CPS q
Which Windows 10 security zone includes all Internet websites that are not specifically assigned to another zone?
Internet
Which of the following allows you to begin using an application faster after printing by storing the print job as a file and sending the print job to the printer as a background process?
Spooling
Nanxi is using an application that allows her to text her phone contacts from her laptop. She wants to display an emoji in one of her text messages. The physical keyboard does not have any emoji options.Which of the following shortcuts can Nanxi use to display the emoji keyboard?
Win+.
What is the default value for the Maximum password age setting in the Password Policy?
42 days
Ahva purchases a new hard disk to expand the storage on her PC.In which of the following scenarios should Ahva skip initializing the disk?
Ahva intends to add the hard disk to a storage pool
How can MSI-based apps requiring user input be deployed through Group Policy?
By repackaging the app with the necessary input information
Which Windows 10 feature allows you to create virtual machines with a completely independent operating system that shares the hardware on the computer running Windows 10?
Client Hyper-V
Which of the following is included in the Windows 10 ADK?
Compatibility Administrator
In which of the following folders are memory versions of hives stored when a computer shuts down?
Config
Oshane is configuring security settings on his computer. Recently, his friend's computer was attacked by malware that encrypted data on all the hard disks and demanded a cryptocurrency ransom to decrypt this data.Which of the following options in Windows 10 is the best option to help Oshane avoid a similar situation?
Controlled folder access
Veronica copies an unencrypted file from one partition on her hard drive to an encrypted folder on another partition. From there, she moves the file to a folder on a flash drive.If the file on the flash drive is encrypted, which of the following must be true?
Copying the file to the encrypted folder encrypted the file
Which registry key contains the default registry settings that are copied for new user profiles?
DEFAULT
Which processor feature monitors processes to ensure that they do not access unauthorized memory spaces, which is done by various types of malware, to take control of systems?
DEP (Data Execution Prevention)
Yixuan, a system administrator, configures Windows Update for Business in her organization to control updates for Windows 10 systems. The settings are configured such that a test system first receives any new Windows update and other Windows systems receive the update after two weeks. Being a small organization, Yixuan wants to reduce bandwidth consumption during the organization-wide update.Which of the following options should Yixuan use in this scenario?
Delivery optimization
Derwin uses OneDrive to back up files from his laptop to the cloud.Which of the following circumstances will require Derwin to use the OneDrive website instead of the OneDrive client?
Derwin wants to recover a file that was deleted from OneDrive
Which of the following is a cloud-based solution to compatibility issues?
Desktop Analytics
Which area of the Resource Monitor is used to monitor disk performance and determine whether the disk subsystem is a bottleneck?
Disk
Marshall, an IT administrator, wants to make changes to the disk configuration on a user's computer. He prefers using a tool that will give him a graphical view of the disks and volumes/partitions on the computer.Which of the following tools should Marshall use?
Disk Management console
Which NTFS feature allows an administrator to track how much data is used on the file system by a user and potentially apply storage limits?
Disk quotas
Which feature of NTFS encrypts the contents of files?
EFS
The process of taking data and rendering it unreadable is known as which of the following?
Encryption
Which utility is used to browse events stored in system event logs?
Event Viewer
Data Collector Sets organize multiple counters into a single unit. Which type of data can a Data Collector Set monitor to track when system events occur?
Event trace
Frida, a travel blogger, configures File History on her Windows 10 laptop because she often works while traveling. She often works from remote locations without access to charging points for her laptop. She wants to know the frequency with which her laptop can back up files with the default settings.How often are files being backed up on Frida's laptop?
Every hour
Kesha spends time analyzing datasets that are larger than 1 TB in job as a data scientist. This data is stored in databases on her Windows 10 system. While running an analysis on these databases, she does not want her code to be slowed down because of real-time scanning by Windows Defender.Which of the following settings should Kesha modify to solve this problem?
Exclusions
Maya, a graphic designer, has many files stored on her laptop and the hard drive is running out of space. She decides to move some of these files to another storage device. She plugs in an SSD into the USB port, transfers some of the older files to it, and unplugs the SSD.Which of the following disk technologies does the SSD exemplify?
External disk
In File Explorer, which ribbon tab provides options to open a new File Explorer window, command prompt, or Windows PowerShell prompt that is focused on the current folder?
File
Zachary wants to use File History to create regular backups of the data on his laptop. He is using File History for the first time and is unaware of this feature, so he approaches his friend, Leah, who has experience using this feature.Assuming that Leah has good knowledge of File History, which of the following is Leah most likely to tell Zachary?
File History is disabled by default
Nafisa, a scientific research associate, works on sensitive data on her laptop. To protect the data, sensitive information on her laptop is encrypted. She is unable to use Windows search to look for information in these files.Which of the following Advanced Options in Indexing Options contains a resolution to this issue?
File Settings
Malaika is troubleshooting an issue on a Windows 10 computer using Event Viewer. In the application log, she can find several entries for several events. She wants to limit this and only see errors.Which of the following filter options should Malaika use?
Filter by Event level
A more manageable way to deploy MSI-based applications in smaller environments would be to use which of the following?
Group Policy
The Local Security Policy is part of a larger Windows management system known as which of the following?
