CpS 201 - Test 2

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

As a freelancer, Manyata developed a traditional Win32 app for a client. The client has come back with a request to make the app compatible with Windows 10 in S mode. How should Manyata address the client's request?

She should repackage the app as an MSIX app.

Which of the following is included in the Windows 10 ADK?

Compatibility Administrator

Which of the following keys in the HKEY_LOCAL_MACHINE contains information regarding application data?

SOFTWARE

Which of the following keys in the HKEY_LOCAL_MACHINE contains information regarding device drivers?

SYSTEM

Ayesha is using the Windows 10 Home edition on her laptop. She navigates to a folder containing music files. She wants to burn these files to a CD. Which of the following tabs on the ribbon should Ayesha use to complete this task?

Share

What is the default value for the Maximum password age setting in the Password Policy?

42 days

Each Microsoft account is allocated how much storage that can be used for file storage on OneDrive?

5 GB

What will the Disk Management console report as the status of a disk when it recognizes that the disk does not belong to that computer?

A Foreign Disk

When a new hard disk is added to a computer, it is initially configured as which type of disk?

A basic disk

Jimmy downloaded a game from the Internet and installed it on his Windows 10 system. A couple of days after the installation, his computer's performance degraded drastically. Assuming that the game had slowed it down, he uninstalled the game and used software to get rid of residual files. Despite this, his computer's performance did not improve. Inspecting the Resource Monitor revealed that the Memory and CPU were running close to 100% capacity. He suspects that the computer is infected with malware. Which of the following scans would you recommend to Jimmy?

A full scan

Most of a basic disk's partition attributes are stored in a data table that is part of the MBR or GPT specification. What is this table commonly called?

A partition table

Which of the following best describes a file format that can be used by the operating system to emulate the function of a hard drive, with all the data and structural elements of a drive?

A virtual hard disk

Which policy allows you to configure an account to be temporarily disabled after a number of incorrect sign-in attempts?

Account Lockout

Ahva purchases a new hard disk to expand the storage on her PC. In which of the following scenarios should Ahva skip initializing the disk?

Ahva intends to add the hard disk to a storage pool.

Which of the following can be used to define which programs are allowed or disallowed in the system?

AppLocker

Applications that are not designed for Windows 10 and that require administrative privileges do not properly request elevated privileges, generating an error. Which of the following can you use to eliminate this error?

Application Compatibility Toolkit

What type of encryption algorithm uses two related, but unique, keys to encrypt and decrypt data?

Asymmetric

Which security process records the occurrence of specific operating system events in the Security log?

Auditing

Which of the following is not true of the NTFS file system?

Bad clusters that fail to store data are not tracked.

Which of the following statements is not true of basic disks?

Basic disks are an older technology that were introduced as an alternative to dynamic disks.

Tobias, a system administrator at a pharmaceutical company, uses BitLocker Drive Encryption to encrypt all Windows 10 computers in the organization. Because the computers contain sensitive information, users must enter a PIN to start the system. While this is a useful security feature when the computers are disconnected from the organization's network, this becomes a hindrance in performing remote maintenance because Tobias cannot start these computers without entering the PIN. Which of the following tools can Tobias use to overcome this issue?

BitLocker Network Unlock

Which of the following is a method for protecting data on removable storage, such as USB drives?

BitLocker To Go

Which Windows 10 feature allows you to centralize the administration of printers for remote locations but still keep WAN link utilization low because the print jobs stay local?

Branch Office Direct Printing

Yemi wants to transfer some files from her PC to an external storage device. She connects a USB drive to her PC, but the device is not recognized. She verifies that the appropriate driver is loaded by Windows 10. How can Yemi resolve the issue?

By restarting the PC

Diego has the Windows 10 Home edition installed on his personal laptop. As an avid gamer, he prefers having his computer update with the latest feature updates from Microsoft. He usually plays games at specific times, and he wants to prevent his computer from restarting to install an update during these time slots. Which of the following Windows Update settings should Diego modify?

Change active hours

Ruzwana creates a folder K:\Test. She edits the permissions of the folder to explicitly deny modify permissions to the folder. Which of the following actions will Ruzwana be able to perform on the folder as its owner?

