IT 116

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which location type is used when a computer is connected in an untrusted public location, such as an airport?

A public network.

Which of the following best describes a file format that can be used by the operating system to emulate the function of a hard drive, with all the data and structural elements of a drive?

A virtual hard disk.

If you want to configure authentication to Windows 10 or create and manage local user accounts, which Settings category should you open?

Accounts

You can start Remote Desktop Connection from a command prompt by running mstsc.exe. Which option can be used with this command to allow someone else to control your session if that person is viewing it with you?

/control

After credentials are cached locally, you can sign in to a computer using a domain user account. By default, how many user sign-ins are cached?

10

Xulu Inc. is a software development company with offices in two locations. It is important that its software developers have access to all the shared documents when they travel between the two locations. The company uses two servers for the two locations.Which of the following can be used to ensure the data between the two locations are replicated?

A Distributed File System

What will the Disk Management console report as the status of a disk when it recognizes that the disk does not belong to that computer?

A Foreign Disk

Talal, an IT administrator, sets up a KMS server in his organization to enable KMS activation of Windows 10 licenses. The organization buys 20 new computers with generic volume license keys (GVLK) configured. Two days after the purchase, Talal tries to activate these 20 computers using the KMS server, but the licenses are not activated.Which of the following is a reason for the activation failure?

A KMS server has a minimum activation threshold of 25 instances for Windows 10.

Which of the following terms is a collection of computers and users that are identified by a common security database?

A domain

When Windows 10 can communicate with a domain controller, the network connection is automatically placed in which location category?

A domain network.

Jimmy downloaded a game from the Internet and installed it on his Windows 10 system. A couple of days after the installation, his computer's performance degraded drastically. Assuming that the game had slowed it down, he uninstalled the game and used software to get rid of residual files. Despite this, his computer's performance did not improve. Inspecting the Resource Monitor revealed that the Memory and CPU were running close to 100% capacity. He suspects that the computer is infected with malware. Which of the following scans would you recommend to Jimmy?

A full scan

What type of bottleneck occurs when the applications you are running require more memory than is physically available on the computer?

A memory bottleneck

Which of the following expands on the domain concept by combining domains in logical structures named trees and multiple trees into forests?

Active Directory

Ahva, a graphic designer, uses a Windows 10 PC. Her PC recently crashed, so she wants to use the Reset this PC option to recover her PC.Which of the following items will Ahva be unable to restore with the Reset this PC option?

Apps that she installed on the PC after purchasing it

Athena, a graphic designer, uses OneDrive to back up her work files across her home laptop and office laptop. One day, after completing her work in office, she backs up 5 GB of files to OneDrive. After she gets back home, she realizes that she forgot to send an email. The broadband network is down, so Athena tethers her laptop through her mobile to access the Internet. OneDrive begins downloading changes, and her data plan of 2 GB is exhausted quickly. She did not intend for OneDrive to download these files.What option should Athena have enabled to prevent this from happening?

Automatically pause sync when this device is on a metered network.

Members of which of the following groups can back up and restore all files and folders on the computer?

Backup Operators

Brian uses OneDrive to back up important files on his computer to the cloud. Recently, he made some changes to a document that need to be reverted. He wants to revert his entire OneDrive to its state as it was 15 days ago.Which of the following, if true, guarantees that Brian can complete this task successfully?

Brian has a paid version of Office 365.

A print server needs to be restarted to rectify an issue. However, you need to ensure that the print jobs running on printers connected to this server are not affected. Which of the following options should you use?

Bulk printer management

How can MSI-based apps requiring user input be deployed through Group Policy?

By repackaging the app with the necessary input information

Your organization has purchased a new printer. As the systems administrator, you need to ensure that the appropriate driver is automatically loaded whenever a Windows 10 computer in the organization is attached to the printer. However, the registry keys in the computers should not be modified. How will you do this?

By staging the driver in the driver store.