Group Policy
Which registry hive contains details about the current hardware profile in use?
HKEY_CURRENT_CONFIG
Which of the following is not a primary hive found in the Window 10 registry?
HKEY_REMOTE_ADMIN
Windows 10 includes a search functionality that can be used to find files and folders. Which of the following is used to increase the efficiency of searching in Windows 10?
Indexing
Which of the following is not true of the HKEY_CURRENT_USER hive in the Windows 10 registry?
It contains user-specific settings for the current user and system services
Account Policies settings are located in which of the following?
Local Security Policy
Which of the following do newer Windows applications use to describe the structure of an application?
Manifest
Marshall, a photographer, uses his Windows 10 laptop to process images shot on his DSLR camera. A few days after the installation of a new image manipulation software, he notices that the search function on his laptop has slowed. On troubleshooting this issue, he finds that the both the content and properties of output files from the application are being indexed.If Marshall is able to resolve this issue, which of the options did he most likely use?
Marshall modified the settings to index only metadata
Which type of permissions is considered the most basic level of data security in Windows 10?
NTFS
What is used by Windows 10 to define the layout of content for a print job?
Page description language
Which utility allows you to visually display the data generated by counters and allows you to select the individual counters you want to review?
Performance Monitor
Haley signs into a new Windows 10 laptop with her Microsoft account. The OneDrive client uses her Microsoft credentials to log on to OneDrive. She notices the OneDrive node in File Explorer and sees the Documents folder.Which other folder should be visible to Haley by default?
Pictures
Wemimo has a printer connected to her Windows 10 laptop. When she prints a document, the printed document does not have the same layout as the original file and there are formatting errors. She realizes that it must be an issue with the page description language.Which of the following page description languages would most likely resolve this printing issue?
PostScript
Which page description language is the oldest and best supported?
PostScript
If File History or Backup and Restore (Windows 7), or both, had been configured to protect data, that data can be recovered using which feature?
Previous Versions
Besides accessing and recovering previous versions of a file, which of the following is a function that can be performed only on the OneDrive website and not by the OneDrive client?
Recovering deleted files
Which of the following registry editing tools has the built-in functionality to export a portion of a registry to a .reg file using commands?
Regexe
Selecting a counter displays information about that counter's collected data as a chart type. Which chart type displays the current value of each performance counter in decimal format?
Report
Which of the following are used to process log file data and display it in a meaningful way?
Reports
Which term best describes a snapshot of system files and settings created at a specific point in time?
Restore point
Which of the following keys in the HKEY_LOCAL_MACHINE contains information regarding application data?
SOFTWARE
Which of the following keys in the HKEY_LOCAL_MACHINE contains information regarding device drivers?
SYSTEM
Ayesha is using the Windows 10 Home edition on her laptop. She navigates to a folder containing music files. She wants to burn these files to a CD. Which of the following tabs on the ribbon should Ayesha use to complete this task?
Share
Which of the following technologies combines selected physical disks into a managed logical group called a storage pool?
Storage Spaces
Which part of the motherboard in your computer is used to store encryption keys and certificates?
TPM
Which of the following is an application framework that an application can distribute?
The NET Framework
When applications or Windows 10 starts and are running, they read their configuration information from which of the following?
The registry
All the application environments in Windows 10 restrict apps to running in which of the following modes?
User mode
Running apps in which mode ensures that a poorly written app does not affect system stability?
User mode
Which utility can be used by a user with administrative rights in order to stage a driver manually?
pnputilexe
Storage Spaces technology combines selected individual disks into a managed logical group called a _____.
storage pool
Marques wants to create a new partition on a hard disk using the DiskPart utility. He is unsure about the correct command to be used in this scenario. He knows that it is either CREATE or FORMAT.Which of the following commands should Marques type into the DiskPart command prompt?
help CREATE
Which of the following can you use to run a Win16 application?
The 32-bit version of Windows 10
Each Microsoft account is allocated how much storage that can be used for file storage on OneDrive?
5 GB
What will the Disk Management console report as the status of a disk when it recognizes that the disk does not belong to that computer?
A Foreign Disk
Which of the following best describes a set of performance indicators captured when system performance is acceptable, effectively defining normal performance?
A baseline
When a new hard disk is added to a computer, it is initially configured as which type of disk?
A basic disk
When a limitation in a single computer system component slows down the entire system, which of the following occurs?
A bottleneck
What type of bottleneck occurs when Windows 10 and running applications want to read and write information to the physical disk in the system faster than the disk can manage?
A disk bottleneck
Jimmy downloaded a game from the Internet and installed it on his Windows 10 system. A couple of days after the installation, his computer's performance degraded drastically. Assuming that the game had slowed it down, he uninstalled the game and used software to get rid of residual files. Despite this, his computer's performance did not improve. Inspecting the Resource Monitor revealed that the Memory and CPU were running close to 100% capacity. He suspects that the computer is infected with malware.Which of the following scans would you recommend to Jimmy?
A full scan
Running fewer applications at once is a way to resolve which type of bottleneck?
A memory bottleneck
What type of bottleneck occurs when the applications you are running require more memory than is physically available on the computer?
A memory bottleneck
Most of a basic disk's partition attributes are stored in a data table that is part of the MBR or GPT specification. What is this table commonly called?
