Windows Client Operating Systems Final

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which of the following simplifies folder and file sharing by controlling both NTFS permissions and share permissions at the same time?

"Share with" method

Each Microsoft account is allocated how much storage that can be used for file storage in OneDrive?

5 GB

If Windows 10 is configured to use dynamic IP configuration and is unable to contact a DHCP server, the default action is to use which type of address?

APIPA

Which security process records the occurrence of specific operating system events in the Security log?

Auditing

A policy that allows employees to bring their own computers, smartphones, and tablets to work and use them to access corporate resources

BYOD

To address the risks to data stored on computers and laptops, which encryption technology is available in Windows 10?

BitLocker Drive Encryption

A policy that allows employees to choose a computer, smartphone, or tablet from a corporate-owned pool of devices and use them to access corporate resources.

CYOD

Which registry key contains the default registry settings that are copied for new user profiles

DEFAULT

An always-on replacement for on-demand VPN connections.

DirectAccess

What type of bottleneck occurs when Windows 10 and running applications want to read and write information to the physical disk in the system faster than the disk can manage?

Disk

A feature of Hyper-V that allows the memory allocated to a virtual machine to be increased and decreased based on demand in the virtual machine while it is running.

Dynamic Memory

File Explorer contains ribbon tabs that can be used for various functions. Which ribbon tab provides options to open a new File Explorer window, command prompt, or Windows PowerShell prompt that is focused on the current folder?

File

The local security policy is part of a larger Windows management system known as which of the following?

Group Policy

Which registry area contains details about the current hardware profile in use?

HKEY_CURRENT_CONFIG

The two most common mechanisms for sharing an IP address are a router or which of the following?

ICS

Which protocol is responsible for responding to discovery requests from other computers?

Link-Layer Topology Discovery Responder

A set of best practices, scripts, and tools to help automate the deployment of Windows operating systems.

Microsoft Deployment Toolkit (MDT)

Which of the following is a new Web browser included with Windows 10?

Microsoft Edge

Software and services responsible for provisioning and controlling access to mobile apps that are used in a business environment, on both BYOD and corporate-assigned devices.

Mobile Application Management

Which type of permissions are considered the most basic level of data security in Windows 10?

NTFS

Rules for communicating across a network that define how much data can be sent and the format of that data is known as which of the following?

Protocols

A feature in Windows 10 that allows a helper to connect to a Windows 10 computer and view the screen or remotely control the computer

Remote Assistance

Which of the following allows you to begin using an application faster after printing by storing the print job as a file and sending the print job to the printer as a background process?

Spooling

Which of the following is an updated version of TCP/IPv4 with a larger address space and additional features?

TCP/IPv6

Which of the following terms is used to describe a virtualized environment that hosts Win32 apps on the 64-bit version of Windows 10?

WOW64

Applications designed to interact with which subsystem were the most common type of application in use with earlier operating systems, such as Windows XP?

Win32

Instead of logging performance counters to disk, you can configure which of the following to occur?

alerts

A type of virtual hard disk that tracks changes that would have been made to a parent disk.

differencing disk

What type of encryption algorithm is one-way encryption, which means that it encrypts data, but the data cannot be decrypted?

hash

The registry is divided into sections and levels of data. Multiple sections exist to organize data by purpose. What are these individual sections called?

hives

The software layer that controls access to hardware after virtualization is enabled.

hypervisor

In Windows 10, which of the following is updated each time a file is changed to ensure that search results are current?

index

Account policies settings are located in which of the following?

local security policy

Data sent to which of the following returns to the computer that sent it and does not appear on the actual network?

loopback address

Characteristics of a file such as file name, creation data, and modified date are known as which of the following?

metadata

Software Windows 10 uses to understand and use the features of a printer is known as which of the following?

printer driver

Besides access and recovery previous version of a file, which of the following is a function that can only be performed in the OneDrive website and not by the OneDrive client?

recover deleted files

When applications or Windows 10 starts, they read their configuration information from which of the following?

registry

Which term best describes a snapshot of operating system and program files at a specific point in time that can be restored to roll back to a point in time when the operating system or applications were stable?

restore point

Which of the following is the name assigned to the WAP to identify itself to clients?

security set identifier

Which IP utility is used to display response times for every router on the path to the destination?

tracert

Each Win32 application runs in its own virtual memory space and is executed by the processor in which mode?

user

All of the application environments in Windows 10 restrict apps to running in which of the following modes?

user mode

An encrypted connection from a client to a remote access server over a public network

virtual private network (VPN)

Which Windows 10 feature allows you to create virtual machines with a completely independent operating system that shares the hardware on the computer running Windows 10?

Client Hyper-V

Which processor feature monitors processes to ensure that they do not access unauthorized memory spaces, which is done by various types of malware, such as viruses, to take control of systems?

DEP

A Microsoft tool for synchronizing copies of local identity information into Azure AD. M

DirSync

A server role in Windows Server that includes replication of shared folders and virtualization of paths providing access to the shared folders.

Distributed File System (DFS)

Which utility is used to browse and manage the records of system events and messages stored in system event logs?

Event Viewer

An authentication-only VPN protocol that is combined with IPsec to provide data encryption.

Layer 2 Tunneling Protocol (L2TP)

What is the name of the cloud-based storage that is automatically included for free when a Microsoft account is created?

OneDrive

Which page description language is the oldest and best supported?

Postscript

If File History or Backup and Restore (Windows 7), or both, had been configured to protect user data, that data can be recovered using which feature?

Previous Versions

Selecting a counter to display will display information about that counter's collected data as a chart type. Which chart type displays the current value of each performance counter in decimal format?

Report

Which of the following are used to process log file data and display it in a meaningful way?

Reports

Which protocol is included with Windows 10 for network communication?

TCP/IP

Which part of the motherboard in your computer is used to store encryption keys and certificates?

TPM

Which Windows 10 feature provides an automated diagnosis and repair of boot problems plus a centralized platform for advanced recovery tool?

WinRE

Which of the following uses a USB drive as a memory cache similar to a paging file?

Windows ReadyBoost

Which rule condition identifies software by file location?

path

Which of the following is considered one of the biggest sources of malware (malicious software)?

the Internet

Running apps in which mode ensures that a poorly written app does not affect system stability?

user


संबंधित स्टडी सेट्स

Chapter 21,22 and 24 Test Review

View Set

Life Insurance License Study Set (FULL) Indiana

View Set

ULL FNAN 320 Justin Callais Exam 2

View Set

ENSP Test 3 Review Clemson: Chapter 14

View Set