Windows 10 Midterm

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Tree Root Domain

A group of related domains that share the same contiguous DNS namespace.

Which data transmission rate is defined by the IEEE 802.11b wireless standard?

11 Mbps

• You need to use the runas command to run the zip.exe executable on your Windows system as the Admin user on your system, which is a member of the Administrators group. Which option should you use with the runas command to do this?

/user:Admin

You are implementing a Network Address Translation (NAT) router on your network to translate private IP addresses into single registered IP address, allowing Internet access. Which private IP addresses ranges could you choose to implement on your internal network with this router?

10.0.0.1 to 10.0.100.254 172.17.8.1 to 172.17.9.254

You've just connected a new LCD monitor to your Windows system. Your LCD monitor has a native resolution of 1440 x 900 at 64 Hz. The video adapter in your system is plugged into a PCI Express slot and has a 1 GB of video memory. It supports screen refresh rates b/w 55 and 75 Hz and screen resolutions up to 2560 x 1600. Which screen resolution should you use w/ this system?

1440 x 900

Which block of addresses is defined for use w/ Automatic Private IP Addressing (APIPA)?

169.254.0.0/16

How many total channels are available for 802.11a wireless networks?

23

You have been asked to implement a RAID 5 solution for an engineer's desktop. What is the minimum number of hard drives disks that can be used to configure RAID 5?

3

Which of the following are frequencies defined by 802.11 committees for wireless networking?

5.75GHz 2.4GHz

You are designing a wireless network for a client. Your client needs the network to support a data rate of at least 150 Mbps. In addition, the client already has a wireless telephone system installed that operates 2.4 GHz. Which 802.11 standard will work best in this situation?

802.11a 802.11n

You want to connect a laptop computer running Windows to a wireless network. The wireless network uses multiple access points and is configured to use WPA2-Personal security. SSID broadcast has been disabled. Which type of authenitcation method and encryption combination should you do for the strongest security possible?

A pre-shared key and AES encryption

Domain Controller

A server that holds a copy of the Active Directory database that can be written to.

What is the name of the service included w/ the Windows Server operating system that manages a centralized database containing user account and security info.

Active Directory

Your windows system has a single hard disk w/ a single volume that takes up the entire hard disk, You want to create a new volume named Videos for storing digital video files that are used as you create music videos. You want the new volume to optimize performance-fault tolerance is not needed. What should you do?

Add 2 hard disks. Convert both disks to dynamic. Create a new striped volume using both disks.

You use a windows desktop system. You need to configure Windows Firewall to allow traffic for a newly installed application that dynamically opens multiple ports on an as-needed basis. What should you do?

Add an exception for the application.

You have installed a new Windows system, and you have not changed the default configuration for the Windows Firewall. How will the Windows Firewall handle inbound traffic that was initiated from an external server that a hacker is using to spread a worm?

All such traffic blocked by default.

Windows Firewall interface in Control Panel

Allows you to create basic rules for network traffic generated by a specific program or service.

Windows Firewall w/ Advanced Security

Allows you to create rules based on ports and authentication.

You try to install internally developed accounting software on several new computers. However, you discover that it will not run b/c User Account Control (UAC) causes it to fail. B/c the accounting software will not be upgraded anytime soon, you must get it to work w/ UAC as is. What can you do to get the application to work w/ UAC?

Alter the program settings to Run this program as an administrator.

What describes the role of a DHCP server?

Automates the process of assigning IP addresses, subnet masks, and default gateway addresses to network hosts. Delivers DNS server addresses and other configuration information to hosts.

You want to enable OneDrive to automatically sync files stored in your Documents and Pictures folders. In the OneDrive Settings dialog shown below, click the tab contains the option to select the Documents and Pictures folders to automatially sync w/ your OneDrive.

Autosave

You manage a group of 20 Windows workstations that are currently configured as a workgroup. You have been thinking about switching to an Active Directory configuration. Which advantages would there be to switching to Active Directory.