Change permissions

Kesha spends time analyzing datasets that are larger than 1 TB in job as a data scientist. This data is stored in databases on her Windows 10 system. While running an analysis on these databases, she does not want her code to be slowed down because of real-time scanning by Windows Defender. Which of the following settings should Kesha modify to solve this problem?

Exclusions

Maya, a graphic designer, has many files stored on her laptop and the hard drive is running out of space. She decides to move some of these files to another storage device. She plugs in an SSD into the USB port, transfers some of the older files to it, and unplugs the SSD. Which of the following disk technologies does the SSD exemplify?

External disk

In File Explorer, which ribbon tab provides options to open a new File Explorer window, command prompt, or Windows PowerShell prompt that is focused on the current folder?

File

Ayaka is assigned Read share permissions to a folder and Full control NTFS permissions. She signs in to the computer holding this folder and tries accessing the folder by navigating via File Explorer. What is the effective permission to the folder in this scenario?

Full control

What type of encryption algorithm is one-way encryption, which means that it encrypts data, but the data cannot be decrypted?

Hashing

Which File Explorer ribbon tab has buttons for manipulating files and folders?

Home

You must right-click the disk name in Disk Management and select which of the following from the menu to initiate the import process?

Import Foreign Disk

Sharon recently lost an encryption certificate that rendered some of her EFS-encrypted files unrecoverable. To prevent a similar situation from arising in the future, she wants to create a recovery certificate for recently encrypted files. She creates the recovery certificate. What should Sharon do next?

Import the recovery certificate into the local security policy as a data recovery agent

Ariella is viewing the permission settings for a folder, D:\Labs\TestFolder, in the Advanced Security Settings window. She wants to identify where the permission setting was first applied to this particular folder. Which of the following columns will give her this information?

Inherited from

Which of the following is not true of GPT?

It is bootable from BIOS or UEFI firmware.

Which of the following is not true of DiskPart?

It is considered a low-level tool that is routinely used for day-to-day administration.

After returning from a vacation, Yunha transferred some photos from her smartphone to a folder on her laptop. She uses the Share tab in File Explorer to share this folder with her friend Kseniia. Which of the following is true of this scenario?

Kseniia will receive a copy of the folder's contents rather than the original folder itself.

Account Policies settings are located in which of the following?

Local Security Policy

Mahima is configuring advanced audit policies for Windows 10 clients. She decides to configure the Privilege Use category. Which of the following justifies Mahima's decision to configure the settings under this category?

Mahima wants to track instances where users change the time zone on their systems.

Which of the following do newer Windows applications use to describe the structure of an application?

Manifest

Marsha and Moira belong to the Sales group that has full control permissions to the K:\Sales folder. Within this folder, Marsha is assigned read permission to a file named SalesPipeline. Moira is assigned read and execute permissions to the same file. Marsha also belongs to the Marketing group that has read permissions denied to the K:\Sales folder, while Moira also belongs to the Legal group that has write permissions denied to the K:\Sales folder. Which of the following is true of the effective permissions in this scenario?

Marsha cannot open the Sales folder.

Mei's opens File Explorer on her Windows 10 laptop. She opens the simple sharing options for a folder. She selects another local user, Melissa, and changes the permission level to Read/Write. Which of the following is highest level of permission given to Melissa?

Melissa will have the Full Control NTFS permission.

Iba is modifying the basic NTFS permissions for a folder. She wants to enable the permission that is the equivalent of enabling Write and Read & execute permissions combined. Which of the following options is the best choice?

Modify

Which type of permissions is considered the most basic level of data security in Windows 10?

NTFS

Shawn signs into a Windows 10 system with administrative user privileges. The system has UAC enabled. Shawn accidently launches a malicious application that is infected with malware. If the malware is able to access and corrupt the system files, which of the following must be true?

On a prompt to continue or cancel running the program, Shawn selected to continue.

What is the name of the cloud-based storage that is automatically included for free when a Microsoft account in created?

OneDrive

Orson is trying to open an encrypted file on his Windows 10 system. The file was encrypted using EFS, and he opened this as recently as last week. Which of the following is most likely the reason that Orson is unable to open the file?

Orson reset the password of his Windows user account.