Yunha and Zachariah are discussing the authentication protocol that they should be using in their VPN settings. Yunha says that they should be using CHAP, but Zachariah disagrees.Which of the following is a possible reason for Zachariah's disagreement?

CHAP has serious security flaws that make it easy to obtain the credentials.

Geeta downloads a free music player and installs it on her computer. The computer runs on a Windows 10 operating system. When she tries to play a song on her computer, the audio file opens in the audio player that comes with Windows 10 instead of the new music player. What should Geeta have done to avoid this issue?

Change the default apps settings.

Your organization is transitioning to a cloud-based infrastructure. However, several of its services rely on the use of an on-premise Active Directory. Since you are a network administrator, the management has reached out to you to provide a suitable transition plan that would least affect the day-to-day operations of the company.Which of the following suggestions would you provide?

Configure Windows as hybrid Azure AD-joined.

You decide to automate VPN deployment in your organization. You want to create an executable file that users can click on whenever they want to create a VPN connection. Which of the following deployment methods should you use?

Connection Manager Administration Kit

Which of the following is a limited and non-graphical version of Windows 10 that can be used for installing, troubleshooting, and repairing Windows 10?

Correct Windows PE

Jin is performing an unattended installation of Windows 10 on 40 computers. The computers need to be configured differently depending on the users who will be using these systems. Certain users will need access to specific drivers and hardware, while others may need access to different sets of hardware and drivers.Which of the following would help Jin in this scenario?

Creating a catalog file

When file shares between two servers are cloned, which of the following synchronizes the data among the file shares?

DFS namespaces

Which of the following is an automated mechanism used to assign IP addresses, subnet masks, default gateways, DNS servers, WINS servers, and other IP configuration information to network devices?

DHCP

Which of the following is a cloud-based solution to compatibility issues?

Desktop Analytics

Which of the following terms is used to describe a virtualized environment that hosts Win32 apps on the 64-bit version of Windows 10?

Desktop Analytics

During the installation process for a new device, what are used in order to control how the device driver software is installed?

Device setup classes

Identify the hive registry that contains the global settings of an entire computer.

HKEY_LOCAL_MACHINE

What type of encryption algorithm is one-way encryption, which means that it encrypts data, but the data cannot be decrypted?

Hashing

Jack is looking to buy a new computer and asks his friend Antonio, a software developer, for advice. Jack wants to know if the choice of operating system will impact the applications he uses or whether he can ignore this aspect and focus on the other specifications.How should Antonio respond?

Different operating systems use different application programmer interfaces, so an application written for one operating system will not run on another operating system.

Which of the following installation methods requires computers to be booted into Windows PE from removable storage and then run the Windows 10 installation from a server?

Distribution share

Which of the following actions will you perform on the Windows sign-in screen if your organization uses a virtual smart card for authentication?

Enter a PIN on the sign-in screen.

Which tool in Administrative Tools should you open if you want to view messages to troubleshoot errors?

Event Viewer

The Guest account derives all of its privileges from being a member of the Guests group and which other group?

Everyone.

Which of the following is a biometric authentication method supported by Windows Hello?

Facial recognition

In File Explorer, which ribbon tab provides options to open a new File Explorer window, command prompt, or Windows PowerShell prompt that is focused on the current folder?

File

Nafisa, a scientific research associate, works on sensitive data on her laptop. To protect the data, sensitive information on her laptop is encrypted. She is unable to use Windows search to look for information in these files. Which of the following Advanced Options in Indexing Options contains a resolution to this issue?

File Settings

Which of the following is a feature integrated with Active Directory and can be used to centrally manage the configuration of Windows 10 computers?

Group Policy

ShopKart is an e-commerce company with a small office for its developers. The company stores file backups in a cloud server and provides the employees in the IT department access to file shares via drive mapping.Which of the following has the company used to configure the computers used by developers?