Centralized authentication Centralized configuration control

Several weeks ago, you installed a desktop application on your Windows system. Yesterday, you installed another desktop application on your system that was developed in-house by your organizations application development team/ After doing so, you notice that the first application behaves erratically and frequently locks up. You have opened Control Panel on your Windows system, accessed Programs and Features and selected the application. What should you do?

Click Repair

Several weeks ago, you installed a desktop application on your Windows system using the default parameters suggested by the application installer. However, after using the application for a time, you realize that you need an optional application feature that wasn't included in the default installation. You have opened Control Panel on your Windows system, accessed Programs and Features, and selected the application. What should you do?

Click change.

You are consulting a small startup company that needs to know what kind of windows computer network model they should implement. The company will start small, w/ only 12 employees, but plans to double or triple in size w/in 12 months. The company founders want to make sure they are prepared for growth. Which networking model should they implement?

Client-Server

Which 3 networking models can be used w/ the Windows operating system?

Client-server, Workgroup, Standalone

An employee in your organization has started to work from home 2 days a week. The employee uses a company laptop for work in both the office and at home. The laptop automatically connects to the wireless network in the office, but does not automatically connect to the employee's home wireless network. The employee would like the laptop to connect automatically both at home and at work. What should you do?

Configure an alternate TCP/IP configuration on the laptop's wireless adapter to use a static IP address that is compatible w/ the home network.

You have a Windows system that is shared by multiple users. The computer has a single hard disk w/ a single partition. You want to make sure that each user can only save up to 4GB of files on the existing hard disk. Files stored to USB devices shouldn't count towards the limit. What should you do?

Configure disk quotas.

You have small wireless network w/ 10 client computers configured in a workgroup. You need to secure the wireless network using the most security, w/ the least amount of effort, and w/o replacing any of the existing wireless infrastructure. Which tasks should you perform to secure the network?

Configure each client w/ the same key. Implement WPA2-Personal.

Your company has started the transition to IPv6. You need to configure records on the DNS server so that clients can submit a host name query and receive back an IPv6 address for the specified host. What should you do first?

Create AAAA records.

Your corporate security policy states that a specific connection-oriented application must be blocked from accessing the Internet. You must use Windows Firewall w/ Advanced Security to complete the task. What should you do?

Create an outbound rule blocking the corresponding TCP port on each machine.

You have a computer w/ 3 hard disks. A RAID 0 volume uses space on Disk 1 and Disk 2. A RAID 1 volume uses space on Disk 2 and Disk 3. Last night, Disk 2 failed. Which of the following is true?

Data on the RAID 1 volume is accessible; data on the RAID 0 volume is not.

You manage a large number of workstations that belong to a Windows domain. You want to prevent anyone that might try to gain access to a computer from guessing login information by trying multiple passwords. Which default GPO contains a policy you can enable to guard all computers in the domain against this security breach?

Default Domain Policy

Your company has asked you to look at strategies for migrating from IPv4 to IPv6. Instead of using IPv6 only, you decided that you want to allow hosts to use both IPv4 and IPv6 addresses. Which of the following technologies should you implement to allow hosts to use both IPv4 and IPv6 at the same time?

Dual stack

You have a Windows system that has both wired and wireless network connections. The wired connection is on the internet private network, but the wireless connection is used for public connections. You need to allow help desk users to use Remote Assistance to help you while working on the wired network, but want to block any such access from the wireless network. How can you configure Windows Firewall to allow and deny access as described?

Enable the Remote Assistance exception only on the private profile.

Network Location Awareness

Enables users to assign Windows Firewall settings based on connection profile, such as the public network profile and domain network profile.

Recently, you've been hearing a clicking noise when reading or writing data from the mechanical hard disk. Which is the most likely cause of the clicking?

Failing hard drive

Which of the following is the process of preparing a partition to store date?

Formatting

A user has complained about not being able to remove a program that is no longer needed on a computer. The Programs Features page is not available in the Control Panel. You suspect that a policy is enabled that hides this page from the user. But after opening the Local Group Policy Editor, you see that the policy to hide this page from the user. But after opening the Local Group Policy Edito, you see that the policy is to hide Programs and Features is not configured. You know that other users in this domain can access the Programs and Features page. To determine whether the policy is enabled, where should you look next?

