NETW 166 Exam 3

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which of the following expands on the domain concept by linking domains in logical structures named trees, and multiple trees into forests?

Active Directory

a set of performance indicators gathered when system performance is acceptable

Baseline

In which technology are files stored in a file share in a central location, but are cached at the remote site to make it faster to open the files?

BranchCache

The following is NOT an Intune policy category

Firewall Policies

Which registry hive contains details about the current hardware profile in use?

HKEY_CURRENT_CONFIG

a utility that allows you to view overall system information and manipulate processes

Task Manager

When you establish a baseline, it is important to ensure that you are measuring the normal state of the performance indicators.

True

Applications designed to interact with which subsystem were the most common type of application in use with earlier operating systems, such as Windows XP?

Win32

Which Windows 10 feature provides an automated diagnosis and repair of boot problems plus a centralized platform for advanced recovery tool?

Windows Recovery Environment (WinRE)

Which of the following terms is used to describe a virtualized environment that hosts Win32 apps on the 64-bit version of Windows 10?

Windows on Windows 64 (WOW64)

a system that allows users to synchronize a single folder on a file server between multiple devices

Work Folders

an event that is triggered when a count value is above or below the specified threshold value

alert

Instead of logging performance counters to disk, you can configure which of the following to occur?

alerts

The full Intune product is available through which of the following?

as part of the EMS

What is the preferred method to configure clients to use Work Folders?

automatic discovery

When a limitation in a single computer system component slows down the entire system, which of the following occurs?

bottleneck

What is required for Apple iOS devices to establish a trust between the device and the Intune service?

certificate

What feature of Hyper-V virtual machines is very useful for testing because you can almost instantly reset a computer back to a previous state?

checkpoints

In Active Directory, which partition holds general information about the Active Directory forest?

configuration

the performance indicators that can be recorded in Performance Monitor

counters

What type of technology allows users to work with files whether they are connected to network or not by copying files locally to mobile computers?

data synchronization

When Intune adds a managed app as a pointer to an external website or store installation URL, what is this called?

deep-linking

What technology behaves like an "always-on" VPN connection?

dial-up networking

What type of bottleneck occurs when the applications you are running require more memory than is physically available in the computer?

memory

Which of the following software does the remote client use to send keyboard and mouse commands to the computer being remotely controlled?

remote control

Which term best describes a snapshot of operating system and program files at a specific point in time that can be restored to roll back to a point in time when the operating system or applications were stable?

restore point

Which of the following is defined by IP subnets instead of physical locations?

Active Directory site

Which of the following is a default Intune device group?

All Mobile Devices

Your Client Hyper-V host has a single network adapter. What option should be enabled to allow your virtual machines to communicate with the external network while not disrupting host network communication?

Allow management operating system to share this network adapter

What do applications use to request services from the application environment subsystem?

Application programming interfaces (API)

Which of the following is NOT an automatic start action you can choose for a virtual machine?

Automatically start at the following time

User accounts that are enrolled to be managed by Microsoft Intune must be linked to which of the following?

Azure AD

Which registry key contains the default registry settings that are copied for new user profiles?

DEFAULT

Which of the following appears to be a single, large file structure, but can really be composed of shared folders on multiple servers?

DFS namespace

During the installation process for a new device, what are used in order to describe how the installation should be performed?

Device setup classes

an always-on replacement for on-demand VPN connections

DirectAccess

What type of bottleneck occurs when Windows 10 and running applications want to read and write information to the physical disk in the system faster than the disk can manage?

Disk

Which area of the Resource Monitor is used to monitor disk performance and determine whether the disk subsystem is a bottleneck?

Disk

Which Active Directory component is responsible for authenticating users when they log on to a workstation?

Domain controllers

Data Collector Sets organize multiple counters into a single unit. Which type of data can a Data Collector Set monitor to track when system events occur.

Event Trace

Which utility is used to browse and manage the records of system events and messages stored in system event logs?

Event Viewer

a framework that allows multiple authentication protocols to be integrated with the VPN sign-in process

Extensible Authentication Protocol (EAP)

If you do have a legacy DOS or Win16 application that you need to run, you can use a 64-bit version of Windows 10.

False

Most organizations use the 32-bit version of Windows 10 rather than the 64-bit version of Windows 10.

False

The Services tab in Task Manager shows all user applications running on the computer.

False

a feature that is used to backup user files to an external hard drive or files share.

File History

Which of the following is a correct statement about Generation 1 and Generation 2 virtual machines?

Generation 1 virtual machines use BIOS-based firmware; Generation 2 virtual machines use UEFI-based firmware

A more manageable way to deploy .msi-based applications in smaller environments would be to use which of the following?

Group Policy

Which of the following can be pushed down to a computer and can be changed by the user?

Group Policy Preference

For domain-joined computers, what is the simplest way to configure VPN connections?

Group Policy Preferences

The Group Policy settings used by Windows 10 are contained in which of the following?

Group Policy object

Which registry hive contains global settings for the entire computer and the applications installed on it?

HKEY_LOCAL_MACHINE

What is the most specific device identification string?

Hardware ID

Selecting a counter to display will display information about that counter's collected data as a chart type. Which chart type displays the current value of each performance counter in decimal format?