Group Policy Preferences

Josh is a blogger who reviews legacy technologies. He has to review two DOS apps. He has a computer that runs on the 32-bit version of Windows 10 and a laptop that runs on the 64-bit version. Which system should he use for his review, and why?

He should use the 32-bit one because it supports Ntvdm.exe.

Windows 10 includes a search functionality that can be used to find files and folders. Which of the following is used to increase the efficiency of searching in Windows 10?

Indexing

Millie works as a network administrator in a multinational company. She configures security rules that use IPSec to authenticate the communication between computers connected in the company's network. She configures the firewall such that outbound connections are allowed only with those computers that can be authenticated. Which of the following rule types has she used?

Isolation

In the context of management features included in Windows 10, which of the following statements is true of Active Directory?

It allows administrators to control authentication to Windows 10 clients without manually configuring user accounts.

Which of the following statements is not true of the Administrator account?

It can be renamed.

Some options in the User Accounts applet has a shield displayed beside them. What does this indicate?

It indicates that those options are restricted to administrative users..

Which of the following definitions best describe a snap-in?

It is a component that adds control mechanisms to the MMC console for a specific service or object.

Which of the following allows you to configure the security settings for each location type differently?

Network location awareness.

Ksenia is using the DVD boot installation method to install Windows 10 on her computer. She realizes that she needs to install additional drivers during the installation of the operating system. How can Ksenia achieve this?

Ksenia can use a USB storage device to load and install these additional drivers.

After returning from a vacation, Yunha transferred some photos from her smartphone to a folder on her laptop. She uses the Share tab in File Explorer to share this folder with her friend Kseniia. Which of the following is true of this scenario?

Kseniia will receive a copy of the folder's contents rather than the original folder itself.

Which VPN protocol uses IPSec to provide data encryption?

L2TP

Which protocol is responsible for discovering network devices on the network, such as computers and routers?

Link-Layer Topology Discovery Mapper I/O Driver

Account Policies settings are located in which of the following?

Local Security Policy

Data sent to which of the following returns to the computer that sent it and does not appear on the actual network?

Loopback address.

Your organization has configured a Windows 10 computer in the reception area that guests can use. The computer has minimum functionalities for Guests. However, when a user with administrative privileges signs in to the computer, all the functionalities of a typical Windows 10 computer are unlocked.Which of the following statements is true?

Multiple local policies have been applied to the computer.

Daniel uses OneDrive to back up the data from his laptop on the cloud. He considers this to be a safe measure to create backups of important data. He is considering using OneDrive to back up data from his phone whenever he connects his phone to the laptop.What data from his phone can OneDrive back up automatically when he connects it to the laptop?

Pictures and videos

Which advanced audit policy setting tracks when tasks are performed that require a user-rights assignment, such as changing the system time?

Privilege Use.

An application on Welma's computer crashes whenever she tries to save a file that she is working on. To help resolve the issue over the Internet, she contacts Ezekiel from the tech support team. After signing in using his Microsoft Azure AD account, he receives a security code that he sends across to Welma. Welma uses this code to grant Ezekiel access to her computer. Which of the following remote assistance tools are Ezekiel and Welma most likely using?

Quick Assist

Yunha, a college student, uses a Windows 10 laptop to study and play games. During the past month, Yunha updated the operating system and drivers on his laptop. Some of the games began crashing after these updates.Which of the following tools should Yunha use to identify the underlying issue?

Reliability Monitor

By installing which server role can Windows Server 2019 be configured as a remote access server?

Remote Access

Which of the following installation methods is the least suitable method for a large volume of computers?

Removable media

One of your friends, Steve, wants to rename a local user account using the Computer Management Administrative Tool. He opens the properties window; however, he does not find any option to rename the user account. What should he do instead?

Right-click on the user account to rename it.

Each time a user logs on locally, which database is used to verify sign-in credentials?

SAM

Which of the following keys in the HKEY_LOCAL_MACHINE contains information regarding application data?