What is used by Windows 10 to define the layout of content for a print job?

Page description language

Which of the following storage space types can only be created with three or more physical disks?

Parity

Which policy controls password characteristics for local user accounts?

Password

Which rule condition identifies software by file location?

Path

Which page description language is the oldest and best supported?

PostScript

Which advanced audit policy setting tracks when tasks are performed that require a user-rights assignment, such as changing the system time?

Privilege Use

Ablorde is a tax advisor at TEXMII Consultants, a small business that hands tax filing for freelancers. Ablorde wants to share a folder on her computer with Rajesh. He has a Windows 10 computer that is connected to the same workgroup as Ablorde's computer. Which of the following is a requirement for successful sharing of files in this scenario?

Rajesh must have a user account on Ablorde's computer.

Raphael, a system administrator, is setting up the password policy for local user accounts. He allows users to reuse a password after they have used 4 different passwords. He also modifies the policy to force users to change their old passwords every 60 days. After some time, he notices that users are modifying their passwords 4 times in a short time span and continuing to use their old passwords. This defeats the purpose of setting up the password restrictions. Which of the following settings should Raphael modify to control this behavior?

Raphael should set the Minimum password age setting to at least 1 day.

Which file system is designed to verify and autocorrect data faults on a volume without having to bring the volume down for maintenance?

ReFS

Jordan is assigned Full Control share permissions to a folder and Read NTFS permissions. He accesses the share by using the UNC path from his computer over the network. What is Jordan's effective permission level to the share in this scenario?

Read

Chieh is assigned the Read permission to a shared folder as user. She is also part of the Marketing group that has List Folder permissions to the shared folder. What is Chieh's effective permission to this folder?

Read & Execute

Hang owns a Windows 10 laptop that does not have any issues. She is configuring Windows Update settings on this laptop. Which of the following settings should Hang leave turned on?

Receive updates for other Microsoft products when you update Windows

Joanna, a graphic designer at ChromaStage, has an application installed on her UAC-enabled Windows 10 system that was designed for an older version of Windows. Some of the application's features require administrative privileges. When she tries running the application, the application fails to run and generates an error instead. If Joanna's account already has administrative privileges, what can she do to resolve this issue?

She should use the Application Compatibility Toolkit to resolve the issue.

Which of the following allows you to begin using an application faster after printing by storing the print job as a file and sending the print job to the printer as a background process?

Spooling

Which of the following technologies combines selected physical disks into a managed logical group called a storage pool?

Storage Spaces

Which feature of NTFS allows a file or folder to point to another file or folder located somewhere else in the file system?

Symbolic links

What type of encryption algorithm uses the same key to encrypt data and decrypt data?

Symmetric

Which part of the motherboard in your computer is used to store encryption keys and certificates?

TPM

Winona has set up AppLocker rules to protect computers on the company network from being infected by malware. Despite this, one of the computers is infected by malware. She identifies that the malware infected the computer when a user ran a malicious .exe file. Which of the following prevented the AppLocker rules from being evaluated?

The Application Identity service is configured for Manual startup.

_____ is used with newer computers that use UEFI firmware to start the computer.

The GUID Partition Table

Which of the following is considered one of the biggest sources of malware (malicious software)?

The Internet

Chao creates a file YTDReport and places it a folder titled TownHall. Only the Managers group has full control permissions to the TownHall folder. Later, Chao moves this folder to the Presentations folder on the same NTFS volume. The Managers group does not have any explicit permissions to the content in the Presentations folder. Which of the following is true of this scenario?

The Managers group will have full control permissions to the TownHall folder.

Dorothy, a system administrator, uses BitLocker To Go to protect USB drives that are used in the organization. She chooses the Use a password to unlock the drive option when picking between unlocking options. Warren wants to print some files, so he copies these files from his work laptop onto a USB drive. Next, he plugs in this drive on a computer that is connected to a printer. If Warren is able to print the files on the USB drive successfully without entering any password, which of the following must be true of the computer connected to the printer?

The computer is marked as a trusted environment.