A partition table
Which of the following is bootable media that you can use to repair or reinstall Windows 10?
A recovery drive
Which policy allows you to configure an account to be temporarily disabled after a number of incorrect sign-in attempts?
Account Lockout
Which of the following can be used to access an app installed on a different computer locally?
A virtual desktop
Which of the following best describes a file format that can be used by the operating system to emulate the function of a hard drive, with all the data and structural elements of a drive?
A virtual hard disk
Ming is configuring security zones for Microsoft Edge browsers in her organization.Which of the following websites is best served by being added to the Local intranet zone?
A website that needs to be automatically authenticated using local workstation sign-in credentials
You are the administrator at a software consulting firm. A Windows 10 user accesses an online learning website. However, some features of the website, such as pop-up windows, are blocked. You verify that the website is a legitimate website that does not have any malicious software.If the user is using Microsoft Edge, what should you do to resolve this issue?
Add the website to the Trusted sites zone
Instead of logging performance counters to disk, you can configure which of the following to occur?
Alerts
Jin enabled Personal Vault on OneDrive and added some important documents to the vault. To prevent anyone else from gaining access to the files, she immediately disabled the vault after adding the files.Which of the following is the most likely outcome in this scenario?
All of the files in the vault are removed and cannot be recovered
Martha is a system administrator trying to troubleshoot an issue on one of the computers in her organization. The support documentation has instructions to check HKEY_CURRENT_USER and modify registry keys in the hive.What issue do you think she is trying to solve?
An application issue specific to a particular user
Zen Corp. has developed a new word processor. Customers can download the app on a subscription basis. After a new customer purchases a subscription, the app is automatically streamed to the customer's computer and installed. Zen Corp. regularly updates the source app installed on its server, which in turn pushes the updates to the customer's computer.Which of the following has the company used to deploy its app?
App-V
Which of the following can be used to define which programs are allowed or disallowed in the system?
AppLocker
Applications that are not designed for Windows 10 and that require administrative privileges do not properly request elevated privileges, generating an error. Which of the following can you use to eliminate this error?
Application Compatibility Toolkit
Howard's Windows 10 laptop is a few years old. Over time, his laptop has slowed down, causing performance issues, so he decides to use the Reset the PC recovery method to gain some performance improvement.If Howard chooses the Keep my files option, which of the following items is unlikely to be retained after the reset?
Application files in AppData
Ahva, a graphic designer, uses a Windows 10 PC. Her PC recently crashed, so she wants to use the Reset this PC option to recover her PC.Which of the following items will Ahva be unable to restore with the Reset this PC option?
Apps that she installed on the PC after purchasing it
What type of encryption algorithm uses two related, but unique, keys to encrypt and decrypt data?
Asymmetric
Which security process records the occurrence of specific operating system events in the Security log?
Auditing
Athena, a graphic designer, uses OneDrive to back up her work files across her home laptop and office laptop. One day, after completing her work in office, she backs up 5 GB of files to OneDrive. After she gets back home, she realizes that she forgot to send an email. The broadband network is down, so Athena tethers her laptop through her mobile to access the Internet. OneDrive begins downloading changes, and her data plan of 2 GB is exhausted quickly. She did not intend for OneDrive to download these files.What option should Athena have enabled to prevent this from happening?
Automatically pause sync when this device is on a metered network
Which of the following keys in the HKEY_LOCAL_MACHINE hive contains information from the boot configuration database?
BCD00000000
Trisha is configuring File History for the first time on her computer. She attaches an external hard drive and configures it as the drive for File History.Which of the following is most likely to occur in this scenario?
Backup data will be added to the free space on the hard drive
Which of the following is not true of the NTFS file system?
Bad clusters that fail to store data are not tracked
Which of the following statements is not true of basic disks?
Basic disks are an older technology that were introduced as an alternative to dynamic disks
Tobias, a system administrator at a pharmaceutical company, uses BitLocker Drive Encryption to encrypt all Windows 10 computers in the organization. Because the computers contain sensitive information, users must enter a PIN to start the system. While this is a useful security feature when the computers are disconnected from the organization's network, this becomes a hindrance in performing remote maintenance because Tobias cannot start these computers without entering the PIN.Which of the following tools can Tobias use to overcome this issue?
BitLocker Network Unlock
Which of the following is a method for protecting data on removable storage, such as USB drives?
BitLocker To Go
Which Windows 10 feature allows you to centralize the administration of printers for remote locations but still keep WAN link utilization low because the print jobs stay local?
Branch Office Direct Printing
Brian uses OneDrive to back up important files on his computer to the cloud. Recently, he made some changes to a document that need to be reverted. He wants to revert his entire OneDrive to its state as it was 15 days ago.Which of the following, if true, guarantees that Brian can complete this task successfully?
Brian has a paid version of Office 365
A print server needs to be restarted to rectify an issue. However, you need to ensure that the print jobs running on printers connected to this server are not affected.Which of the following options should you use?
Bulk printer management
Employees in your organization have been given access to Microsoft 365 apps. Their computers run on the Windows 10 operating system. As a network administrator, you need to minimize network utilization when these apps are automatically updated by Microsoft.How will you do it?