Histogram bar

Which component of the Hyper-V architecture controls all communication with the physical hardware on the computer?

Hypervisor

a newer VPN protocol that uses IPsec to secure data, but can authenticate by using a user name and password

Internet Key Exchange v2 Tunneling Protocol (IKEv2)

Which alert category in Microsoft Intune should you use to get a notification when an automatic service fails to run?

Monitoring

What is used to prevent users to connecting to Remote Desktop until the connection is authenticated?

Network Level Authentication

As part of DirectAccess configuration, which of the following is also configured?

Network Location Server

Which Windows 10 feature provides the ability to obtain software from a central repository?

PackageManagement

Where in the Hyper-V architecture do device drivers reside?

Parent partition

What utility allows you to visually display the data generated by counters, and allows you to select the individual counters you want to view?

Performance Monitor

the process for collecting system performance data, analyzing system performance data, and implementing system performance improvements

Performance tuning

an older VPN protocol that authenticates based on user name and password

Point-to-Point Tunneling Protocol (PPTP)

If File History or Backup and Restore (Windows 7), or both, had been configured to protect user data, that data can be recovered using which feature?

Previous Versions

Which tool allows a user to connect to the active registry database and make changes that are effective immediately?

REGEDIT.EXE

Which of the following allows a user to send an invitation to a remote user that invites them to remotely connect to the local computer?

Remote Assistance

a feature in Windows 10 that allows a helper to connect to a Windows 10 computer and view the screen or remotely control the computer

Remote Assistance

Which of the following allows clients to access resources local to the server as if the client was on the same network as the server?

Remote access

Which of the following are used to process log file data and display it in a meaningful way?

Reports

a utility launched from Performance Monitor that provides real-time monitoring of the most common system performance indicators

Resource Monitor

Which of the following is NOT a method for copying user accounts from on-premises Active Directory?

SecureCopy

What Windows 10 feature captures a screenshot each time the user clicks on a screen item and saves the screenshots and users actions in a report that can be emailed or saved to a shared storage location?

Steps Recorder

a tool that can be used to record the steps required to generate a problem and store the steps and screenshots in a file

Steps Recorder

Which of the following tools can be used to deploy operating systems to the point where you do not need to physically touch the computer?

System Center Configuration Manager

Which utility can be used to provide an overview of the current state of a computer?

Task Manager

DirectAccess relies on IPv6 for connectivity.

True

Public networks allow traveling users to obtain a remote network connection.

True

The simplest automated deployment method is to create a batch file that does a silent install of the application.

True

Which of the following is a default Intune user group?

Ungrouped Users

What utility can be used to migrate user settings, documents, and application configuration settings from the previous operating system to Windows 10?

User State Migration Tool (USMT)

Which of the following is considered the oldest technology for remote access?

dial-up networking

Which Active Directory component has a central security database that is used by all computers that are members of it?

domain

Which distribution method delivers the critical components of an application first and allows the users to being using the application before installation is complete?

downloading

What feature must you enable on a virtual machine to use RDP functionality?

enhanced session mode

What type of virtual network should you create if your virtual machine should be able to communicate with the Internet?

external

The registry is divided into sections and levels of data. Multiple sections exist to organize data by purpose. What are these individual sections called?

hives

What happens if an APN certificate expires?

iOS device management will fail

Which service is NOT supported by the Intune client for desktop computers?

issuing certificates

Active Directory information can be changed on any domain controller and those changes will be replicated to other domain controllers. What is this type of replication called?

multimaster

a system for remote data or application access where only screen draw commands and keystrokes are sent between the client and computer being remote controlled

remote control

To make Active Directory more manageable, it is divided into the domain partition, configuration partition, and what other partition?

schema

What is the secondary administrator that can be specified for Intune called?

service administrator

Each Win32 application runs in its own virtual memory space and is executed by the processor in which mode?

user

Running apps in which mode ensures that a poorly written app does not affect system stability?

user

All of the application environments in Windows 10 restrict apps to running in which of the following modes?

user mode

an encrypted connection from a client to a remote access server over a public network

virtual private network (VPN)

You need to enable Client Hyper-V on a virtual machine; what feature do you need to use?

nested virtualization

Each domain can be subdivided into which of the following, that allow you to organize the objects in a domain?

organizational units (OUs)

If you have obtained the .appx file for a Windows Store app, you can install the app from a source other than the Windows Store. What is this ability known as?

package managment

Which type of virtual network should you create if you want a completely isolated test environment for a virtual machine?

private

After you install Client Hyper-V, what must you do before you can begin using it?

reboot the computer

an optional drive that you can create with a system image from your currently installed operating system and apps

recovery drive

When applications or Windows 10 starts, they read their configuration information from which of the following?

registry

a system that allows dial-up or VPN clients to remotely retrieve and save data as though they are on the local network, but with much slower performance

remote access


संबंधित स्टडी सेट्स

Vlocity platform developer questions

View Set

Ch. 11: Maternal Adaptation During Pregnancy

View Set

prepU ch 12 Nursing Management During Pregnancy

View Set

prepU ch 42 Management of Patients With Musculoskeletal Trauma

View Set

Business Policy multi questions 3

View Set