Anya, an amateur photographer, has uploaded the photos stored on one of the partitions on her hard drive to the cloud. She intends to wipe the partition and regain some storage space. She starts the DiskPart utility and runs the DELETE command. However, she soon realizes that she specified the incorrect partition number, 3 instead of 2. What of the following is the most likely outcome in this scenario?

The data on partition 3 will be deleted and may not be recoverable.

Oluseyi receives a link to a free download of a premium application in his email. He clicks the link and the application downloads. Before installing it, he wants to verify the authenticity of the download. He verifies the MD5 value of the downloaded application against the MD5 value listed for the application on the original website. The MD5 values do not match. Which of the following is true in this scenario?

The downloaded application has been modified from its original and authentic version.

Macy works as a system administrator at an accounting firm. Sensitive data is stored on all Windows 10 client systems. She wants to audit all access to files on these systems, so she decides to edit the Global Object Access Auditing category. In order to complete this task, which of the following conditions should be met?

The files and folders must be on NTFS-formatted volumes.

Vishal is considering switching to BitLocker Drive Encryption because of the inefficiencies of EFS. When he tries to use this encryption feature on Windows 10 Professional, he is unsuccessful. Which of the following is the most likely reason?

The hard drive does not contain a system volume.

TropicMaze is a manufacturer of processed foods. The packaging at the plant is automated by machines that are controlled by a Windows 10 computer. Which of the following indicates that this computer receives updates using Long Term Servicing Branch?

The operating system on the computer will receive Windows Updates for 10 years.

Brian, a photographer, recently lost his data that was stored on a hard disk after it crashed. To prevent this from happening again, he wants to implement a storage space volume combined with fault tolerance. He decides to implement a three-way mirror resiliency. Which of the following is true of this scenario?

The storage space volume will be able to handle multiple drive failures.

Daniel's friends gifted him a hard drive on his birthday. Daniel connected the hard drive to his laptop. He then used the Initialize-Disk cmdlet to initialize the disk without specifying a partition style. However, Daniel did not notice that the hard drive contained a video of his friends and family wishing him on his birthday. Which of the following is most likely to occur in this scenario?

The video on the disk will be deleted.

Until a new disk is initialized, what is its status reported as?

Unknown

Esmeralda creates a rule with the Deny permission for photo.exe in the Executable Rules collection for a group with all users. Which of the following is true in this scenario?

Users will not be able to run other applications that do not have an Allow rule.

Alex, a system administrator, wants to uninstall a Windows update that was recently installed on around 200 Windows 10 computers in the organization. Which of the following options is best suited to this scenario?

Using a batch script with wusa.exe

An application installed on a Windows 10 system requires access to restricted areas on the system to place user data. However, this application is not UAC compliant. To enable this application to run properly, which of the following UAC options should be enabled?

Virtualize file and registry write failures to per-user locations

Frida is running out of space on her local hard drive, so she purchases an external hard drive. However, she wants to preserve the structure of the folders on the old drive. She needs to integrate the new drive in a way that it she can store data on it while appearing to access it via folders on the old drive. Which of the following can Frida use in this scenario?

Volume mount points

Which NTFS feature allows you to link an empty folder in one volume to another volume?

Volume mount points

Which of the following is true of BitLocker Drive Encryption?

When you use BitLocker Drive Encryption, an entire volume is encrypted.

You are configuring sharing options for the Public folder on a Windows 10 computer. In Advanced sharing settings in the Network and Sharing Center, you enable the option Turn on sharing so that anyone with network access can read and write files in the Public folders. Which of the following is a valid observation if you choose the option Turn on password protected sharing?

You can restrict access to the shared Public folder to valid user accounts, but you cannot select which user accounts have access.

Nikita intends to use the folder sharing wizard to create a share named Proposals on her computer, Desktop20. She navigates to the location D:\Sales\. There, she right-clicks the Proposals folder and creates the share using the folder sharing wizard. She wants to share this folder with other users in the same workgroup. Which of the following will allow other users to access the share on Nikita's computer?