GPOs linked to organizational units that contain this user's object.

Which of the following is a partition format that was created as a replacement for the legacy MBR partition format?

GUID Partition Table (GPT)

• Installed desktop applications on a Windows system that are displayed in Programs and Features typically have associated entries in which Registry key?

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall machine

You are only a standard user on a computer that you use at work. (You are not an administrator.) You connect your Mp3 player to the computer, but the computer is not able to play files from the device. You need to get information from the device to identify the problem. What should you do?

In Control Panel, click Devices and Printers

The audiocard in your Windows system is working, but you learn about an updated driver that adds new features. You download and install the new driver. After you restart and log onto Windows, you can no longer play audio files. Using minimal administrative effort, you need to find a solution so you are able to play audio. What should you do?

In Device Manager, roll back the driver.

You use a Windows computer that is shared by multiple users. The default printer on your computer is a Sharp AL-2040. When you send a print job to the default printer, nothing happens. The other users can send jobs to the same printer w/o any issues. What should you do?

In Devices and Printers, right-click the Sharp AL-2040 icon and click Troubleshoot.

You have been asked to troubleshoot a Windows system that is a member of a workgroup. The director who uses the machine said he is able to install anything he wants and change system settings on demand. He has asked you to figure out why User Account Control (UAC) is not being activated when he performs a sensitive operation, You verify that the director's user account is a standard user and not a member of the local Administrators group. How do you configure UAC so the prompt is activated when he performs a sensitive operation?

In Group Policy, enable the Run all administrators in Admin Approval Mode policy.

You manage a Windows system that shared by multiple users. You want to prevent users from being able to use USB flash storage devices on this computer.

In the Local Group Policy Editor, go to Computer Configuration > Administrative Templates > System and configure Removable Storage Access policies.

You have a Windows system that is accessed by three users. Each user has a folder for storing personal data. Chad copies a file from an optical disc to his folder and recieves an insufficient disk space message. He finds that he cannot even add data to an existing file and save it. Other users do not have the same problem. You notice that the volume has over 20GB of free disk space. You need to let Chad create and edit files. What should you do?

Increase the quota limit.

You want to create a RAID 5 array on an existing Windows system using 3 newly installed SATA disks. When you go to Disk Management, the option to create the RAID 5 array is not available. What should you do?

Install a dedicated RAID controller.

Your computer has a SATA hard disk installed. The computer also has 2 external USB drives connected. You want to create a storage space in the system that uses parity for resiliency. What should you do?

Install or connect another hard disk.

You want to configure a RAID 1 array on an existing Windows system. You install 2 new SATA drives, then use the RAID controller integrated in the motherboard to define a RAID 1 array using the two new drives. When you boot the computer, Windows doesn't show the logical RAID drive. What should you do?

Install the drivers for the RAID controller.

You are configuring a new system and want to use a RAID 0 array for the OS using SATA disks and the RAID functionality built into the motherboard. Which of the following actions will you take as part of the configuration?

Load the RAID drivers during operating system installation.

You are managing a workstation that is not part of the Windows domain. Users on this computer should not be permitted to download applications from the Windows Store. Which administration tool can you use to enable a policy that turns off the Store application for all users on this computer?

Local Group Policy Editor

You have just finished installing a new SATA hard disk in your computer. Now your SATA DVD drive won't work. Which action should you take first?

Make sure that the DVD SATA cable is connected. Make sure that the DVD power cable is connected.

You have just finished upgrading the 250 watt power supply in your desktop computer w/ a 450 watt power supply. You boot the computer, and the BIOS cannot detect one of the hard disk drives in the system. What should you do?

Make sure that the hard disk is connected to the power supply.

You have just finished replacing the power supply in your desktop computer. You boot the system and notice that no hard drives are detected. Which should you do first?

Make sure the power connections on the hard disk are properly plugged in.