SOFTWARE

Wemimo created a Windows 10 image 12 months ago and continued to use the same image for new deployments during this period. All updates to the OS, drivers, and applications were performed on the deployed workstations directly. She now wants to update the image so that it contains the latest updates for future deployments.What is the optimal approach that Wemimo should take in this scenario?

She should apply the image to a computer, make modifications, and capture the image again.

As a freelancer, Manyata developed a traditional Win32 app for a client. The client has come back with a request to make the app compatible with Windows 10 in S mode. How should Manyata address the client's request?

She should repackage the app as an MSIX app.

Ayaka's Windows 10 computer has slowed over time. She wants to enhance the performance of the computer by tuning her system. She begins by choosing to adjust the virtual memory settings in Performance Options. Her computer has two physical disks, and the paging file is currently placed on one of the disks on the same volume as the operating system.Which of the following should Ayaka do?

She should spread the paging file over both disks.

Joanna, a graphic designer at ChromaStage, has an application installed on her UAC-enabled Windows 10 system that was designed for an older version of Windows. Some of the application's features require administrative privileges. When she tries running the application, the application fails to run and generates an error instead. If Joanna's account already has administrative privileges, what can she do to resolve this issue?

She should use the Application Compatibility Toolkit to resolve the issue.

Sasha, a systems administrator, configures Michelle's computer to enable offline domain join because she was not able to connect to Active Directory and her computer was unable to contact the domain controller. However, Michelle is still not able to connect to the domain.Which of the following, if true, is likely to be the cause of the problem?

She used her domain account to sign in to her Windows 10 computer.

Laila is editing an image on her laptop using an image processing application. The application freezes frequently. When she contacts customer support, she is request for a screenshot of the frozen application to create a support ticket.Which of the following shortcuts can Laila use to take a screenshot of only the frozen application?

Shift+Print Screen

Nanxi wants to create a share on her computer. She decides to use the Create A Shared Folder Wizard to accomplish this task. Which of the following tools will launch this wizard?

Shrpubw

Which of the following is true of desktop backgrounds?

Standardized desktop backgrounds have no impact on computer performance.

Which Windows 10 feature captures a screenshot each time the user clicks a screen item and saves the screenshots and user actions in a report that can be sent via email or saved to a shared storage location?

Steps Recorder

Which feature of NTFS allows a file or folder to point to another file or folder located somewhere else in the file system?

Symbolic links

The general settings for notifications, power, storage, and display are found in which category of the Settings tool?

System

Which part of the motherboard in your computer is used to store encryption keys and certificates?

TPM

Odilon installs a VPN application on his Windows 10 computer. The application is configured by default to start automatically. This is impacting the boot time on his computer, so he wants to disable automatic startup. The application does not have a setting to disable this, and Odilon is unsure of the mechanism used by the application to start automatically. Which of the following tools can Odilon use to prevent the VPN application from automatically starting?

Task Manager

Which tab in Remote Desktop Connection allows you to configure server authentication settings and Remote Desktop Gateway (RD Gateway) settings?

The Advanced tab

Winona has set up AppLocker rules to protect computers on the company network from being infected by malware. Despite this, one of the computers is infected by malware. She identifies that the malware infected the computer when a user ran a malicious .exe file.Which of the following prevented the AppLocker rules from being evaluated?

The Application Identity service is configured for Manual startup.

In Remote Desktop Connection, which tab allows you to enable and disable various display-related settings that can impact the amount of data sent between the local and remote computers?

The Experience tab

Lorena has multiple windows open on her desktop. She wants to minimize all the windows except the currently active window.Which of the following features of Windows 10 should Lorena use?

The Shake feature

Nicole decides to use the DISM utility to create an image of a Windows 10 system for deployment. She creates the image in the VHD file format. Which of the following is true of this scenario?

The VDH file can be used to boot a virtual machine with Hyper-V.