\\Desktop20\Proposals

Marques wants to create a new partition on a hard disk using the DiskPart utility. He is unsure about the correct command to be used in this scenario. He knows that it is either CREATE or FORMAT. Which of the following commands should Marques type into the DiskPart command prompt?

help CREATE

Which utility can be used by a user with administrative rights in order to stage a driver manually?

pnputil.exe

Nanxi wants to create a share on her computer. She decides to use the Create A Shared Folder Wizard to accomplish this task. Which of the following tools will launch this wizard?

shrpubw

Storage Spaces technology combines selected individual disks into a managed logical group called a _____.

storage pool

Which registry key contains the default registry settings that are copied for new user profiles?

.DEFAULT

Besides the .NET Framework 4.8, what other version of the .NET Framework does Windows 10 provide as a feature?

.NET 3.5

Which of the following allows backward compatibility in Windows 10?

.NET Framework 3.5

Which of the following can be used to access an app installed on a different computer locally?

A virtual desktop

Ming is configuring security zones for Microsoft Edge browsers in her organization. Which of the following websites is best served by being added to the Local intranet zone?

A website that needs to be automatically authenticated using local workstation sign-in credentials

You are the administrator at a software consulting firm. A Windows 10 user accesses an online learning website. However, some features of the website, such as pop-up windows, are blocked. You verify that the website is a legitimate website that does not have any malicious software. If the user is using Microsoft Edge, what should you do to resolve this issue?

Add the website to the Trusted sites zone.

Jin enabled Personal Vault on OneDrive and added some important documents to the vault. To prevent anyone else from gaining access to the files, she immediately disabled the vault after adding the files. Which of the following is the most likely outcome in this scenario?

All of the files in the vault are removed and cannot be recovered.

Martha is a system administrator trying to troubleshoot an issue on one of the computers in her organization. The support documentation has instructions to check HKEY_CURRENT_USER and modify registry keys in the hive. What issue do you think she is trying to solve?

An application issue specific to a particular user

Zen Corp. has developed a new word processor. Customers can download the app on a subscription basis. After a new customer purchases a subscription, the app is automatically streamed to the customer's computer and installed. Zen Corp. regularly updates the source app installed on its server, which in turn pushes the updates to the customer's computer. Which of the following has the company used to deploy its app?

App-V

Athena, a graphic designer, uses OneDrive to back up her work files across her home laptop and office laptop. One day, after completing her work in office, she backs up 5 GB of files to OneDrive. After she gets back home, she realizes that she forgot to send an email. The broadband network is down, so Athena tethers her laptop through her mobile to access the Internet. OneDrive begins downloading changes, and her data plan of 2 GB is exhausted quickly. She did not intend for OneDrive to download these files. What option should Athena have enabled to prevent this from happening?

Automatically pause sync when this device is on a metered network

Which of the following keys in the HKEY_LOCAL_MACHINE hive contains information from the boot configuration database?

BCD00000000

Which Windows 10 feature allows you to create virtual machines with a completely independent operating system that shares the hardware on the computer running Windows 10?

Client Hyper-V

Brian uses OneDrive to back up important files on his computer to the cloud. Recently, he made some changes to a document that need to be reverted. He wants to revert his entire OneDrive to its state as it was 15 days ago. Which of the following, if true, guarantees that Brian can complete this task successfully?

Brian has a paid version of Office 365.

A print server needs to be restarted to rectify an issue. However, you need to ensure that the print jobs running on printers connected to this server are not affected. Which of the following options should you use?

Bulk printer management

Employees in your organization have been given access to Microsoft 365 apps. Their computers run on the Windows 10 operating system. As a network administrator, you need to minimize network utilization when these apps are automatically updated by Microsoft. How will you do it?

By configuring the computers to receive updates from a shared folder

EduTech, a learning company, develops a UWP app that replicates its online learning platform. Before distributing the app on the Microsoft Store, the company wants all its employees to install the app on their computers and experience it. How can the company deploy the app without uploading it to the Microsoft Store?

By distributing the APPX file of the app

How can MSI-based apps requiring user input be deployed through Group Policy?

By repackaging the app with the necessary input information

Your organization is upgrading all existing computers to the 64-bit version of Windows 10. However, it needs to continue running a Windows XP app on some computers. As a systems administrator, you have been tasked with identifying a solution. How will you run the legacy app without dedicated resources?

By using Client Hyper-V

How can a user access a Windows 2000 application on a Windows 10 computer without installing the app in the user's computer?