Your notebook computer is configured to connect to the wireless network at work using a wireless profile named Company1. The profile is configured to connect using 802.11b. During a recent upgrade, your company has added an 802.11 wireless access point. The access point is configured to support 802.11n using one radio and 802.11b/g w/ the other radio. You create a second profile on your computer for the 802.11n network. You notice that your computer is connection automatically using 802.11lb. You want the computer to connect first using 802.11n and only use 802.11b if 802.11n is unavailable. What should you do?

Move the 802.11n profile up in the list of the preferred networks.

You are configuring a small workgroup. You open System Properties on each computer that will be in the workgroup. Click the System Properties options you can use to configure each computer's workgroup association.

Network ID Change

Your Class C network currently has IP addresses 192.168.1.1 through 192.168.1.254 statically assigned to various workstations and servers using the default Class C subnet mask 255.255.255.0 A new employee has been hired and you need to provision her with a Windows workstation. Which IP address could you assign to this system?

No addresses are available for this system on this network.

Which screen saver option can be used to increase security by requiring the user to enter a password to access the desktop after the screen saver has been activated?

On resume, display logon screen.

Your job requires a considerable amount of travel. While working in your office you use a windows desktop system. While on the road you use a Windows RT Tablet device. While traveling you frequently need to access files stored on the desktop system from your tablet device. Which windows service can you implement to use your tablet to access files stored on the desktop?

OneDrive

You have several personal mobile devices that you use on a daily basis. You want to be able to authenticate to each device the same user account so you can share your personal data and apps regardless of which mobile device you use. Which type of user account must you create?

Online user account

You install a new internal sound card in your Windows system. After rebooting and installing the driver, the device does not appear to be working. You need to view info for the device and perform troubleshooting steps. What should you do first?

Open Device Manager to view the status of the sound card.

Prior to installing some software on your Windows system, you turn off User Account Control (UAC), Reboot the computer, and install the software. You turn back on, but it does not prompt you before performing sensitive actions. You want the protection of UAC, but is not working at all. What should you do?

Reboot the machine

You manage 20 Windows systems in a domain network. You want to prevent the Sales team members from making system changes. Whenever a change is initiated, you want to allow only those who can enter administrator credentials to be able to make the change. What should you do?

Prompt for credentials.

Which RAID level provides increased performance using only 2 disks?

RAID 0

Which of the following RAID levels uses stripping w/o fault tolerance?

RAID 0

Which of the following drive configurations uses striping w/ parity for fault tolerance?

RAID 5

What is an advantage of RAID 5 has over RAID I?

RAID 5 improves performance better than RAID 1.

After upgrading a video driver on a Windows system, the screen becomes unresponsive. You need to get the system working properly w/ the least amount of effort and time. Which of the following options can you use to get your Windows system back to a stable state?

Reboot the computer into Safe Mode and use Device Manager to roll back the driver.

After upgrading a Video driver on a Windows system, the Screen becomes unresponsive. You need to get the system working properly with the least amount of effort and time. Which of the following options can you use to get your Windows system back to a stable state (select two)

Reboot the computer into Safe Mode and use Devicr Manager to roll back the driver. Reboot the computer w/ the Windows installation disk and select Repair your computer to launch the system restore utility.

Which of the following predefined exceptions in Windows Firewall allows users to view and control remote desktops?

Remote Assitance

Site

Represents a group of networks that are connected w/ high speed links.

Subnet

Represents a physical network segment.

You find that you underestimated how much space users would need for their data. The Data (E:) volume is on Disk 1, which still has over 300GB of unallocated space. You want to increase the size of the Data (E:) volume from 10 GB to 120 GB. Wich of the following is a PowerShell cmdlet you can use to perform this task?

Resize-Partition-DriveLetter E-Size 120gb

You have a Windows 10 system w/ several standard users. You want all standard users to be able to install devices and the necessary drivers. Which of the following actions will permit this?

Run pnputil-i-a to add drivers to the driver store. Enable Allow non-administrators to install drivers for these device setup classes on Group Policy.

Two devices connected to your computer are not working properly. You suspect the devices are using the same system resources, creating a conflict. How can you verify whether or not the devices are conflicting w/ each other?

