigating the issues, he finds that the paging file is huge, and reading it from the SSD takes a lot of time. What should Jason do to resolve this issue?
He should increase the amount of physical memory
Which of the following terms is used to refer to the individual sections of the registry?
Hive
Which File Explorer ribbon tab has buttons for manipulating files and folders?
Home
When a VPN connection loses connectivity due to a network interruption, which protocol can reconnect automatically once network connectivity is restored using a feature known as VPN Reconnect?
IKEv2
Your organization issues certificates to users for authentication to resources. Because roaming profiles are not implemented, you implement credential roaming to synchronize the certificates to the profile on multiple computers. In this scenario, where are the user certificates stored?
In Active Directory
Ariela prepares a workstation for imaging and shuts it down. She boots the computer using Windows PE to continue the imaging process. To capture the image using DISM, she needs to use the following command: DISM /Capture-Image /ImageFile:imagefile.wim /CaptureDir:path /Name:imagename. In this command, what does /CaptureDir:path signify?
It defines source files that are to be captured as part of the image
Which VPN protocol uses IPSec to provide data encryption?
L2TP
Account Policies settings are located in which of the following?
Local Security Policy
Which of the following can be used to handle domain-joined desktop computers?
Microsoft Endpoint Configuration Manager
Maria is modifying the basic NTFS permissions for a folder. She wants to enable the permission that is the equivalent of enabling Write and Read & execute permissions combined. Which of the following options is the best choice?
Modify
Justin is using USMT to migrate user profiles to newly purchased Windows 10 computers in the organization. To begin the migration, he executes the ScanState.exe process on the source computers to collect user profile information. Where is this information most likely to be stored?
On a network file share
Which of the following storage space types can only be created with three or more physical disks?
Parity
An application on Welma's computer crashes whenever she tries to save a file that she is working on. To help resolve the issue over the Internet, she contacts Ezekiel from the tech support team. After signing in using his Microsoft Azure AD account, he receives a security code that he sends across to Welma. Welma uses this code to grant Ezekiel access to her computer. Which of the following remote assistance tools are Ezekiel and Welma most likely using?
Quick Assist
By installing which server role can Windows Server 2019 be configured as a remote access server?
Remote Access
Which of the following allows a user to send an invitation to a remote user that invites them to remotely connect to the local computer?
Remote Assistance
Which of the following installation methods is the least suitable method for a large volume of computers?
Removable media
Rachael created a Windows 10 image 12 months ago and continued to use the same image for new deployments during this period. All updates to the OS, drivers, and applications were performed on the deployed workstations directly. She now wants to update the image so that it contains the latest updates for future deployments. What is the optimal approach that Rachael should take in this scenario?
She should apply the image to a computer, make modifications, and capture the image again
Laila is editing an image on her laptop using an image processing application. The application freezes frequently. When she contacts customer support, she is request for a screenshot of the frozen application to create a support ticket. Which of the following shortcuts can Laila use to take a screenshot of only the frozen application?
Shift+Print Screen
Which utility should be used to review any synchronization errors that might occur using the offline files feature in Windows 10?
Sync Center
Lea, a project manager, saves project-related files in a shared folder on her computer. Some project managers are given access to this folder. She notices that one of her colleagues who did not have access to the folder was viewing one of the files on his computer. She asks Martin, the network administrator, to check if the colleague had access to the shared folder. Which section of the Computer Management MMC console should Martin access to view this information?
System Tools
You have bought a new Windows 10 desktop. While exploring your new computer, you notice that some of the visual effects that you expected to see on the computer are not being displayed. You browse the Internet to find out that Windows 10 could have disabled some of these effects as per the computer configuration. Which of the following options in Control Panel will you choose to enable them?
System and Security
Odilon installs a VPN application on his Windows 10 computer. The application is configured by default to start automatically. This is impacting the boot time on his computer, so he wants to disable automatic startup. The application does not have a setting to disable this, and Odilon is unsure of the mechanism used by the application to start automatically. Which of the following tools can Odilon use to prevent the VPN application from automatically starting?
Task Manager
The Windows 10 computers in your office are configured such that the files saved in the Documents folder can be viewed and edited by students singing in using different user accounts. The documents are visible in the Documents folder of each user. Which of the following user profiles does this configuration demonstrate?
The Public Profile
Lorena has multiple windows open on her desktop. She wants to minimize all the windows except the currently active window. Which of the following features of Windows 10 should Lorena use?
The Shake Feature
Which Windows feature includes three columns and includes Live Tiles in the right-hand column?