By using a virtual desktop

The Local Security Policy is part of a larger Windows management system known as which of the following?

Group Policy

The process of taking data and rendering it unreadable is known as which of the following?

Encryption

Yixuan, a system administrator, configures Windows Update for Business in her organization to control updates for Windows 10 systems. The settings are configured such that a test system first receives any new Windows update and other Windows systems receive the update after two weeks. Being a small organization, Yixuan wants to reduce bandwidth consumption during the organization-wide update. Which of the following options should Yixuan use in this scenario?

Delivery optimization

Derwin uses OneDrive to back up files from his laptop to the cloud. Which of the following circumstances will require Derwin to use the OneDrive website instead of the OneDrive client?

Derwin wants to recover a file that was deleted from OneDrive.

Which of the following is a cloud-based solution to compatibility issues?

Desktop Analytics

Marshall, an IT administrator, wants to make changes to the disk configuration on a user's computer. He prefers using a tool that will give him a graphical view of the disks and volumes/partitions on the computer. Which of the following tools should Marshall use?

Disk Management console

Which NTFS feature allows an administrator to track how much data is used on the file system by a user and potentially apply storage limits?

Disk quotas

Which feature of NTFS encrypts the contents of files?

EFS

In which of the following folders are memory versions of hives stored when a computer shuts down?

Config

Oshane is configuring security settings on his computer. Recently, his friend's computer was attacked by malware that encrypted data on all the hard disks and demanded a cryptocurrency ransom to decrypt this data. Which of the following options in Windows 10 is the best option to help Oshane avoid a similar situation?

Controlled folder access

Veronica copies an unencrypted file from one partition on her hard drive to an encrypted folder on another partition. From there, she moves the file to a folder on a flash drive. If the file on the flash drive is encrypted, which of the following must be true?

Copying the file to the encrypted folder encrypted the file.

Percy is configuring Advanced Audit Policy settings for Windows 10 clients in his organization. Which of the following event categories is Percy least likely to configure for these systems?

DS Access

To see the permissions a user has to a file that takes into account their group memberships, which tab should you display in the Advanced Security Settings dialog box?

Effective Access

Nafisa, a scientific research associate, works on sensitive data on her laptop. To protect the data, sensitive information on her laptop is encrypted. She is unable to use Windows search to look for information in these files. ​ Which of the following Advanced Options in Indexing Options contains a resolution to this issue?

File Settings

A more manageable way to deploy MSI-based applications in smaller environments would be to use which of the following?

Group Policy

Which registry hive contains details about the current hardware profile in use?

HKEY_CURRENT_CONFIG

Identify the hive registry that contains the global settings of an entire computer.

HKEY_LOCAL_MACHINE

Which registry hive contains global settings for the entire computer and the applications installed on it?

HKEY_LOCAL_MACHINE

Which of the following is not a primary hive found in the Window 10 registry?

HKEY_REMOTE_ADMIN

Josh is a blogger who reviews legacy technologies. He has to review two DOS apps. He has a computer that runs on the 32-bit version of Windows 10 and a laptop that runs on the 64-bit version. Which system should he use for his review, and why?

He should use the 32-bit one because it supports Ntvdm.exe.

Which of the following terms is used to refer to the individual sections of the registry?

Hive

The registry is divided into sections and levels of data. Multiple sections exist to organize data by purpose. What are these individual sections called?

Hives

Windows 10 includes a search functionality that can be used to find files and folders. Which of the following is used to increase the efficiency of searching in Windows 10?

Indexing

Which Windows 10 security zone includes all Internet websites that are not specifically assigned to another zone?

Internet

Which of the following is not true of the HKEY_CURRENT_USER hive in the Windows 10 registry?

It contains user-specific settings for the current user and system services.

Which of the following is not a downside of using Client Hyper-V?

It does not allow you to create virtual machines with a completely independent operating system that shares the hardware on the computer running Windows 10.

Which of the following is true of PDF?

It is most often thought of as a document format, but it is also supported by some printers as a page description language, which allows the documents to be sent directly to a printer without any processing.

