Client Enterprise Midterm Chapters 5, 7, 8, 14
Which of the following simplifies folder and file sharing by controlling both NTFS permissions and share permissions at the same time? A.) Advance Sharing B.) "Share with" Method C.) Single Sharing D.) Public Sharing
"Share with" Method
When a client connects to a RD Web Access server, what type of file is downloaded that includes all of the necessary configuration information for connecting to the desktop of RemoteApp? A.) .rdc file B.) .rda file C.) .rds file D.) .rdp file
.rdp file
You can start Remote Desktop Connection from a command prompt by running mstsc.exe. Which option can be used with this command to prevent Remote Desktop Connection from saving information to the local computer? A.) /shadow B.) /admin C.) /control D.) /public
/admin
After credentials are cached locally, you can sign in to a computer using a domain user account. By default, how many user sign-ins are cached? A.) 5 B.) 10 C.) 25 D.) 50
10
Remote Desktop listens on which TCP port number? A.) 3398 B.) 3938 C.) 3389 D.) 3450
3389
If Windows 10 is configured to use dynamic IP configuration and is unable to contact a DHCP server, the default action is to use which type of address? A.) IPv6 B.) APIPA C.) NetBIOS D.) WINS
APIPA
Which account is the most powerful local user account possible? A.) Guest B.) Initial C.) Administrator D.) Installation
Administrator
An administrator account derives its privileges from being a member of which local group? A.) Administrators B.) Performance Monitor Users C.) Guest D.) Users
Administrators
What is the preferred method to configure clients to use Work Folders? A.) Manually enter the Work Folders URL B.) Configure through the System and Security Applet C.) Automatic Discovery D.) Configure user object in Active Directory
Automatic Discover
What Windows 10 allows you to centralize the administration of printers for remote locations but still keep WAN link utilization low because the print jobs stay local? A.) Windows Connectivity B.) Windows Remote Office C.) Branch Office Direct Printing D.) Windows Printing
Branch Office Direct Printing
Which of the following is an automated mechanism used to assign IP addresses, subnet masks, default gateways, DNS servers, WINS servers, and other IP configuration information to network devices? A.) DHCP B.) IPX C.) AIX D.) X.25
DHCP
Which of the following protocols is used for resolving host names to IP addresses? A.) IPv6 B.) DNS C.) IPv4 D.) TCP/IP
DNS
What type of technology allows users to work with files whether they are connected to network or not by copying files locally to mobile computers? A.) DSL B.) Data Synchronization C.) VPN D.) DirectAccess
Data Synchronization
Which profile is used when new user profiles are created? A.) Mandatory B.) Public C.) Roaming D.) Default
Default
Which of the following is considered the oldest technology for remote access? A.) Virtual Private Network B.) DirectAccess C.) Dial-Up Networking D.) TCP/IP
Dial-Up Networking
What technology behaves like an "always-on" VPN connection? A.) DirectAccess B.) Dial-Up Networking C.) Remote Assistance D.) Remote Desktop
DirectAccess
When Windows 10 can communicate with a domain controller, the network connection is automatically placed in which location category? A.) Domain Network B.) Public Network C.) Home Network D.) Work Network
Domain Network
The Guest account derives all of its privileges from being a member of the Guests group and which other group? A.) Everyone B.) Initial C.) Domain D.) User
Everyone
In Remote Desktop Connection, which tab allows you to enable and disable various display-related settings that can impact the amount of data sent between the local and remote computers? A.) Display Tab B.) Experience Tab C.) General Tab D.) Local Resources Tab
Experience Tab
IKEv2 requires the use of which of authentication protocol? A.) Extensible Authentication Protocol (EAP) B.) Point-to-Point Protocol (PPP) C.) Password Authentication Protocol (PAP) D.) Challenge Handshake Protocol (CHAP)
Extensible Authentication Protocol (EAP)
IPX is the most popular networking protocol in the world today. True or False
False
Layer 2 Tunneling Protocol provides both authentication and data encryption for the VPN client and remote access server. True or False
False
Local user accounts can be used to access resources on other computers in a workgroup or a domain. True or False
False
New in Windows 10 is a virtual printer for PDF documents named Microsoft XPS Document Writer. True or False
False
