NETW 166 Exam 3
Which of the following expands on the domain concept by linking domains in logical structures named trees, and multiple trees into forests?
Active Directory
a set of performance indicators gathered when system performance is acceptable
Baseline
In which technology are files stored in a file share in a central location, but are cached at the remote site to make it faster to open the files?
BranchCache
The following is NOT an Intune policy category
Firewall Policies
Which registry hive contains details about the current hardware profile in use?
HKEY_CURRENT_CONFIG
a utility that allows you to view overall system information and manipulate processes
Task Manager
When you establish a baseline, it is important to ensure that you are measuring the normal state of the performance indicators.
True
Applications designed to interact with which subsystem were the most common type of application in use with earlier operating systems, such as Windows XP?
Win32
Which Windows 10 feature provides an automated diagnosis and repair of boot problems plus a centralized platform for advanced recovery tool?
Windows Recovery Environment (WinRE)
Which of the following terms is used to describe a virtualized environment that hosts Win32 apps on the 64-bit version of Windows 10?
Windows on Windows 64 (WOW64)
a system that allows users to synchronize a single folder on a file server between multiple devices
Work Folders
an event that is triggered when a count value is above or below the specified threshold value
alert
Instead of logging performance counters to disk, you can configure which of the following to occur?
alerts
The full Intune product is available through which of the following?
as part of the EMS
What is the preferred method to configure clients to use Work Folders?
automatic discovery
When a limitation in a single computer system component slows down the entire system, which of the following occurs?
bottleneck
What is required for Apple iOS devices to establish a trust between the device and the Intune service?
certificate
What feature of Hyper-V virtual machines is very useful for testing because you can almost instantly reset a computer back to a previous state?
checkpoints
In Active Directory, which partition holds general information about the Active Directory forest?
configuration
the performance indicators that can be recorded in Performance Monitor
counters
What type of technology allows users to work with files whether they are connected to network or not by copying files locally to mobile computers?
data synchronization
When Intune adds a managed app as a pointer to an external website or store installation URL, what is this called?
deep-linking
What technology behaves like an "always-on" VPN connection?
dial-up networking
What type of bottleneck occurs when the applications you are running require more memory than is physically available in the computer?
memory
Which of the following software does the remote client use to send keyboard and mouse commands to the computer being remotely controlled?
remote control
Which term best describes a snapshot of operating system and program files at a specific point in time that can be restored to roll back to a point in time when the operating system or applications were stable?
restore point
Which of the following is defined by IP subnets instead of physical locations?
Active Directory site
Which of the following is a default Intune device group?
All Mobile Devices
Your Client Hyper-V host has a single network adapter. What option should be enabled to allow your virtual machines to communicate with the external network while not disrupting host network communication?
Allow management operating system to share this network adapter
What do applications use to request services from the application environment subsystem?
Application programming interfaces (API)
Which of the following is NOT an automatic start action you can choose for a virtual machine?
Automatically start at the following time
User accounts that are enrolled to be managed by Microsoft Intune must be linked to which of the following?
Azure AD
Which registry key contains the default registry settings that are copied for new user profiles?
DEFAULT
Which of the following appears to be a single, large file structure, but can really be composed of shared folders on multiple servers?
DFS namespace
During the installation process for a new device, what are used in order to describe how the installation should be performed?
Device setup classes
an always-on replacement for on-demand VPN connections
DirectAccess
What type of bottleneck occurs when Windows 10 and running applications want to read and write information to the physical disk in the system faster than the disk can manage?
Disk
Which area of the Resource Monitor is used to monitor disk performance and determine whether the disk subsystem is a bottleneck?
Disk
Which Active Directory component is responsible for authenticating users when they log on to a workstation?
Domain controllers
Data Collector Sets organize multiple counters into a single unit. Which type of data can a Data Collector Set monitor to track when system events occur.
Event Trace
Which utility is used to browse and manage the records of system events and messages stored in system event logs?
Event Viewer
a framework that allows multiple authentication protocols to be integrated with the VPN sign-in process
Extensible Authentication Protocol (EAP)
If you do have a legacy DOS or Win16 application that you need to run, you can use a 64-bit version of Windows 10.
False
Most organizations use the 32-bit version of Windows 10 rather than the 64-bit version of Windows 10.
False
The Services tab in Task Manager shows all user applications running on the computer.
False
a feature that is used to backup user files to an external hard drive or files share.
File History
Which of the following is a correct statement about Generation 1 and Generation 2 virtual machines?
Generation 1 virtual machines use BIOS-based firmware; Generation 2 virtual machines use UEFI-based firmware
A more manageable way to deploy .msi-based applications in smaller environments would be to use which of the following?
Group Policy
Which of the following can be pushed down to a computer and can be changed by the user?
Group Policy Preference
For domain-joined computers, what is the simplest way to configure VPN connections?
Group Policy Preferences
The Group Policy settings used by Windows 10 are contained in which of the following?
Group Policy object
Which registry hive contains global settings for the entire computer and the applications installed on it?