By configuring the computers to receive updates from a shared folder
EduTech, a learning company, develops a UWP app that replicates its online learning platform. Before distributing the app on the Microsoft Store, the company wants all its employees to install the app on their computers and experience it.How can the company deploy the app without uploading it to the Microsoft Store?
By distributing the APPX file of the app
Yemi wants to transfer some files from her PC to an external storage device. She connects a USB drive to her PC, but the device is not recognized. She verifies that the appropriate driver is loaded by Windows 10.How can Yemi resolve the issue?
By restarting the PC
Your organization is upgrading all existing computers to the 64-bit version of Windows 10. However, it needs to continue running a Windows XP app on some computers. As a systems administrator, you have been tasked with identifying a solution.How will you run the legacy app without dedicated resources?
By using Client Hyper-V
How can a user access a Windows 2000 application on a Windows 10 computer without installing the app in the user's computer?
By using a virtual desktop
Iba is modifying the basic NTFS permissions for a folder. She wants to enable the permission that is the equivalent of enabling Write and Read & execute permissions combined.Which of the following options is the best choice?
Modify
Diego has the Windows 10 Home edition installed on his personal laptop. As an avid gamer, he prefers having his computer update with the latest feature updates from Microsoft. He usually plays games at specific times, and he wants to prevent his computer from restarting to install an update during these time slots.Which of the following Windows Update settings should Diego modify?
Change active hours
Ruzwana creates a folder K:\Test. She edits the permissions of the folder to explicitly deny modify permissions to the folder.Which of the following actions will Ruzwana be able to perform on the folder as its owner?
Change permissions
Temi decides to use PowerShell commands to automate the configuration of System Restore. She wants to create a new restore point.Which of the following cmdlets should she use in this scenario?
Checkpoint-Computer
Percy is configuring Advanced Audit Policy settings for Windows 10 clients in his organization.Which of the following event categories is Percy least likely to configure for these systems?
DS Access
To see the permissions a user has to a file that takes into account their group memberships, which tab should you display in the Advanced Security Settings dialog box?
Effective Access
Ayaka is assigned Read share permissions to a folder and Full control NTFS permissions. She signs in to the computer holding this folder and tries accessing the folder by navigating via File Explorer.What is the effective permission to the folder in this scenario?
Full control
Identify the hive registry that contains the global settings of an entire computer.
HKEY_LOCAL_MACHINE
Which registry hive contains global settings for the entire computer and the applications installed on it?
HKEY_LOCAL_MACHINE
What type of encryption algorithm is one-way encryption, which means that it encrypts data, but the data cannot be decrypted?
Hashing
Rizwan, a data analyst, is generating a report by pulling data from multiple databases and analyzing it. The data processing application is resource-intensive, so Rizwan wants to ensure that other applications do not consume resources that this application needs.How can Rizwan boost the performance of the data processing application?
He can raise the priority of the application using the Details tab in Task Manager
Saeju is using video editing software to edit large video files to create a short movie. The application keeps freezing on his Windows 10 computer. Upon investigating the issues, he finds that the paging file is huge, and reading it from the SSD takes a lot of time.What should Saeju do to resolve this issue?
He should increase the amount of physical memory
Jordan installs Windows 10 on a laptop with low-end specifications. The laptop does not have a dedicated graphics card as well. In order to improve the performance of Windows 10, he wants to adjust the appearance of Windows by reducing most OS animations.Which of the following options in the Performance Options dialog box should Jordan use to achieve this?
He should select the Adjust for best performance option on the Visual Effects tab
Josh is a blogger who reviews legacy technologies. He has to review two DOS apps. He has a computer that runs on the 32-bit version of Windows 10 and a laptop that runs on the 64-bit version.Which system should he use for his review, and why?
He should use the 32-bit one because it supports Ntvdmexe
Guocheng, a system administrator, is testing the network at his organization to identify performance issues. He is using Resource Monitor on a Windows 10 system to identify whether the network subsystem is a bottleneck.Which of the following would indicate that the network connection between the local address and a remote address is oversaturated?
High packet losses
Which of the following terms is used to refer to the individual sections of the registry?
Hive
The registry is divided into sections and levels of data. Multiple sections exist to organize data by purpose. What are these individual sections called?
Hives
Which File Explorer ribbon tab has buttons for manipulating files and folders?
Home
Which of the following is not part of the performance tuning process?
Identifying and verifying users
You must right-click the disk name in Disk Management and select which of the following from the menu to initiate the import process?
Import Foreign Disk
Sharon recently lost an encryption certificate that rendered some of her EFS-encrypted files unrecoverable. To prevent a similar situation from arising in the future, she wants to create a recovery certificate for recently encrypted files. She creates the recovery certificate.What should Sharon do next?
Import the recovery certificate into the local security policy as a data recovery agent
Ariella is viewing the permission settings for a folder, D:\Labs\TestFolder, in the Advanced Security Settings window. She wants to identify where the permission setting was first applied to this particular folder.Which of the following columns will give her this information?
Inherited from
Which of the following is not a downside of using Client Hyper-V?
It does not allow you to create virtual machines with a completely independent operating system that shares the hardware on the computer running Windows 10
Which of the following is not true of GPT?