The Administrator and a user-specified initial account are called built-in accounts because they are created on every Windows 10 computer. True or False
False
The Devices and Printers applet is capable of installing printers on remote computers. True or False
False
The domain network category is used when the computer is connected as part of a peer-to-peer network in a trusted location. True or False
False
Windows 10 includes a Remote Desktop client, but not Remote Desktop Web access. True or False
False
Which Windows 10 feature ensures that a second user can log on to a locked computer without logging off the first user and losing their work? A.) Secure sign-in B.) Fast user switching C.) Windows Welcome D.) Automatic Sign-In
Fast user switching
File Explorer contains ribbon tabs that can be used for various functions. Which ribbon tab provides options to open a new File Explorer window, command prompt, or Windows PowerShell prompt that is focused on the current folder? A.) File B.) View C.) Home D.) Share
File
In addition to defining which locations are indexed, what else are you able to configure to be indexed by Windows 10? A.) Metadata B.) File Types C.) Folders D.) Libraries
File Types
Which PowerShell cmdlet shows the connection status for DirectAccess? A.) Get-DANetworkLocationServer B.) Get-DAEntryPoint C.) Get-DAClientExperience D.) Get-DAConnectionStatus
Get-DAConnectionStatus
For domain-joined computers, what is the simplest way to configure VPN connections? A.) Windows PowerShell B.) CMAK C.) Manually D.) Group Policy Preferences
Group Policy Preferences
Which account has extremely limited access to resources and computer activities and is intended for occasional use by low-security users? A.) User B.) Administrator C.) Root D.) Guest
Guest
File Explorer contains ribbon tabs that can be used for various functions. Which ribbon tab has buttons for manipulating files and folders? A.) File B.) Share C.) View D.) Home
Home
What Windows 10 feature simplifies the configuration of peer-to-peer networks by removing the need to synchronize users and passwords on each computer? A.) HomeGroup B.) Personal User Password C.) Pass-through Authentication D.) Game Control
HomeGroup
An IP address is composed of a network ID and which of the following? A.) Host ID B.) Node ID C.) Type ID D.) Location ID
Host ID
The two most common mechanisms for sharing an IP address are a router or which of the following? A.) DSL B.) IPsec C.) ICS D.) PPPoE
ICS
When a VPN connection loses connectivity due to a network interruption, which protocol can reconnect automatically once network connectivity is restored using a feature known as VPN Reconnect? A.) IKEv2 B.) PPTP C.) SSTP D.) L2TP
IKEv2
In Windows 10, which of the following is updated each time a file is changed to ensure that search results are current? A.) Context B.) Index C.) File D.) Search Box
Index
Windows 10 includes search functionality that can be used to find files and folders. Which of the following is used to increase the efficiency of searching in Windows 10? A.) Context Searching B.) Viewing C.) Profiling D.) Indexing
Indexing
Which Internet Explorer security zone includes all Internet Web sites that are not specifically assigned to another zone? A.) Restricted Sites B.) Internet C.) Trusted Sites D.) Local Intranet
Internet
Which VPN protocol uses IPsec to provide data encryption? A.) L2TP B.) SSTP C.) PPTP D.) PPP
L2TP
Which protocol is responsible for discovering network devices on the network, such as computers and routers? A.) Link-Layer Topology Discovery Mapper I/O Driver B.) IPv6 C.) Link-Layer Topology Discovery Responder D.) IPv4
Link-Layer Topology Discovery Mapper I/O Driver
Which protocol is responsible for responding to discovery requests from other computers? A.) IPv6 B.) Link-Layer Topology Discovery Responder C.) Link-Layer Topology Discovery Mapper I/O Driver D.) IPv4
Link-Layer Topology Discovery Responder
Data sent to which of the following returns to the computer that sent it and does not appear on the actual network? A.) Class D Address B.) Loopback Address C.) MAC Address D.) Multicast Address
Loopback Address
Which of the following is a profile that cannot be modified? A.) Roaming B.) Default C.) Mandatory D.) Public
Mandatory
Characteristics of a file such as file name, creation data, and modified date are known as which of the following? A.) Category B.) Service C.) Metadata D.) Index
Metadata
Which of the following is a new Web browser included with Windows 10? A.) Microsoft Edge B.) Internet Explorer 10 C.) Google Chrome D.) Safari
