CTS1104 Practice Final

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

What Group Policy setting causes Windows 8.1 to save copies of files that users access from remote servers on a local drive, regardless of whether they are configured as offline files

Enable Transparent Caching

How often does the Reliability Monitor gather data for the stability index

Every hour

Where are user accounts stored for computers that are in a workgroup

Security Accounts Manager

What do NTFS quotas provide an administrator

The ability to limit the quantity of storage space utilized by users on the volume.

When is Patch Tuesday

The second Tuesday of every month

How does Windows 8.1 transmit display signals to a network projector

Using RDP

What makes connecting to a remote computer by redirecting an existing console an efficient method over time

You can access only one computer at a time.

What is a limitation of dynamic disks

You cannot use dynamic disks on multiboot systems

What Group Policy setting configures the day of the week to stall updates

Configure Automatic Updates

What type of attack is occurring when attackers are replaying data packets on a wireless network

Data tampering

Which of the following is not an item that can be used when building Windows Firewall rules

Packet sequence numbers

Which of the following printer-related terms refers to the actual physical hardware that prints data

Print device

What is the net effect of the following combination of share and NTFS permissions when the share is accessed over the network

Share permission (Share tab)—Sales group: Full Control and NTFS permission (Security tab)—Sales group: Read & Execute, Modify, WriteMembers of the Sales group will be able to edit content and delete files.

Of the listed BitLocker authentication methods, which is considered to be the least secure

Startup key only

By default, eight tiles appear in the Windows Mobility Center. Which of the listed items does not appear by default here

User Accounts

Where in the Control Panel can you find quick access to settings most commonly adjusted by mobile computer users

Windows Mobility Center

What was the first 32-bit version of Windows to support the GPT partitioning style

Windows Vista

Which of the following is not an allowed gesture for a picture password

Arcs

Digital certificates, smart cards, picture passwords, and biometrics are used to perform what action

Authentication

Which of the following items is not found in the Security section of the Windows 8.1 Action Center

Automatic maintenance

What name is given to a set of readings, captured under normal operating conditions, which you can save and compare to readings taken at a later time

Baseline

The Windows Firewall in Windows 8.1 can have rules configured that allows traffic to flow in which direction(s)

Both bound and outbound

What is the first step that you must perform if you wish to give certain users in your organization priority access to a print device so that when a print device is busy, their jobs are processed before those of other users

Create multiple printers.

By default, when will Windows stall software updates

Daily at 3:00 AM

When using the Windows Firewall with Advanced Security console, you will see three distinct network locations that impact the behavior of the Windows Firewall. Which of the following is not one of these network locations used by the Windows Firewall

Default

What Group Policy setting removes or keeps in place the install Updates and Shut Down option when shutting down the system

Do not display stall Updates and Shut Down option in Shut Down Windows dialog box

While a Remote Assistance session is in progress, what keyboard key(s) can the requestor press to terminate the connection

ESC

If you plan to activate Public folder sharing in Windows 8.1, what must be done before you can select the Turn on sharing so anyone with network access can read and write files in the Public folders option on the Advanced sharing settings control panel

Enable Network Discovery.

By default, which accounts are assigned the Print permission

Every account assigned to the "Everyone" special identity

What can the powercfg.exe utility be used to accomplish that can be accomplished in no other way

Export and import power management plans

What requirement must a computer meet in order to support booting from a GPT partitioned disk

Extensible Firmware interface (EFI)-based boot partition

You must deploy at least one or more BranchCache-enabled servers at your ma office to enable BranchCache. Which of the following server types is not an option as a BranchCache-enabled server

FTP servers

Which of the following is not an option on the Second screen menu of Windows 8.1

First screen only

With the Windows UI, what option will you need to select to delete a wireless network profile

Forget this network

A 2x2 MIMO device has how many total transceivers

Four

BitLocker to Go can be used to encrypt removable storage data drives that are formatted with all of the following file systems EXCEPT

GPFS

What PowerShell cmdlet can be used to display the Event Logs

Get-WinEvent

Which power plan is not shown by default in the Power Options control panel

High Performance

For users at home, which file sharing is most likely the simplest to set up and use

Homegroup sharing

The Windows Location Provider uses what to try and determine your geographic location

IP address resolution and Wi-Fi triangulation

When examining effective access, there are three rules that must be understood. Which of the following is not one of these rules

Implicit permissions break permissions inheritance.

Location-aware printing utilizes what two services to determine network formation and the current location of the Windows 8.1 computer

Network Location Awareness service and Network List Service

What Windows 8.1 feature provides a form of fault tolerance that individual users can employ to maintain access to their server files, even in the event of a network service failure

Offline Files

When using distributed-cache mode for BranchCache, where is the cache hosted in the branch office

On Windows 8.1 computers in the branch office

How many bound Remote Desktop connections will Windows 8.1 allow

One

Which of the following items is not supported as a method of authentication in Windows 8.1

One-time passwords

When do data protection technologies such as the Windows 8.1 Encrypting File System (EFS) and BitLocker protect data

Only when the data is stored on a disk

How do you start the process to modify the default homegroup sharing configuration

Select one of your shared libraries in File Explorer and click Share in the toolbar.

