Final Exam

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

What actions can be specified for a Windows firewall rule?

- Allow the connection - Allow the connection if it is secure Block the connection

What precautions should be taken before modifying the registry?

- Back up - Restrict the number of changes made at one time - When possible, use a test system - ensure that the computer can boot properly after the changes have been made.

What are the main categories of Intune policies?

- Configuration Policies - Compliance Policies - Conditional Access Policies - Corporate Device Enrollment Policies Term and Conditions Policies

What are the default permissions for printing?

- Everyone - All Application Packages - Creator Owner - User who installed printer (Userx) Administrators

What are the differences between Generation 1 and Generation 2 virtual machines?

- Generation 1 virtual machines use BIOS-based firmware, which supports a wider range of operating systems. Generation 2 virtual machines use UEFI-based firmware,.

What are the primary hives found in the Windows 10 registry?

- HKEY_USERS - HKEY_LOCAL_MACHINE

What are some of the improvements found in IPv6?

- Increased address space - Quality of service - Extensibility to support new features data security

What three things can authentication for IPsec be based upon?

- Key exchange - Data protection - Authentication method

What is the purpose of configuring an RD Gateway server in Remote Desktop?

- Remote Desktop Gateway is used to allow secure connections using HTTPS from computers outside the corporate network.

Briefly describe the two types of virtual desktops that Remote Desktop Services can provide

- Session-based virtual desktops- This type of virtual desktop is hosted on a Remote Desktop Session Host (RD Session Host). A single RD Session Host is shared by multiple users at one time. Virtual machine-based virtual desktops- This type of virtual desktop is hosted on a Windows server running Hyper-V. Each user has an independent virtual machine with a completely independent operating system. The hardware of the server is shared among the virtual machines, but each virtual machine is independent

Briefly describe the structure of the Windows 10 registry

- The registry is divided into sections and levels of data. Multiple sections exist to organize data by purpose. The individual sections are called hives. Each hive has a specific role to play and is stored in memory while it is in use.

What are the options for network discovery?

- Turn on network discovery - Turn off network discovery

What are some of the potential downsides to using Client Hyper-V?

- not available in Client Hyper-V are: - Live virtual machine migration Hyper-V replica

What are the five PowerShell commands that can be used to update and automate the configuration of System Restore?

-Enable-ComputerRestore - Disable-ComputerRestore - Checkpoint-Computer - Get-ComputerRestorePoint - Restore-Computer

Which USMT file is generated by running ScanState.exe with the /genconfig option?

Config.xml

What type of bottleneck occurs when Windows 10 and running applications want to read and write information to the physical disk in the system faster than the disk can manage?

Disk

Which of the following are used to process log file data and display it in a meaningful way?

Reports

What is the format for user names used by Office 365 apps?

UPN

The full Intune product is available through which of the following?

as part of the EMS

What type of technology allows users to work with files whether they are connected to network or not by copying files locally to mobile computers?

data synchronization

When Intune adds a managed app as a pointer to an external website or store installation URL, what is this called?

deep-linking

When a new device is installed into a Windows 10 computer, the operating system uses a device setup class and which of the following in order to properly install the new device?

device identification string

All of the application environments in Windows 10 restrict apps to running in which of the following modes?

user mode

The OneDrive Recycle Bin is limited in capacity. What percentage of the storage limit purchased for OneDrive storage is the typical capacity of the OneDrive Recycle Bin?

10%

Your Client Hyper-V host has a single network adapter. What option should be enabled to allow your virtual machines to communicate with the external network while not disrupting host network communication?

Allow management operating system to share this network adapter

Which ACT component is the administrative console that can be used to control the overall discovery, collection, and analysis process for apps?

Application Compatibility Manager

Windows 10 introduces a newer version of Windows Backup. What did Microsoft decide to call this newer version?

Backup and Restore (Windows 7)

In which technology are files stored in a file share in a central location, but are cached at the remote site to make it faster to open the files?

BranchCache

Which Windows 10 feature allows you to create virtual machines with a completely independent operating system that shares the hardware on the computer running Windows 10?

Client Hyper-V

Which registry key contains the default registry settings that are copied for new user profiles?

DEFAULT

When a VPN connection loses connectivity due to a network interruption, which protocol can reconnect automatically once network connectivity is restored using a feature known as VPN Reconnect?

IKEv2

Which Internet Explorer security zone includes all Internet Web sites that are not specifically assigned to another zone?

Internet

What is used to prevent users to connecting to Remote Desktop until the connection is authenticated?

Network Level Authentication

Which Windows 10 feature provides the ability to obtain software from a central repository?

PackageManagement

How can Intune manage client desktop computers?

These computers can be managed via Intune by installing an Intune client on the local computer. The Intune client provides the mechanism for providing status information, installing software updates, managing apps, enabling and managing Endpoint Protection, updating Windows Firewall settings, and enabling remote assistance

Which of the following uses a USB drive as a memory cache similar to a paging file?

Windows ReadyBoost

Which of the following is considered the oldest technology for remote access?

dial-up networking

Which Active Directory component has a central security database that is used by all computers that are members of it?

domain

If you have obtained the .appx file for a Windows Store app, you can install the app from a source other than the Windows Store. What is this ability known as? Sideloading

download

In Windows 10, which of the following is updated each time a file is changed to ensure that search results are current?

index

What type of bottleneck occurs when the applications you are running require more memory than is physically available in the computer?

memory

Which type of virtual network should you create if you want a completely isolated test environment for a virtual machine?

private

Besides access and recovery previous version of a file, which of the following is a function that can only be performed in the OneDrive website and not by the OneDrive client?

recover deleted files

When applications or Windows 10 starts, they read their configuration information from which of the following?

registry

Which term best describes a snapshot of operating system and program files at a specific point in time that can be restored to roll back to a point in time when the operating system or applications were stable?

restore point

Each Win32 application runs in its own virtual memory space and is executed by the processor in which mode?

user

Briefly describe the .xml files used to control USMT.

· MigApp.xml—Used to include or exclude the setting for specific applications. · MigUser.xml—Used to control which file types, user folders, and desktop settings are included in the migration. · MigSys.xml—Used only when migrating operating system and browser settings to a Windows XP computer. · Config.xml—Used to allow you to control the migration process in detail. For example, this custom configuration file can control which operating system component settings or which specific applications settings are migrated.

What are the basic components of Windows 10 that support networking?

· Network and Sharing Center · Networks · Connections

What are the management tasks that can be performed for each print job?

· Print a test page. · Run the troubleshooter. · View printer properties. · View printing preferences. View hardware properties


संबंधित स्टडी सेट्स

Speakout intermediate - Entries - sentences

View Set

NU141- Chapter 22 Psychotherapeutic Agents

View Set

Effects of Exercise on the Human Body

View Set

Brunner and Suddharth Med Surg Chapter 42 Study Guide Questions Part 2

View Set

Chapter 4: Igneous Rocks (chart into word form)

View Set