Microsoft Edge
Which of the following is responsible for enabling communications between Windows 10 and the network device in your computer? A.) Network Driver B.) Socket C.) Network Protocol D.) Kernel
Network Driver
What is used to prevent users to connecting to Remote Desktop until the connection is authenticated? A.) Windows Firewall B.) Remote Desktop Authentication C.) Network Level Authentication D.) IPsec Authentication
Network Level Authentication
As part of DirectAccess configuration, which of the following is also configured? A.) Remote Desktop Server B.) Network Location Server C.) Remote Assistance Server D.) Virtual Private Network Server
Network Location Server
What is the name of the cloud-based storage that is automatically included for free when a Microsoft account is created? A.) Microsoft Cloud B.) Windows Store C.) OneDrive D.) WindowsDrive
OneDrive
DSL connections usually use which protocol in order to secure connections? A.) IPsec B.) PPPoE C.) L2TP D.) IPv6
PPPoE
What is used by Windows 10 to define the layout of content for a print job? A.) Printer Driver B.) Page Description Language C.) Print Server D.) Paper Specification
Page Description Language
Which type of network consists of multiple Windows computers that share information, but no computer on the network serves as an authoritative source of user information? A.) Domain-Based B.) Server-Based C.) Peer-to-Peer D.) Centralized
Peer-to-Peer
Members of which of the following groups are able to monitor performance counters and access performance logs on the computer? A.) Performance Log Users B.) Guests C.) Event Log Readers D.) IIS_IUSRS
Performance Log Users
Members of which group are able to monitor performance counters on the computer, but cannot access performance logs. A.) Event Log Readers B.) Performance Monitor Users C.) Performance Log Users D.) Guests
Performance Monitor Users
Which page description language is the oldest and best supported? A.) XPS B.) PCL C.) Postscript D.) PDF
Postscript
Which printer management tool would you typically use to manage printer servers rather than individual computers? A.) Print Management Snap-In B.) Printers & Scanners C.) Connected Devices D.) Devices and Printers
Print Management Snap-In
Software Windows 10 uses to understand and use the features of a printer is known as which of the following? A.) Shared Printer B.) Print Server C.) Printer Driver D.) Print Firewall
Printer Driver
A new interface for managing printers in Windows 10 is known as which of the following? A.) Printers & Scanners B.) Devices and Printers C.) Print Management Snap-In D.) Connected Devices
Printers & Scanners
Which location type is used when the computer is connected as part of a peer-to-peer network in a trusted location? A.) Private Network B.) Work Network C.) Public Network D.) Domain Network
Private Network
Rules for communicating across a network that define how much data can be sent and the format of that data is known as which of the following? A.) Protocols B.) Network Drives C.) Clients and Services D.) Network Drivers
Protocols
Which profile is different from other profiles because it is not a complete profile? A.) Mandator B.) Public C.) Default D.) Roaming
Public
Which location type is used when the computer is connected in an untrusted public location such as an airport? A.) Public Network B.) Domain Network C.) Home Network D.) Work Network
Public Network
Which Windows 10 service controls the flow of network traffic in Windows 10? A.) Winsock Kernel (WSK) B.) Server Message Block (SMB) C.) QoS Packet Scheduler D.) File and Printer Sharing for Microsoft Networks
QoS Packet Scheduler
Besides access and recovery previous version of a file, which of the following is a function that can only be performed in the OneDrive website and not by the OneDrive client? A.) Reocver Deleted Files B.) Delete Files C.) Rename Files D.) Move Files
Recover Deleted Files
Which of the following allows clients to access resources local to the server as if the client was on the same network as the server? A.) Remote Login B.) Remote Access C.) Remote Control D.) Remote Mange
Remote Access
Which of the following allows a user to send an invitation to a remote user that invites them to remotely connect to the local computer? A.) Remote Desktop B.) Remote Control C.) Remote Assistance D.) Remote Access
Remote Assistance
Which of the following software does the remote client use to send keyboard and mouse commands to the computer being remotely controlled? A.) Remote Access B.) Remote Control C.) Remote Resource D.) Remote Admin