It is bootable from BIOS or UEFI firmware
Which of the following is not true of DiskPart?
It is considered a low-level tool that is routinely used for day-to-day administration
Which of the following is true of PDF?
It is most often thought of as a document format, but it is also supported by some printers as a page description language, which allows the documents to be sent directly to a printer without any processing
After returning from a vacation, Yunha transferred some photos from her smartphone to a folder on her laptop. She uses the Share tab in File Explorer to share this folder with her friend Kseniia.Which of the following is true of this scenario?
Kseniia will receive a copy of the folder's contents rather than the original folder itself
Mahima is configuring advanced audit policies for Windows 10 clients. She decides to configure the Privilege Use category.Which of the following justifies Mahima's decision to configure the settings under this category?
Mahima wants to track instances where users change the time zone on their systems
Marsha and Moira belong to the Sales group that has full control permissions to the K:\Sales folder. Within this folder, Marsha is assigned read permission to a file named SalesPipeline. Moira is assigned read and execute permissions to the same file. Marsha also belongs to the Marketing group that has read permissions denied to the K:\Sales folder, while Moira also belongs to the Legal group that has write permissions denied to the K:\Sales folder.Which of the following is true of the effective permissions in this scenario?
Marsha cannot open the Sales folder
Ariella configures a shared printer on the local network. Ryan logs on to his user account on a Windows 7 computer and installs the shared printer before printing a document. After a few hours, Maya logs on to the same computer using her account and tries to print a document.Which of the following is true of this scenario?
Maya needs to install the printer in order to be able to use it to print her document
Mei's opens File Explorer on her Windows 10 laptop. She opens the simple sharing options for a folder. She selects another local user, Melissa, and changes the permission level to Read/Write.Which of the following is highest level of permission given to Melissa?
Melissa will have the Full Control NTFS permission
Characteristics of a file such as file name, creation date, and modified date, are known as which of the following?
Metadata
Which of the following is a newer browser included with Windows 10?
Microsoft Edge
Which of the following can be used to deploy UWP apps?
Microsoft Store
Moses, an amateur photographer, drops some photos into a folder on OneDrive and sends the link to this folder to his friend Ezra. Ezra inadvertently sends this link to a group of people. One of her friends from that group takes these images, posts them on social media, and takes the credit for these�photos. Moses comes across these posts and is taken aback to see his photos online under a stranger's account. He assumed that only Ezra had access to these photos.What should Moses have done to decrease the risk of his photos being stolen?
Moses should have shared this with Ezra by specifying Ezra's email address associated with a Microsoft account
Besides the .NET Framework 4.8, what other version of the .NET Framework does Windows 10 provide as a feature?
NET 35
Which of the following allows backward compatibility in Windows 10?
NET Framework 35
Chieh is changing the default configuration in Event Log to manage the logs that are created. She is altering the Log behavior when maximum log size is reached option. She chooses Do not overwrite events. Which of the following is true of this scenario?
New events will not be recorded when the log is full
Which of the following, by default, supports DOS applications on a Windows 10 operating system?
Ntvdmexe
Shawn signs into a Windows 10 system with administrative user privileges. The system has UAC enabled. Shawn accidently launches a malicious application that is infected with malware.If the malware is able to access and corrupt the system files, which of the following must be true?
On a prompt to continue or cancel running the program, Shawn selected to continue
Daniel uses OneDrive to back up the data from his laptop on the cloud. He considers this to be a safe measure to create backups of important data. He is considering using OneDrive to back up data from his phone whenever he connects his phone to the laptop.What data from his phone can OneDrive back up automatically when he connects it to the laptop?
Pictures and videos
What is the name of the cloud-based storage that is automatically included for free when a Microsoft account in created?
OneDrive
Orson is trying to open an encrypted file on his Windows 10 system. The file was encrypted using EFS, and he opened this as recently as last week.Which of the following is most likely the reason that Orson is unable to open the file?
Orson reset the password of his Windows user account
Which of the following storage space types can only be created with three or more physical disks?
Parity
Parth is using Steps Recorder to capture the steps that are causing an application to malfunction. After capturing the necessary steps, he can send the report to the IT team so that they can troubleshoot the issue. He is not sure if Steps Recorder will capture all of his actions that are causing the application to fail.Which of Parth's interactions with the application is unlikely to be captured by Steps Recorder?
Parth typing text in the application
Which policy controls password characteristics for local user accounts?
Password
Which rule condition identifies software by file location?
Path
Which printer management tool would you typically use to manage printer servers rather than individual computers?
Print Management snap-in
Which of the following is a new interface for managing printers in Windows 10?
Printers scanners
Which advanced audit policy setting tracks when tasks are performed that require a user-rights assignment, such as changing the system time?
Privilege Use
Yunha uses Microsoft Edge on her work laptop, home laptop, and smartphone. She wants her saved passwords and favorites that are on her home laptop to be available on her smartphone and work laptop.Which of the following features in Microsoft Edge should Yunha use in this scenario?
Profile synchronization
Ablorde is a tax advisor at TEXMII Consultants, a small business that hands tax filing for freelancers. Ablorde wants to share a folder on her computer with Rajesh. He has a Windows 10 computer that is connected to the same workgroup as Ablorde's computer.Which of the following is a requirement for successful sharing of files in this scenario?