HKEY_LOCAL_MACHINE
What is the most specific device identification string?
Hardware ID
Selecting a counter to display will display information about that counter's collected data as a chart type. Which chart type displays the current value of each performance counter in decimal format?
Histogram bar
Which component of the Hyper-V architecture controls all communication with the physical hardware on the computer?
Hypervisor
a newer VPN protocol that uses IPsec to secure data, but can authenticate by using a user name and password
Internet Key Exchange v2 Tunneling Protocol (IKEv2)
Which alert category in Microsoft Intune should you use to get a notification when an automatic service fails to run?
Monitoring
What is used to prevent users to connecting to Remote Desktop until the connection is authenticated?
Network Level Authentication
As part of DirectAccess configuration, which of the following is also configured?
Network Location Server
Which Windows 10 feature provides the ability to obtain software from a central repository?
PackageManagement
Where in the Hyper-V architecture do device drivers reside?
Parent partition
What utility allows you to visually display the data generated by counters, and allows you to select the individual counters you want to view?
Performance Monitor
the process for collecting system performance data, analyzing system performance data, and implementing system performance improvements
Performance tuning
an older VPN protocol that authenticates based on user name and password
Point-to-Point Tunneling Protocol (PPTP)
If File History or Backup and Restore (Windows 7), or both, had been configured to protect user data, that data can be recovered using which feature?
Previous Versions
Which tool allows a user to connect to the active registry database and make changes that are effective immediately?
REGEDIT.EXE
Which of the following allows a user to send an invitation to a remote user that invites them to remotely connect to the local computer?
Remote Assistance
a feature in Windows 10 that allows a helper to connect to a Windows 10 computer and view the screen or remotely control the computer
Remote Assistance
Which of the following allows clients to access resources local to the server as if the client was on the same network as the server?
Remote access
Which of the following are used to process log file data and display it in a meaningful way?
Reports
a utility launched from Performance Monitor that provides real-time monitoring of the most common system performance indicators
Resource Monitor
Which of the following is NOT a method for copying user accounts from on-premises Active Directory?
SecureCopy
What Windows 10 feature captures a screenshot each time the user clicks on a screen item and saves the screenshots and users actions in a report that can be emailed or saved to a shared storage location?
Steps Recorder
a tool that can be used to record the steps required to generate a problem and store the steps and screenshots in a file
Steps Recorder
Which of the following tools can be used to deploy operating systems to the point where you do not need to physically touch the computer?
System Center Configuration Manager
Which utility can be used to provide an overview of the current state of a computer?
Task Manager
DirectAccess relies on IPv6 for connectivity.
True
Public networks allow traveling users to obtain a remote network connection.
True
The simplest automated deployment method is to create a batch file that does a silent install of the application.
True
Which of the following is a default Intune user group?
Ungrouped Users
What utility can be used to migrate user settings, documents, and application configuration settings from the previous operating system to Windows 10?
User State Migration Tool (USMT)
Which of the following is considered the oldest technology for remote access?
dial-up networking
Which Active Directory component has a central security database that is used by all computers that are members of it?
domain
Which distribution method delivers the critical components of an application first and allows the users to being using the application before installation is complete?
downloading
What feature must you enable on a virtual machine to use RDP functionality?
enhanced session mode
What type of virtual network should you create if your virtual machine should be able to communicate with the Internet?
external
The registry is divided into sections and levels of data. Multiple sections exist to organize data by purpose. What are these individual sections called?
hives
What happens if an APN certificate expires?
iOS device management will fail
Which service is NOT supported by the Intune client for desktop computers?
issuing certificates
Active Directory information can be changed on any domain controller and those changes will be replicated to other domain controllers. What is this type of replication called?
multimaster
a system for remote data or application access where only screen draw commands and keystrokes are sent between the client and computer being remote controlled
remote control
To make Active Directory more manageable, it is divided into the domain partition, configuration partition, and what other partition?
schema
What is the secondary administrator that can be specified for Intune called?
service administrator
Each Win32 application runs in its own virtual memory space and is executed by the processor in which mode?
user
Running apps in which mode ensures that a poorly written app does not affect system stability?
user
All of the application environments in Windows 10 restrict apps to running in which of the following modes?
user mode
an encrypted connection from a client to a remote access server over a public network
virtual private network (VPN)
You need to enable Client Hyper-V on a virtual machine; what feature do you need to use?
nested virtualization
Each domain can be subdivided into which of the following, that allow you to organize the objects in a domain?
organizational units (OUs)
If you have obtained the .appx file for a Windows Store app, you can install the app from a source other than the Windows Store. What is this ability known as?
package managment
Which type of virtual network should you create if you want a completely isolated test environment for a virtual machine?
private
After you install Client Hyper-V, what must you do before you can begin using it?
reboot the computer
an optional drive that you can create with a system image from your currently installed operating system and apps
recovery drive
When applications or Windows 10 starts, they read their configuration information from which of the following?
registry
a system that allows dial-up or VPN clients to remotely retrieve and save data as though they are on the local network, but with much slower performance
remote access