Run system Info (msinfo32) In Device Manager, open the device properties and click the Resources lab.

You just purchased a new Windows 10 system for a graphic artist in your company. After installing a graphic design application on the computer, the artist states that the application does not work correctly. You know the application worked on Windows 7. In an attempt to fix the problem, you tried to run the application in compatibility mode. When this didn't work, you temporarily disabled UAC, but this still didn't fix the problem. Because of this, you decide to create a shim for the application, so you download the Application Compatibility Toolkit (ACT). What should you do next?

Run the Compatibility Administrator.

You have a computer that runs Windows and is connected to a domain network with a DHCP server. One day you find that your computer cannot connect to any network resources. You run the ipconfig command and find that the network connection has been assigned the address of 169.254.12.155 with a mask of 255.255.0.0. What should you do?

Run the ipconfig/release and ipconfig/renew commands.

You are a contract support specialist managing the computers in a small office. You see that all the computers are only using local user accounts. Which of the network models could this office be using?

Stand-Alone Workgroup

You are using a web browser on your Windows notebook to access the http://www.westsim.com website. Your notebook has been configured to use a DNS server that has an IP address of 137.65.1.254 for name resolution. Your notebook sends a name resolution request for www.westsim.com to this DNS server; however, this server isn't authoritative for this domain and doesn't have a record that can be used to resolve this domain name to an IP address. What will happen next?

The DNS server sends a request to a DNS root server for the IP address of a DNS server that is authoritative for the westsim.com domain.

The Hide Programs and Features page setting is configured for a specific user as follows: POLICY SETTING Local Group Policy Enabled Default Domain Policy GPO Not configured GPO linked to the user/s organizational unit Disabled After logging in, the user is able to see the Programs and Features page. Why does this happen?

The GPO linked to the user's organizational unit is applied last, so this setting takes precedence.

While working in Device Manager, you notice the display shown in the Exhibit. What does the icon next to USB Mass Storage Device indicate?

The driver for the device is unavailable.

Forest Root Domain

The first domain created in an Active Directory forest.

Your organization uses an 802.11b wireless network. Recently, other tenants installed the following equipment in your building... -A wireless TV distribution system running at 2.4 GHz -A wireless phone system running at 5.8 GHz -A wireless phone system running at 900 MHz -An 802.11a wireless network running in the 5.725-5.850 GHz frequency rage -An 802.11j wireless network running in the 4.9-5.0 GHz frequency range Since the equipment was installed, your wireless network has been experiencing significant interference. Which system is likely to blame?

The wireless TV system

Your Windows system has an extra disk that has 3 primary partitions and an extended partition w/ 2 logical drives. All volumes are formatted w/ FAT32. You want to convert the partitions to simple volumes w/o losing any data. What should you do?

Upgrade the disk to dynamic disk.

You are about to install a new desktop application that you downloaded from a Website. What should you do before you start the installation?

Verify that the application is compatible w/ the version of Windows you are using Scan the installer for malware Set a restore point

You use a Windows notebook system that is a member of the domain on your network at work. You need to configure the wireless network card in the system to connect to the wireless network at work. The connection should require a user name and password for authentication using AES encryption. Which type of security should you use when configuring the connection?

WPA2-Enterprise

Your user account is ADuser. You want to log in to the corpwest domain from a computer that you haven't used before. You are at the login screen and just below the username and password fields, you see that this computer will try to log in to the corpsouth domain by default. What can you enter in the user name field to change the domain the computer will log onto?

corpwest\ADuser

Which command would you enter at the command prompt to list all third-party drivers on a Windows system?

pnputil-e

You need to find out if there are any device drivers on your system that do not have a digital signature. Which of the following tools should you use?

sigverif.exe


संबंधित स्टडी सेट्स

Foundations Chapter 47 Bowel Elimination

View Set

Topic 5: DISORDERS OF DEGLUTITION, DYSPHAGIA, and GASTROESOPHAEGEAL REFLUX DISEASE

View Set

MA ch 23 vital signs and measurements

View Set