Final Exam
What actions can be specified for a Windows firewall rule?
- Allow the connection - Allow the connection if it is secure Block the connection
What precautions should be taken before modifying the registry?
- Back up - Restrict the number of changes made at one time - When possible, use a test system - ensure that the computer can boot properly after the changes have been made.
What are the main categories of Intune policies?
- Configuration Policies - Compliance Policies - Conditional Access Policies - Corporate Device Enrollment Policies Term and Conditions Policies
What are the default permissions for printing?
- Everyone - All Application Packages - Creator Owner - User who installed printer (Userx) Administrators
What are the differences between Generation 1 and Generation 2 virtual machines?
- Generation 1 virtual machines use BIOS-based firmware, which supports a wider range of operating systems. Generation 2 virtual machines use UEFI-based firmware,.
What are the primary hives found in the Windows 10 registry?
- HKEY_USERS - HKEY_LOCAL_MACHINE
What are some of the improvements found in IPv6?
- Increased address space - Quality of service - Extensibility to support new features data security
What three things can authentication for IPsec be based upon?
- Key exchange - Data protection - Authentication method
What is the purpose of configuring an RD Gateway server in Remote Desktop?
- Remote Desktop Gateway is used to allow secure connections using HTTPS from computers outside the corporate network.
Briefly describe the two types of virtual desktops that Remote Desktop Services can provide
- Session-based virtual desktops- This type of virtual desktop is hosted on a Remote Desktop Session Host (RD Session Host). A single RD Session Host is shared by multiple users at one time. Virtual machine-based virtual desktops- This type of virtual desktop is hosted on a Windows server running Hyper-V. Each user has an independent virtual machine with a completely independent operating system. The hardware of the server is shared among the virtual machines, but each virtual machine is independent
Briefly describe the structure of the Windows 10 registry
- The registry is divided into sections and levels of data. Multiple sections exist to organize data by purpose. The individual sections are called hives. Each hive has a specific role to play and is stored in memory while it is in use.
What are the options for network discovery?
- Turn on network discovery - Turn off network discovery
What are some of the potential downsides to using Client Hyper-V?
- not available in Client Hyper-V are: - Live virtual machine migration Hyper-V replica
What are the five PowerShell commands that can be used to update and automate the configuration of System Restore?
-Enable-ComputerRestore - Disable-ComputerRestore - Checkpoint-Computer - Get-ComputerRestorePoint - Restore-Computer
Which USMT file is generated by running ScanState.exe with the /genconfig option?
Config.xml
What type of bottleneck occurs when Windows 10 and running applications want to read and write information to the physical disk in the system faster than the disk can manage?
Disk
Which of the following are used to process log file data and display it in a meaningful way?
Reports
What is the format for user names used by Office 365 apps?
UPN
The full Intune product is available through which of the following?
as part of the EMS
What type of technology allows users to work with files whether they are connected to network or not by copying files locally to mobile computers?
data synchronization
When Intune adds a managed app as a pointer to an external website or store installation URL, what is this called?
deep-linking
When a new device is installed into a Windows 10 computer, the operating system uses a device setup class and which of the following in order to properly install the new device?
device identification string
All of the application environments in Windows 10 restrict apps to running in which of the following modes?
user mode
The OneDrive Recycle Bin is limited in capacity. What percentage of the storage limit purchased for OneDrive storage is the typical capacity of the OneDrive Recycle Bin?
10%
Your Client Hyper-V host has a single network adapter. What option should be enabled to allow your virtual machines to communicate with the external network while not disrupting host network communication?
Allow management operating system to share this network adapter
Which ACT component is the administrative console that can be used to control the overall discovery, collection, and analysis process for apps?
Application Compatibility Manager
Windows 10 introduces a newer version of Windows Backup. What did Microsoft decide to call this newer version?
Backup and Restore (Windows 7)
In which technology are files stored in a file share in a central location, but are cached at the remote site to make it faster to open the files?
BranchCache
Which Windows 10 feature allows you to create virtual machines with a completely independent operating system that shares the hardware on the computer running Windows 10?
Client Hyper-V
Which registry key contains the default registry settings that are copied for new user profiles?
DEFAULT
When a VPN connection loses connectivity due to a network interruption, which protocol can reconnect automatically once network connectivity is restored using a feature known as VPN Reconnect?
IKEv2
Which Internet Explorer security zone includes all Internet Web sites that are not specifically assigned to another zone?
Internet
What is used to prevent users to connecting to Remote Desktop until the connection is authenticated?
Network Level Authentication
Which Windows 10 feature provides the ability to obtain software from a central repository?
PackageManagement
How can Intune manage client desktop computers?
These computers can be managed via Intune by installing an Intune client on the local computer. The Intune client provides the mechanism for providing status information, installing software updates, managing apps, enabling and managing Endpoint Protection, updating Windows Firewall settings, and enabling remote assistance
Which of the following uses a USB drive as a memory cache similar to a paging file?
Windows ReadyBoost
Which of the following is considered the oldest technology for remote access?
dial-up networking
Which Active Directory component has a central security database that is used by all computers that are members of it?
domain
If you have obtained the .appx file for a Windows Store app, you can install the app from a source other than the Windows Store. What is this ability known as? Sideloading
download
In Windows 10, which of the following is updated each time a file is changed to ensure that search results are current?
index
What type of bottleneck occurs when the applications you are running require more memory than is physically available in the computer?
memory
Which type of virtual network should you create if you want a completely isolated test environment for a virtual machine?
private
Besides access and recovery previous version of a file, which of the following is a function that can only be performed in the OneDrive website and not by the OneDrive client?
recover deleted files
When applications or Windows 10 starts, they read their configuration information from which of the following?
registry
Which term best describes a snapshot of operating system and program files at a specific point in time that can be restored to roll back to a point in time when the operating system or applications were stable?
restore point
Each Win32 application runs in its own virtual memory space and is executed by the processor in which mode?
user
Briefly describe the .xml files used to control USMT.
· MigApp.xml—Used to include or exclude the setting for specific applications. · MigUser.xml—Used to control which file types, user folders, and desktop settings are included in the migration. · MigSys.xml—Used only when migrating operating system and browser settings to a Windows XP computer. · Config.xml—Used to allow you to control the migration process in detail. For example, this custom configuration file can control which operating system component settings or which specific applications settings are migrated.
What are the basic components of Windows 10 that support networking?
· Network and Sharing Center · Networks · Connections
What are the management tasks that can be performed for each print job?
· Print a test page. · Run the troubleshooter. · View printer properties. · View printing preferences. View hardware properties