Gerrit installs Windows 10 Home edition on his personal computer. Previously, his computer was running Windows 8.1. After installing Windows 10, Gerrit attempts to run one of the applications that was previously installed on the Windows 8 system.If the application fails to run, which of the following is the most likely reason?

The application is not compatible with Windows 10.

Samir is using an external hard disk with File History to back up files from his laptop. He needs to detach the hard disk for another task, so he configures an external SSD to be used with File History.Which of the following is most likely to occur in this scenario?

The backed-up data on the hard disk will not be deleted.

Chieh wants to implement DirectAccess to allow clients to automatically connect to VPN. An alternative option is Always On VPN, but she decides against using it. Which of the following justifies Chieh's decision?

The clients have Windows 8.1 installed.

What does a yellow exclamation mark against a hardware component indicate in Device Manager?

The component is not functioning properly.

Martha sets up a local peer-to-peer network at her home office. She has five Windows 10 computers connected to the network. The computers were not able to access the Internet. Upon troubleshooting, she noticed that the packets sent from the computers were blocked by an IPv6-aware router; however, she was able to send ping requests from one computer to another. Identify the issue with the network configuration.

The computers were assigned link-local unicast addresses.

Oluseyi receives a link to a free download of a premium application in his email. He clicks the link and the application downloads. Before installing it, he wants to verify the authenticity of the download. He verifies the MD5 value of the downloaded application against the MD5 value listed for the application on the original website. The MD5 values do not match. Which of the following is true in this scenario?

The downloaded application has been modified from its original and authentic version.

Chao is creating a provisioning package. When given the option to encrypt the package, he considers proceeding with encryption. However, his colleague advises against encryption mentioning that it would make the package more difficult to deploy. Which of the following justifies the colleague's advice?

The encryption key will be needed to deploy the package.

Vishal is considering switching to BitLocker Drive Encryption because of the inefficiencies of EFS. When he tries to use this encryption feature on Windows 10 Professional, he is unsuccessful. Which of the following is the most likely reason?

The hard drive does not contain a system volume.

Ming is automating VPN deployment in her organization. She decides to use Windows Configuration Designer to enable the VPN deployment. She deploys the VPN connectivity profiles to the client computers as provisioning packages. Which of the following is true of this scenario?

The provisioning packages need to be deployed via Microsoft Intune.

When applications or Windows 10 starts and are running, they read their configuration information from which of the following?

The registry

Daniel's friends gifted him a hard drive on his birthday. Daniel connected the hard drive to his laptop. He then used the Initialize-Disk cmdlet to initialize the disk without specifying a partition style. However, Daniel did not notice that the hard drive contained a video of his friends and family wishing him on his birthday. Which of the following is most likely to occur in this scenario?

The video on the disk will be deleted.

Nikita downloaded software from the Internet and installed it on her computer. She suspects that the software has also installed malware onto her computer. She uses the Autoruns application to look for malware on her computer.Which of the following in Autoruns most likely indicates the presence of malware on her computer?

There is a file in a nonstandard location.

Hannah, a system administrator, wants to use Windows Update for Business in her organization to control updates for Windows 10 systems. While she is able to use Group Policy to apply these settings to most computers, she is unable to apply these settings to some computers. Which of the following is the most likely reason that Hannah is not able to apply the Windows Update for Business settings to these computers?

These computers are running the Windows 10 Home edition.

Until a new disk is initialized, what is its status reported as?

Unknown

Yemi, a software developer, uses a Windows 10 PC at home. She usually runs several resource-intensive applications on her system. Her PC crashed and failed to restart, so she decided to use WinRE to troubleshoot and repair the PC. She has a recovery DVD that she wants to use to perform the recovery. Which of the following options in WinRE should Yemi select?

Use a device

Brian is performing an upgrade of computers in the organization from Windows 8.1 Pro to Windows 10. Along with the OS upgrade, he wants to migrate user profile data. Which of the following ADK tools can Brian use for this purpose?

User State Migration Tool

Running apps in which mode ensures that a poorly written app does not affect system stability?

