md 100 week 2 quiz and flash and games

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

You are a consultant,and one of the servers is not working properly.How will you connect to the server to fix the problem?

By using Remote Desktop

How do you turn a roaming profile into a mandatory profile?

Change the profile extension to man.

Which Windows 10 tool can be used to view the Resultant Set of Policy(RSoP)to determine what policies will be applied for a user and computer?

Group Policy Result Tool(gpresult)

Which utility in Computer Management is used to create users on a Windows 10 computer?

Local Users and groups

What are the three main areas of configuration in Computer Management?

Services and Applications,System Tools,and Storage

True or false:The Administrator account is disabled by default.

True

True or false: Each user on a Windows 10 computer can have a separate LGPO(Local Group Policy Object).

True. Windows 10 is different from the previous versions of Windows with the addition of MLGPOs (Multiple Local Group Policy Objects), including user- specific LGPOs.

What is the use of UAC (User Account Control)?

UAC prompts the user if an action requires privilege elevation, which helps prevent malicious code from automatically running on the computer.

You have to make sure that access to a folder is logged. What type of auditing should you configure?

audit object access

Which user profile ensures that your personal preferences are used whenever you log on to a local Windows 10 system?

local profile

The _________ utility can be used to configure a user account to use a roaming profile.

local users and groups

A ____________ is a type of profile that requires a user to use a specific profile.

mandatory profile

Who can manage mandatory profiles on Windows 10 computers? The user who uses the profile Server operators Power users Administrators

Answer D is correct. The Administrators group can manage mandatory profiles.These profiles can't be modified by the user.You can create mandatory profiles for a single user or a group of users.You might consider creating mandatory profiles for users who should maintain consistent Desktops. Answers A,B,and C are incorrect because mandatory profiles can only be modified by the members of the Administrators group.

You have an application called App.exe that everyone on a Windows 10 computer can use except for the Sales group.How will you stop the Sales group from accessing this application?

Create an executable rule from the Application Control Policy.

You have a Windows 10 computer that is located in an unsecured area. You want to track usage of the computer by recording user logon and logoff events. To do this,which of the following auditing policies must be enabled? Audit Account Logon Events Audit Account Management Audit Process Tracking Audit System Events

Explanation Answer A is correct. The Audit Account Logon Events policy tracks when a user logs on, logs off, or makes a network connection. You can configure auditing for success or failure, and audited events can be tracked through the Event Viewer.

Which utility is used to upgrade a FAT32 partition to NTFS? Convert Device Manager Printbrm.exe Sigverif.exe

Explanation Answer A is correct. The Convert utility is used to convert a FAT32 partition to NTFS. Answer B is incorrect. The Device Manager utility allows you to configure the different devices on your Windows 10 machine. Answer C is incorrect. The Printbrm. exe utility is used to manage printers and print servers. Answer D is incorrect. The Sigverif. exe utility verifies whether the drivers are digitally signed on the machines.

You are the network administrator for a large organization. You have a user who needs you to connect and help him with a Windows 10 issue. You want to use Remote Assistance for the connection. Which of the following allows you to easily set up a Remote Assistance session? Easy Connect Quick Connect User Connect Fast Connect

Explanation Answer A is correct. The Easy Connect method allows you to easily set up a Remote Assistance session for getting remote assistance. Easy Connect uses Peer Name Resolution Protocol (PNRP) to set up a direct peer-to-peer transfer using a central machine on the Internet to establish the connection. Answers B, C, and D are incorrect because no such methods to set up a Remote Assistance exist.

Tom works as a database consultant for a midsized company. He has been assigned a task for which he needs to run an application that requires administrative privileges to run correctly. However, Tom doesn't have administrative rights. Which of the following features of Windows 10 allows Tom to accomplish his task? Registry and File Virtualization Multi-factor authentication Universal Extensible Firmware Interface Secure Boot Easy Connect

Explanation Answer A is correct. The Registry and File Virtualization feature allows Tom to accomplish his task. This Windows 10 feature allows non-administrator users to run applications that previously required administrative privileges to run correctly. For non-administrator users, Windows 10 redirects any attempts to write to protected locations to a per-user location. By doing so, Windows 10 allows users to use the application successfully while it protects critical areas of the system. Answer B is incorrect. Multi-factor authentication allows a user to increase the security of many critical functions of your company, including client authentication, interactive logon, and document signing. Answer C is incorrect. Universal Extensible Firmware Interface Secure Boot protects the system from hacks during the boot process and also from malicious firmware installations. Answer D is incorrect. Easy Connect is a technology integrated with Remote Assistance, and it's a method to get Remote Assistance that is integrated with Windows 10.