Remote Control
Which profile is stored in a network location rather than on the local hard drive? A.) Roaming B.) Mandatory C.) Default D.) Public
Roaming
Windows Server 2016 can be configured as a remote access server by installing which server role? A.) Routing and Remote Access B.) Network Policy and Access Services C.) Remote Server Administration D.) Remote Assistance
Routing and Remote Access
Each time a user logs on locally, which database is used to verify sign-in credentials? A.) NID B.) SAM C.) SSID D.) SID
SAM
Which of the following is used to protect your computer from malware that may attempt to steal your password? A.) Secure Sign-In B.) Fast User Switching C.) Manual Sign-In D.) Windows Welcome
Secure Sign-In
Which of the following is the name assigned to the WAP to identify itself to clients? A.) netID B.) Access Code C.) Security Key D.) Security Set Identifier
Security Set Identifier
Using Office 365, you can synchronize files from libraries located in which of the following? A.) Remote Assistance B.) Offline Files C.) Windows Store D.) SharePoint Online
SharePoint Online
In order to stop the automatic sign-in from occurring, which key should be held down during the boot process? A.) Esc B.) Shift C.) Alt D.) Ctrl
Shift
Which of the following allows you to begin using an application faster after printing by storing the print job as a file and sending the print job to the printer as a background process? A.) XPS B.) Staging C.) PCL D.) Spooling
Spooling
Which utility should be used to review any synchronization errors that might occur using the Offline files feature in Windows 10? A.) File History B.) Sync Center C.) Work Folders D.) OneDrive
Sync Center
In Windows 10, the only supported method to configure the default profile is to use which utility? A.) Sysprep B.) The User Manager C.) The User Profiles Applet D.) The Account Manager
Sysprep
Which protocol is included with Windows 10 for network communication? A.) IPX B.) AppleTalk C.) NetBEUI D.) TCP/IP
TCP/IP
Which of the following is an updated version of TCP/IPv4 with a larger address space and additional features? A.) LLTPRD B.) AIX C.) LLTP D.) TCP/IPv6
TCP/IPv6
ActiveX controls are not available in Microsoft Edge. True or False
True
DirectAccess relies on IPv6 for connectivity. True or False
True
If a Windows 10 computer has multiple network interfaces active, each can be assigned a different network location, each with different firewall settings based on their assigned network location. True or False
True
In Windows 10, most actions that are triggered by an Administrator do not result in a prompt from User Account Control. True or False
True
Local printing requires that a printer be connected directly to a Windows 10 computer by using a cable. True or False
True
One problem with CHAP is that is easy to obtain credentials during authentication. True or False
True
Public networks allow traveling users to obtain a remote network connection. True or False
True
Secure sign-in increases security on your computer by forcing you to press Ctrl+Alt+Delete before signing in. True or False
True
The option to manage printers in Settings is new for Windows 10. True or False
True
Windows 10 can use a different configuration depending on the network you are connected to. True or False
True
With fast user switching, only one user can be actively using the computer at a time. True or False
True
Which Control Panel applet is considered a simplified interface for user management? A.) Permissions B.) Accounts C.) Privileges D.) User Accounts
User Accounts
Which of the following are required for individuals to log on to Windows 10 and use resources on the computer? A.) User Accounts B.) Public Keys C.) Digital Certificates D.) IP Addresses
User Accounts
Which Microsoft Edge feature allows you to mark up a webpage with your own content? A.) Web Notes B.) Extensions C.) Web Slices D.) Windows Presentations
Web Notes
You can modify the locations included in a library, but the location must be indexed by which of the following? A.) Windows Search B.) Libraries C.) File Explorer D.) Documents
Windows Search
Which utility can be used by a user with administrative rights in order to stage a driver manually? A.) xpsprnt.ext B.) pdriver.exe C.) pinstall.exe D.) pnputil.exe
pnputil.exe
Which IP utility is used to display response times for every router on the path to the destination? A.) ping B.) tracert C.) arp D.) route
tracert