Rajesh must have a user account on Ablorde's computer
Raphael, a system administrator, is setting up the password policy for local user accounts. He allows users to reuse a password after they have used 4 different passwords. He also modifies the policy to force users to change their old passwords every 60 days. After some time, he notices that users are modifying their passwords 4 times in a short time span and continuing to use their old passwords. This defeats the purpose of setting up the password restrictions.Which of the following settings should Raphael modify to control this behavior?
Raphael should set the Minimum password age setting to at least 1 day
Which file system is designed to verify and autocorrect data faults on a volume without having to bring the volume down for maintenance?
ReFS
Jordan is assigned Full Control share permissions to a folder and Read NTFS permissions. He accesses the share by using the UNC path from his computer over the network.What is Jordan's effective permission level to the share in this scenario?
Read
Chieh is assigned the Read permission to a shared folder as user. She is also part of the Marketing group that has List Folder permissions to the shared folder.What is Chieh's effective permission to this folder?
Read Execute
Hang owns a Windows 10 laptop that does not have any issues. She is configuring Windows Update settings on this laptop.Which of the following settings should Hang leave turned on?
Receive updates for other Microsoft products when you update Windows
Yunha, a college student, uses a Windows 10 laptop to study and play games. During the past month, Yunha updated the operating system and drivers on his laptop. Some of the games began crashing after these updates.Which of the following tools should Yunha use to identify the underlying issue?
Reliability Monitor
As a freelancer, Manyata developed a traditional Win32 app for a client. The client has come back with a request to make the app compatible with Windows 10 in S mode.How should Manyata address the client's request?
She should repackage the app as an MSIX app
Ayaka's Windows 10 computer has slowed over time. She wants to enhance the performance of the computer by tuning her system. She begins by choosing to adjust the virtual memory settings in Performance Options. Her computer has two physical disks, and the paging file is currently placed on one of the disks on the same volume as the operating system.Which of the following should Ayaka do?
She should spread the paging file over both disks
Laila's browser continually hangs and appears to consume most of the resources on her Windows 10 system. Whenever she opens more than 10 tabs, the computer slows down and her browser eventually crashes. To understand the underlying issue, Laila wants to test how the browser's processes are impacting the processor.Which of the following should Laila do?
She should suspend the browser's processes using the CPU tab in Resource Monitor
Joanna, a graphic designer at ChromaStage, has an application installed on her UAC-enabled Windows 10 system that was designed for an older version of Windows. Some of the application's features require administrative privileges. When she tries running the application, the application fails to run and generates an error instead.If Joanna's account already has administrative privileges, what can she do to resolve this issue?
She should use the Application Compatibility Toolkit to resolve the issue
Laila is editing an image on her laptop using an image processing application. The application freezes frequently. When she contacts customer support, she is request for a screenshot of the frozen application to create a support ticket.Which of the following shortcuts can Laila use to take a screenshot of only the frozen application?
Shift+Print Screen
Glenda is using a speech-to-text program on her Windows 10 laptop to dictate notes. After completing this task, she switches to other tasks but leaves the speech-to-text application open in the background. When she tries dictating notes again after a couple of hours, she is unable to interact with the application. She opens Task Manager to check if the associated process for the application is still running or suspended.Under which header on the Details tab is Glenda most likely to find this information?
Status
Which Windows 10 feature captures a screenshot each time the user clicks a screen item and saves the screenshots and user actions in a report that can be sent via email or saved to a shared storage location?
Steps Recorder
Which feature of NTFS allows a file or folder to point to another file or folder located somewhere else in the file system?
Symbolic links
What type of encryption algorithm uses the same key to encrypt data and decrypt data?
Symmetric
Odilon installs a VPN application on his Windows 10 computer. The application is configured by default to start automatically. This is impacting the boot time on his computer, so he wants to disable automatic startup. The application does not have a setting to disable this, and Odilon is unsure of the mechanism used by the application to start automatically.Which of the following tools can Odilon use to prevent the VPN application from automatically starting?
Task Manager
Which utility can be used to provide an overview of the current state of a computer?
Task Manager
Winona has set up AppLocker rules to protect computers on the company network from being infected by malware. Despite this, one of the computers is infected by malware. She identifies that the malware infected the computer when a user ran a malicious .exe file.Which of the following prevented the AppLocker rules from being evaluated?
The Application Identity service is configured for Manual startup
_____ is used with newer computers that use UEFI firmware to start the computer.
The GUID Partition Table
Which of the following is considered one of the biggest sources of malware (malicious software)?
The Internet
TEXMII Consultants, a tax consulting firm, uses legacy web-based applications. To allow these applications to run on Microsoft Edge, Ablorde adds these websites to IE Mode. Some of the users report that all the legacy applications are still being launched in Microsoft Edge on their computers.Which of the following is the most likely reason for this issue?
The Internet Explorer 11 optional feature has been uninstalled from the computers
Chao creates a file YTDReport and places it a folder titled TownHall. Only the Managers group has full control permissions to the TownHall folder. Later, Chao moves this folder to the Presentations folder on the same NTFS volume. The Managers group does not have any explicit permissions to the content in the Presentations folder.Which of the following is true of this scenario?