User mode

Which of the following ways of configuring a wireless network enables users to share the connection settings with Facebook contacts?

Using Wi-Fi Sense

Frida is running out of space on her local hard drive, so she purchases an external hard drive. However, she wants to preserve the structure of the folders on the old drive. She needs to integrate the new drive in a way that it she can store data on it while appearing to access it via folders on the old drive. Which of the following can Frida use in this scenario?

Volume mount points

Which NTFS feature allows you to link an empty folder in one volume to another volume?

Volume mount points

Which of the following downloads updates from Microsoft Update and stores them in a local datastore, rather than each client computer downloading updates individually?

WSUS

When is a domain user account required for a scheduled task?

When the task needs to access network resources.

Mika is on a flight to visit her parents. Before the takeoff, she is instructed to turn off her devices or put them in Airplane mode. After she gets off the flight and enters the airport, she notices that her Windows 10 laptop does not detect the public network.What do you think is preventing the laptop from connecting to the network?

Wi-Fi and Bluetooth are disabled on the laptop.

Nanxi is using an application that allows her to text her phone contacts from her laptop. She wants to display an emoji in one of her text messages. The physical keyboard does not have any emoji options.Which of the following shortcuts can Nanxi use to display the emoji keyboard?

Win+

Trang wants to upgrade her personal computer to Windows 10 Pro. Trang completes the upgrade without doing an installation from DVD and only by entering the Windows 10 Pro product key.From which of the operating systems did Trang upgrade to Windows 10 Pro?

Windows 10 Home

Hung, a travel blogger, documents his travels across the world on his blog. On a trekking vacation in Europe, his Windows 10 laptop falls out of his backpack and breaks, so he buys a new laptop with Windows 10 preinstalled on it. When he tries to play a movie from his hard disk, the movie file does not open. He notices that the laptop does not have Windows Media Player. He's able to play the file after downloading and installing the Media Feature Pack from Microsoft.Which of the following editions of Windows 10 is most likely installed on this new laptop?

Windows 10 Home N

Leo, an engineer at a construction firm, installs Windows 10 Home on a new laptop. He wants to connect 4 physical processors to the laptop to meet the high-speed processing requirements of his work. However, when he tries to connect the processors, his operating system does not support all the processors.Which of the following is the most likely reason that the operating system does not support the additional processors?

Windows 10 Home provides for only 1 physical processor.

Which of the following allows only apps from the Microsoft Store to be installed and run?

Windows 10 in S mode

What is used to perform tests on the physical memory of a computer running Windows 10?

Windows Memory Diagnostics Tool

Which Advanced startup option in recovery settings is a small instance of Windows 10 that includes several options for troubleshooting and repairing Windows 10?

Windows Recovery Environment (WinRE)

After a customized image is created, which of the following is used to place the image on a distribution share?

Windows SIM

Marques wants to create a new partition on a hard disk using the DiskPart utility. He is unsure about the correct command to be used in this scenario. He knows that it is either CREATE or FORMAT. Which of the following commands should Marques type into the DiskPart command prompt?

help CREATE

Which of the following configuration passes is applied during the portion of the installation where users are asked for information after the second reboot?

oobeSystem

Which type of network consists of multiple Windows computers that share information, but no computer on the network serves as an authoritative source of user information?

peer-to-peer

Which utility can be used by a user with administrative rights in order to stage a driver manually?

pnputil.exe


Set pelajaran terkait

Lifespan Development PSY 2314 - Chapter 6

View Set

Research Workshop: Generating Research Questions and Evaluating Sources - The Awakening by Kate Chopin Unit

View Set

Chapter 4 General Mortgage Knowledge

View Set

Psych AP: Sensation+Perception, Hearing, Sight Quiz

View Set

Ethical & Legal Issues in Mental Health Nursing

View Set

Driver Education: Misellaneous Unit 5 Terms

View Set

Commutative and Associative Property

View Set