Marshall, a photographer, uses his Windows 10 laptop to process images shot on his DSLR camera. A few days after the installation of a new image manipulation software, he notices that the search function on his laptop has slowed. On troubleshooting this issue, he finds that the both the content and properties of output files from the application are being indexed. If Marshall is able to resolve this issue, which of the options did he most likely use?

Marshall modified the settings to index only metadata.

Ariella configures a shared printer on the local network. Ryan logs on to his user account on a Windows 7 computer and installs the shared printer before printing a document. After a few hours, Maya logs on to the same computer using her account and tries to print a document.Which of the following is true of this scenario?

Maya needs to install the printer in order to be able to use it to print her document.

Characteristics of a file such as file name, creation date, and modified date, are known as which of the following?

Metadata

Which of the following is a newer browser included with Windows 10?

Microsoft Edge

Which of the following can be used to deploy UWP apps?

Microsoft Store

Moses, an amateur photographer, drops some photos into a folder on OneDrive and sends the link to this folder to his friend Ezra. Ezra inadvertently sends this link to a group of people. One of her friends from that group takes these images, posts them on social media, and takes the credit for these�photos. Moses comes across these posts and is taken aback to see his photos online under a stranger's account. He assumed that only Ezra had access to these photos. What should Moses have done to decrease the risk of his photos being stolen?

Moses should have shared this with Ezra by specifying Ezra's email address associated with a Microsoft account.

Which of the following, by default, supports DOS applications on a Windows 10 operating system?

Ntvdm.exe

Haley signs into a new Windows 10 laptop with her Microsoft account. The OneDrive client uses her Microsoft credentials to log on to OneDrive. She notices the OneDrive node in File Explorer and sees the Documents folder. Which other folder should be visible to Haley by default?

Pictures

Daniel uses OneDrive to back up the data from his laptop on the cloud. He considers this to be a safe measure to create backups of important data. He is considering using OneDrive to back up data from his phone whenever he connects his phone to the laptop. What data from his phone can OneDrive back up automatically when he connects it to the laptop?

Pictures and videos

Wemimo has a printer connected to her Windows 10 laptop. When she prints a document, the printed document does not have the same layout as the original file and there are formatting errors. She realizes that it must be an issue with the page description language. Which of the following page description languages would most likely resolve this printing issue?

PostScript

Which printer management tool would you typically use to manage printer servers rather than individual computers?

Print Management snap-in

Which of the following is a new interface for managing printers in Windows 10?

Printers & scanners

Yunha uses Microsoft Edge on her work laptop, home laptop, and smartphone. She wants her saved passwords and favorites that are on her home laptop to be available on her smartphone and work laptop. Which of the following features in Microsoft Edge should Yunha use in this scenario?

Profile synchronization

Besides accessing and recovering previous versions of a file, which of the following is a function that can be performed only on the OneDrive website and not by the OneDrive client?

Recovering deleted files

Which of the following registry editing tools has the built-in functionality to export a portion of a registry to a .reg file using commands?

Reg.exe

Laila is editing an image on her laptop using an image processing application. The application freezes frequently. When she contacts customer support, she is request for a screenshot of the frozen application to create a support ticket. Which of the following shortcuts can Laila use to take a screenshot of only the frozen application?

Shift+Print Screen

Which of the following is an application framework that an application can distribute?

The .NET Framework

Which of the following can you use to run a Win16 application?

The 32-bit version of Windows 10

TEXMII Consultants, a tax consulting firm, uses legacy web-based applications. To allow these applications to run on Microsoft Edge, Ablorde adds these websites to IE Mode. Some of the users report that all the legacy applications are still being launched in Microsoft Edge on their computers. Which of the following is the most likely reason for this issue?

The Internet Explorer 11 optional feature has been uninstalled from the computers.

Trisha is using OneDrive on her Windows 10 laptop at work. She wants to enable Personal Vault but cannot find the option using the OneDrive client. Which of the following is the most likely reason for this?

The laptop is running a business plan of Microsoft 365.

Merwyn's laptop has Windows 10 installed on the C drive. He creates a new folder, Work, on the D drive and adds this folder to the Documents library. He then navigates to the Work folder in the Documents library and creates a new Word file. Which of the following is true of this scenario?

The Word file is created in the Work folder on the D drive.