You can associate several actions to occur upon a specific event occurring. Which of the listed actions is not one of the available options

Send an SNMP trap

802.11n wireless networking equipment uses two, three, or more different frequencies for transmission and the subsequent receiving of traffic. The sending system splits its data to multiple signals for transmission, and the receiving device reassembles the signals to a single data stream. What is the name of this process

Spatial multiplexing

The original WPA implementation utilized what encryption method

TKIP

Of the listed BitLocker authentication methods, which is considered to be the most secure

TPM only

Why do some snap-s, such as the Active Directory Domain Services consoles, not provide a means to redirect the console to another computer

The console will automatically locate a domain controller.

If the Configure Automatic Updates policy is not enabled and applied to the devices along with other Windows Update settings, what will happen

The devices will not be affected by the policy

If you apply a change to a folder to enable EFS for the folder only, what happens to the files currently in the folder

The files currently in the folder are not encrypted.

Regarding NTFS permissions, when you copy NTFS files or folders from one volume to another, which of the following statements is true

The permissions are not retained, and permissions set at destination are applied.

Regarding NTFS permissions, when you move NTFS files or folders from one volume to another, which of the following statements is true

The permissions are retained if the source and destination are on the same NTFS volume.

In most cases, how is malware introduced to a computer system

Through a deliberate act of the computer's user

Remote Assistance offers several methods to send the invitation for assistance. Which of the following is not one of those options

Use Remote Desktop

Which of the following benefits is not provided when BranchCache is used

Users access data over the faster WAN link.

Why should you not deploy a wireless network using WEP for security

WEP is secure due to very weak cryptographic protocols.

What Windows keyboard combination can you use to project to a second screen

Windows + P

The 802.11n wireless networking protocol specifies what approximate values for door and outdoor range

~70 meters, ~250 meters

What is the name of the feature that enables an administrator, trainer, or technical specialist at one location to connect to a distant user's computer, chat with the user, and either view all the user's activities or take complete control of the system

Remote Assistance

What command can you issue from the command let to view all configured wireless networks on your Windows 8.1 computer

netsh wlan show profiles

How many active partitions can a hard disk hold

1

What is the configurable interval range of the Re-prompt for restart with scheduled installations policy

1-1440 mutes

It is possible to create a share that is visible to users browsing the network simply by appending what character to the end of the share name

$

A Windows Firewall policy file has what file extension

.wfw

What is the default value of the Delay Restart for scheduled installations policy

15 minutes

What is the maximum disk size supported when using GPT partitioning

18 exabytes

Windows 8.1 provides three basic methods for sharing the files and folders on the computer. Which of the listed items is not one of these methods

All folder sharing

When using the iacls.exe utility, what flag (e.g., /

) is used to specify that the command should be executed on all files and subfolders contained in the starting folder location?/T

In order to use BitLocker Drive Encryption, how much free space will be required on your system partition

100 MB

How many primary partitions are supported on a GPT partitioned disk

128

When the Automatic Updates detection frequency policy is left undefined, what is the default interval at which Windows checks for new updates from the configured update server

22 hours

What is the maximum support file name length in the NTFS file system

255 characters

Remote Assistance requires that access to what port be available on the requesting client

3389

When deciding what your auditing policy should be, there are some key things to consider to help you decide which computers, resources, and events you want to audit. Which of the items listed is not one of the items typically considered

Allow users of computers the ability to manage the logs on those computers.

By default, what is the maximum amount of disk space that will be allocated to the BranchCache data cache

5%

What is the recommended maximum partition size for exFAT partitions

512 TB

How many basic and advanced permissions does NTFS provide for assignment to a folder or file

6 basic, 14 advanced

When using BitLocker to Go, which of the following that is typically associated with BitLocker is not required to unlock the drive

A TPM chip

Generally speaking, which of the following password conditions is not considered to be part of a strong password

A predictable password

An access control list (ACL) is a collection of individual permissions, which are called what

Access control entries

For VPN connections involving Windows clients, what is typically the preferred protocol

Layer 2 Tunneling Protocol (L2TP)

What term is given to software that includes viruses, Trojan horses, worms, spyware, and adware

Malware

What type of attack is occurring when attackers gain access to otherwise restricted network resources, using a wireless network

Masquerading

Which of the following statements is true of Public folder sharing

Places all shared files in a single location

On the collector computer, what command will you need to enter from an elevated command prompt to start and autoconfigure the Windows Event Collector Service

wecutil qc


Set pelajaran terkait

Linear Algebra Lecture Questions

View Set

Quiz 4: Hand muscles origin, insertions, actions, innervation

View Set

Origin of Modern Astronomy & Touring Our Solar Systems: Chapter 21, 22

View Set

General anesthetic agents Lecture 4

View Set

Chapter 18: Open-Economy Macroeconomics

View Set