The Start Menu
Steffi has a computer that runs on a Windows 10 operating system. The computer often crashes, displaying the blue screen error. One of her friends, who works as a systems administrator, tells her that the RAM may be faulty. Identify a tool that Steffi can use to check this issue?
The Windows Memory Diagnostics Tool
Merwyn's laptop has Windows 10 installed on the C drive. He creates a new folder, Work, on the D drive and adds this folder to the Documents library. He then navigates to the Work folder in the Documents library and creates a new Word file. Which of the following is true of this scenario?
The Word file is created in the Work folder on the D drive
What does a yellow exclamation mark against a hardware component indicate in Device Manager?
The component is not functioning properly
Curtis uses his Microsoft account to sign in to his desktop computer as well as his mobile device. He uses his mobile device to change his account's password. He signs out of his computer and tries signing in again. However, he is not able to. Why do you think he is not able to sign in?
The computer was not connected to the Internet
Lara works as a system administrator in a small start-up. The computers in her office are configured to use dynamic IP configuration. One day, the computers had intermittent Internet access, and as the administrator, she was trying to troubleshoot the issue. While the computers could not access the Internet, they were able to communicate with each another. Upon investigating, it was noted that the computers were connected to the 169.274.0.0/16 network. Identify the cause of the connectivity issue.
The computers were assigned link-local unicast addresses
Martha sets up a local peer-to-peer network at her home office. She has five Windows 10 computers connected to the network. The computers were not able to access the Internet. Upon troubleshooting, she noticed that the packets sent from the computers were blocked by an IPv6-aware router; however, she was able to send ping requests from one computer to another. Identify the issue with the network configuration
The computers were assigned link-local unicast addresses
Which of the following statements about domains is true?
The correct answer is: If a domain user account needs to be removed, it has to be removed only from the domain database on the domain controller and not each domain member computer
Samantha is conducting a presentation on hardware and software troubleshooting. While she is conducting the presentation using a projector screen, one of her colleagues is working on another task on her laptop. During the presentation, the slides keep moving back and forth from the screen. Can you identify the configuration issue that is likely causing this problem?
The displays are probably configured using the Extended option
Which of the following installations of Windows 10 is performed on a computer that does not have existing data or applications?
User State Migration Tool (USMT)
Brian receives a link to a free download of a premium application in his email. He clicks the link and the application downloads. Before installing it, he wants to verify the authenticity of the download. He verifies the MD5 value of the downloaded application against the MD5 value listed for the application on the original website. The MD5 values do not match. Which of the following is true in this scenario?
The downloaded application has been modified from its original and authentic version
Yemi creates a Word document in a OneDrive folder on her laptop and begins working on the document. Once Yemi completes her work, she closes the document. She notices that the file status icon is two arrows in a circle. What does this indicate?
The file is synchronizing
Vishal is considering switching to BitLocker Drive Encryption because of the inefficiencies of EFS. When he tries to use this encryption feature on Windows 10 Professional, he is unsuccessful. Which of the following is the most likely reason?
The hard drive does not contain a system volume
When applications or Windows 10 starts and are running, they read their configuration information from which of the following?
The registry
Daniel's friends gifted him a hard drive on his birthday. Daniel connected the hard drive to his laptop. He then used the Initialize-Disk cmdlet to initialize the disk without specifying a partition style. However, Daniel did not notice that the hard drive contained a video of his friends and family wishing him on his birthday. Which of the following is most likely to occur in this scenario?
The video on the disk will be deleted
You have configured your Windows 10 computer such that the computer enters the sleep mode after 10 minutes of idle time. However, you notice that this does not happen. What should you first do to troubleshoot this issue?
Verify the power management settings
When is a domain user account required for a scheduled task?
When the task needs to access network resources
Mika is on a flight to visit her parents. Before the takeoff, she is instructed to turn off her devices or put them in Airplane mode. After she gets off the flight and enters the airport, she notices that her Windows 10 laptop does not detect the public network. What do you think is preventing the laptop from connecting to the network?
Wi-Fi and Bluetooth are disabled on the laptop
Which of the following is not one of the five mainstream versions of Windows 10?
Windows 10 Business
Which of the following commands will you use if you are asked to check the connectivity between two Windows 10 computers connected to a local network?
ping
What do applications use to request services and functionality from Windows 10?
Windows API
Which tool in Administrative Tools allows you to configure IPSec settings?
Windows Defender Firewall with Advanced Security
Which of the following is a limited and non-graphical version of Windows 10 that can be used for installing, troubleshooting, and repairing Windows 10?
Windows PE
Which Advanced startup option in recovery settings is a small instance of Windows 10 that includes several options for troubleshooting and repairing Windows 10?
Windows Recovery Environment (WinRE)