The Managers group will have full control permissions to the TownHall folder
Kathryn has the latest version of Windows 10 installed on her laptop. She configures File History on her computer but wants to use Backup and Restore (Windows 7) to create a system image.Which of the following is a caveat to using the System Image Backup option?
The System Image Backup option is deprecated beginning in Windows 10 version 1709
Merwyn's laptop has Windows 10 installed on the C drive. He creates a new folder, Work, on the D drive and adds this folder to the Documents library. He then navigates to the Work folder in the Documents library and creates a new Word file.Which of the following is true of this scenario?
The Word file is created in the Work folder on the D drive
Samir is using an external hard disk with File History to back up files from his laptop. He needs to detach the hard disk for another task, so he configures an external SSD to be used with File History.Which of the following is most likely to occur in this scenario?
The backed-up data on the hard disk will not be deleted
Ablorde, a programmer, installed a new code editor on his laptop. After the installation, he is prompted to restart the laptop. He notices that the code editor has a registry key in the following location: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce.What does this most likely indicate?
The code editor will run a configuration routine after the next restart
Dorothy, a system administrator, uses BitLocker To Go to protect USB drives that are used in the organization. She chooses the Use a password to unlock the drive option when picking between unlocking options. Warren wants to print some files, so he copies these files from his work laptop onto a USB drive. Next, he plugs in this drive on a computer that is connected to a printer.If Warren is able to print the files on the USB drive successfully without entering any password, which of the following must be true of the computer connected to the printer?
The computer is marked as a trusted environment
Anya, an amateur photographer, has uploaded the photos stored on one of the partitions on her hard drive to the cloud. She intends to wipe the partition and regain some storage space. She starts the DiskPart utility and runs the DELETE command. However, she soon realizes that she specified the incorrect partition number, 3 instead of 2.What of the following is the most likely outcome in this scenario?
The data on partition 3 will be deleted and may not be recoverable
Michaela has her work-related documents backed up on the cloud using OneDrive so that she can access these documents from home. When she gets back home from her office, she logs on to her Office account on the OneDrive website from her personal laptop. Next, she selects a Word document and opens it.What will happen next?
The document will open in the online Word application in read-only mode
Oluseyi receives a link to a free download of a premium application in his email. He clicks the link and the application downloads. Before installing it, he wants to verify the authenticity of the download. He verifies the MD5 value of the downloaded application against the MD5 value listed for the application on the original website. The MD5 values do not match.Which of the following is true in this scenario?
The downloaded application has been modified from its original and authentic version
Yemi creates a Word document in a OneDrive folder on her laptop and begins working on the document. Once Yemi completes her work, she closes the document. She notices that the file status icon is two arrows in a circle.What does this indicate?
The file is synchronizing
Macy works as a system administrator at an accounting firm. Sensitive data is stored on all Windows 10 client systems. She wants to audit all access to files on these systems, so she decides to edit the Global Object Access Auditing category.In order to complete this task, which of the following conditions should be met?
The files and folders must be on NTFS-formatted volumes
Jin has configured File History on his Windows 10 computer using an external hard disk. Some of the files on the computer that are selected for backup are EFS-protected. For the backup to proceed smoothly, which of the following conditions should be met?
The hard disk should be formatted with NTFA
Vishal is considering switching to BitLocker Drive Encryption because of the inefficiencies of EFS. When he tries to use this encryption feature on Windows 10 Professional, he is unsuccessful.Which of the following is the most likely reason?
The hard drive does not contain a system volume
In Windows 10, which of the following is updated each time a file is changed to ensure that search results are current?
The index
Trisha is using OneDrive on her Windows 10 laptop at work. She wants to enable Personal Vault but cannot find the option using the OneDrive client.Which of the following is the most likely reason for this?
The laptop is running a business plan of Microsoft 365
Frida uses OneDrive storage to back up data from her phone and laptop. Over time, the hard disk on her laptop has accumulated a lot of files. She wants to free up some space on her disk. She notices that one of the OneDrive folders, Media, is close to 200 GB. She right-clicks the folder and selects Free up space.What will happen to the Media folder?
The local copy of the Media folder will be removed, but it will be retained in OneDrive
TropicMaze is a manufacturer of processed foods. The packaging at the plant is automated by machines that are controlled by a Windows 10 computer.Which of the following indicates that this computer receives updates using Long Term Servicing Branch?
The operating system on the computer will receive Windows Updates for 10 years
Brian, a photographer, recently lost his data that was stored on a hard disk after it crashed. To prevent this from happening again, he wants to implement a storage space volume combined with fault tolerance. He decides to implement a three-way mirror resiliency.Which of the following is true of this scenario?
The storage space volume will be able to handle multiple drive failures
Daniel's friends gifted him a hard drive on his birthday. Daniel connected the hard drive to his laptop. He then used the Initialize-Disk cmdlet to initialize the disk without specifying a partition style. However, Daniel did not notice that the hard drive contained a video of his friends and family wishing him on his birthday.Which of the following is most likely to occur in this scenario?
The video on the disk will be deleted
Nikita downloaded software from the Internet and installed it on her computer. She suspects that the software has also installed malware onto her computer. She uses the Autoruns application to look for malware on her computer.Which of the following in Autoruns most likely indicates the presence of malware on her computer?