Michaela has her work-related documents backed up on the cloud using OneDrive so that she can access these documents from home. When she gets back home from her office, she logs on to her Office account on the OneDrive website from her personal laptop. Next, she selects a Word document and opens it. What will happen next?

The document will open in the online Word application in read-only mode.

Yemi creates a Word document in a OneDrive folder on her laptop and begins working on the document. Once Yemi completes her work, she closes the document. She notices that the file status icon is two arrows in a circle. What does this indicate?

The file is synchronizing.

In Windows 10, which of the following is updated each time a file is changed to ensure that search results are current?

The index

Frida uses OneDrive storage to back up data from her phone and laptop. Over time, the hard disk on her laptop has accumulated a lot of files. She wants to free up some space on her disk. She notices that one of the OneDrive folders, Media, is close to 200 GB. She right-clicks the folder and selects Free up space. What will happen to the Media folder?

The local copy of the Media folder will be removed, but it will be retained in OneDrive.

When applications or Windows 10 starts and are running, they read their configuration information from which of the following?

The registry

Hannah, a system administrator, wants to use Windows Update for Business in her organization to control updates for Windows 10 systems. While she is able to use Group Policy to apply these settings to most computers, she is unable to apply these settings to some computers. Which of the following is the most likely reason that Hannah is not able to apply the Windows Update for Business settings to these computers?

These computers are running the Windows 10 Home edition.

Wemimo creates a new folder named NewFolder in D:\Labs\Test. In the Permissions tab in advanced security settings, he disables inheritance for this folder. Which of the following is true of the permission inheritance in this scenario?

This blocks inheritance of permissions for NewFolder from higher levels in D:\Labs\Test.

Nicole, a system administrator, is configuring basic NTFS permissions on folders on a common computer used for miscellaneous tasks such as printing or browsing social networking sites. What is the scope that is automatically configured scope in this scenario?

This folder, subfolders, and files

Which of the following is not true of App-V?

Updates are installed directly on the client computers.

You work as a network consultant in a software company. The company has developed a new UWP app that needs to be tested on multiple Windows 10 computers. The lead developer does not want to upload the software to the Microsoft Store or enable sideloading on computers. What suggestion would you give him to test the new software?

Upload the software to Microsoft Store for Business

All the application environments in Windows 10 restrict apps to running in which of the following modes?

User mode

Running apps in which mode ensures that a poorly written app does not affect system stability?

User mode

Which of the following is not a precaution you should take before modifying the registry?

When possible, use a user's computer rather than a test system to verify that changes resolve the issue.

Which of the following allows only apps from the Microsoft Store to be installed and run?

Windows 10 in S mode

Zachary wants to print a few documents, so he connects a printer to his Windows 10 laptop using the USB port. When he prints these documents, the pages have random characters printed on them instead of the actual files that he wanted to print. Which of the following is the most likely reason for this?

Windows 10 is using a compatible driver for the printer.

What do applications use to request services and functionality from Windows 10?

Windows API

Instead of creating batch files and using reg.exe, which of the following is an administrator more likely to use to create new scripts?

Windows PowerShell

Nanxi is using an application that allows her to text her phone contacts from her laptop. She wants to display an emoji in one of her text messages. The physical keyboard does not have any emoji options. Which of the following shortcuts can Nanxi use to display the emoji keyboard?

Win+.

Nikita is using a Windows 10 system. She wants to change the background picture on her desktop, so she decides to open the Settings window. Which of the following shortcuts can she use to access the Settings windows?

Win+I

You can modify the locations included in a library, but by which of the following must the location be indexed?

Windows Search

Which of the following terms is used to describe a virtualized environment that hosts Win32 apps on the 64-bit version of Windows 10?

Windows on Windows 64 (WOW64)

If you need to read or write registry entries from batch files, which of the following can you use?

reg.exe


संबंधित स्टडी सेट्स

Real Estate Investing Final exam

View Set

chapter 10 - making it stick: doing what's right in a competitive market

View Set

From the Origins of Agriculture to the First River-Valley Civilizations

View Set

PREPU: Chapter 13: Nonopioid Analgesics: Salicylates and Nonsalicylates

View Set

Personal Financial Planning Exam 1

View Set