There is a file in a nonstandard location
Hannah, a system administrator, wants to use Windows Update for Business in her organization to control updates for Windows 10 systems. While she is able to use Group Policy to apply these settings to most computers, she is unable to apply these settings to some computers.Which of the following is the most likely reason that Hannah is not able to apply the Windows Update for Business settings to these computers?
These computers are running the Windows 10 Home edition
Wemimo creates a new folder named NewFolder in D:\Labs\Test. In the Permissions tab in advanced security settings, he disables inheritance for this folder.Which of the following is true of the permission inheritance in this scenario?
This blocks inheritance of permissions for NewFolder from higher levels in D:\Labs\Test
Nicole, a system administrator, is configuring basic NTFS permissions on folders on a common computer used for miscellaneous tasks such as printing or browsing social networking sites.What is the scope that is automatically configured scope in this scenario?
This folder, subfolders, and files
Until a new disk is initialized, what is its status reported as?
Unknown
Which of the following is not true of App-V?
Updates are installed directly on the client computers
You work as a network consultant in a software company. The company has developed a new UWP app that needs to be tested on multiple Windows 10 computers. The lead developer does not want to upload the software to the Microsoft Store or enable sideloading on computers.What suggestion would you give him to test the new software?
Upload the software to Microsoft Store for Business
Yemi, a software developer, uses a Windows 10 PC at home. She usually runs several resource-intensive applications on her system. Her PC crashed and failed to restart, so she decided to use WinRE to troubleshoot and repair the PC. She has a recovery DVD that she wants to use to perform the recovery. Which of the following options in WinRE should Yemi select?
Use a device
Esmeralda creates a rule with the Deny permission for photo.exe in the Executable Rules collection for a group with all users.Which of the following is true in this scenario?
Users will not be able to run other applications that do not have an Allow rule
Alex, a system administrator, wants to uninstall a Windows update that was recently installed on around 200 Windows 10 computers in the organization.Which of the following options is best suited to this scenario?
Using a batch script with wusaexe
An application installed on a Windows 10 system requires access to restricted areas on the system to place user data. However, this application is not UAC compliant.To enable this application to run properly, which of the following UAC options should be enabled?
Virtualize file and registry write failures to per-user locations
Frida is running out of space on her local hard drive, so she purchases an external hard drive. However, she wants to preserve the structure of the folders on the old drive. She needs to integrate the new drive in a way that it she can store data on it while appearing to access it via folders on the old drive.Which of the following can Frida use in this scenario?
Volume mount points
Which NTFS feature allows you to link an empty folder in one volume to another volume?
Volume mount points
Which of the following is not a precaution you should take before modifying the registry?
When possible, use a user's computer rather than a test system to verify that changes resolve the issue
Melita recently purchased a new Windows 10 laptop because her old laptop crashed. To ensure that her data is protected, she enables system protection on her laptop.Which of the following is true of this scenario?
When the storage space dedicated to restore points becomes too large, the oldest restore point is automatically removed
Which of the following is true of BitLocker Drive Encryption?
When you use BitLocker Drive Encryption, an entire volume is encrypted
Nikita is using a Windows 10 system. She wants to change the background picture on her desktop, so she decides to open the Settings window.Which of the following shortcuts can she use to access the Settings windows?
Win+I
Which of the following allows only apps from the Microsoft Store to be installed and run?
Windows 10 in S mode
Zachary wants to print a few documents, so he connects a printer to his Windows 10 laptop using the USB port. When he prints these documents, the pages have random characters printed on them instead of the actual files that he wanted to print.Which of the following is the most likely reason for this?
Windows 10 is using a compatible driver for the printer
What do applications use to request services and functionality from Windows 10?
Windows API
Instead of creating batch files and using reg.exe, which of the following is an administrator more likely to use to create new scripts?
Windows PowerShell
Which Advanced startup option in recovery settings is a small instance of Windows 10 that includes several options for troubleshooting and repairing Windows 10?
Windows Recovery Environment (WinRE)
You can modify the locations included in a library, but by which of the following must the location be indexed?
Windows Search
Which of the following terms is used to describe a virtualized environment that hosts Win32 apps on the 64-bit version of Windows 10?
Windows on Windows 64 (WOW64)
You are configuring sharing options for the Public folder on a Windows 10 computer. In Advanced sharing settings in the Network and Sharing Center, you enable the option Turn on sharing so that anyone with network access can read and write files in the Public folders.Which of the following is a valid observation if you choose the option Turn on password protected sharing?
You can restrict access to the shared Public folder to valid user accounts, but you cannot select which user accounts have access
Nikita intends to use the folder sharing wizard to create a share named Proposals on her computer, Desktop20. She navigates to the location D:\Sales\. There, she right-clicks the Proposals folder and creates the share using the folder sharing wizard. She wants to share this folder with other users in the same workgroup.Which of the following will allow other users to access the share on Nikita's computer?
\\Desktop20\Proposals
If you need to read or write registry entries from batch files, which of the following can you use?
regexe
Nanxi wants to create a share on her computer. She decides to use the Create A Shared Folder Wizard to accomplish this task.Which of the following tools will launch this wizard?
shrpubw