Dan has decided to use a Windows 10 system to store some local folders for network access. The folder will be located on an NTFS partition. Dan has assigned both NTFS permissions and share permissions. Which of the following is true on how share permissions and NTFS permissions work together on the same folder? The system will look at both the share permissions and the NTFS permissions and whichever set is more restrictive will be applied to the folder. Neither. When Windows 10 sets permissions, it does it through servers only. The share permissions will always take precedence. The NTFS permissions will always take precedence.

Explanation Answer A is correct. When both NTFS and share permissions have been applied, the system looks at the effective rights for NTFS and share permissions and then applies the most restrictive of the cumulative permissions. If a resource has been shared, and you access it from the local computer where the resource resides, then you will be governed only by the NTFS permissions.

You work as an IT administrator for Stormwind. You need to configure a Denied list and an Accepted list for applications. Which of the following Local Security Policies will you use to accomplish this? Application Control Policies Local Policies Account Policies Software Restriction Policies

Explanation Answer A is correct. You can use Application Control Policies to set up AppLocker which can be used to configure a Denied list and an Accepted list for applications. Applications that are configured on the Denied list will not run on the system, and applications on the Accepted list will operate properly. Answer C is incorrect. Account Policies are used to configure password and account lockout features. Answer D is incorrect. Software Restriction Policies contain settings used to identify malicious software and control that software's ability to run on the Windows 10 machine. Answer B is incorrect. Local Policies are used to configure auditing, user rights, and security options.

Your network contains an Active Directory domain. You need to ensure that third-party devices can access domain resources on the Internet. Which of the following Windows tools can you use to accomplish this? Workplace Join Remote Desktop Resultant Set of Policy Transparent caching

Explanation Answer A is correct. You can use Workplace Join to ensure that third-party devices can access domain resources on the Internet.Workplace Join allows an end-user to use a corporate email address and password to connect a Windows system (Windows phone, tablet, or operating system) to a domain. Answer B is incorrect. A Remote Desktop is a tool that enables you to control a remote computer's keyboard, video, and mouse. Answer C is incorrect. Resultant Set of Policy helps Windows 10 to determine what group policies will be applied when a user logs on to a computer or domain. Answer D is incorrect. Transparent caching is a feature that reduces the time required to access files for the second and subsequent times across a slow network.

You are setting up a machine for a home user who doesn't know much about computers. You don't want to make the user a local administrator, but you do want to give this user the right to change Windows Updates manually. How can you configure this? Modify the LGPO for Windows Update to allow the user to make changes manualy. Explain to the user how to log on as the Administrator account. Set Windows Update modifications to anyone. This can't be done. Only administrators can change Windows Update.

Explanation Answer A is correct. You don't want the home user to have any administrator rights. To allow this user to change Windows Update manually, you must set this in an LGPO (Local Group Policy Object).

You are a consultant for a large organization. Some employees contact you late at night and state that one of the servers is not working properly. No one is in the office to fix the problem. How can you connect to the server to fix the problem? Using Remote Desktop Using Computer Management Using Remote Assistance Using Hyper-V

Explanation Answer A is correct. You will use Remote Desktop to connect to the server and take over the session. It is a tool that allows you to take control of a remote computer's keyboard, video, and mouse. This tool does not require someone collaborating with you on the remote computer. Remote Desktop is used to access remote rnachines' applications and troubleshoot issues as well as meet end-user needs where you want complete control of the remote machine. Answer B is incorrect because Computer Management can only be used for accessing local users and groups. Answer C is incorrect because Remote Assistance requires that a user invite you to the connection. Answer D is incorrect because Hyper-V lets you run multiple operating systems as virtual machines on Windows.

You work as a network administrator for a small company. You are asked by your manager to ensure that the technical requirements for EFS (Encrypting File System) on Computerl are met. Which of the following commands will you use to accomplish this? Cipher.exe Certutil.exe Wbadmin.exe Sigverif.exe

Explanation Answer A is correct. You will use the Cipher exe command to accomplish this. To do this, you need to run the Cipher . exe command with elevated rights and create a certificate to the local computer certificate store. Answer B is incorrect. The Certutit . exe is a command-line program installed as a part of Certificate Services. Sigverif . exe command runs a check against all the drivers and notifies you of any unsigned drivers. Answer D is incorrect. The Answer C is incorrect. The Wbadmin .exe command allows you to back up and restore your operating systems, volumes, files, and applications.

Your company, StormWind, requires that you implement security, and you have been asked to define and implement a security policy. You have to specify how long a password must be kept before it can be changed. Which of the following password policies will you use to accomplish this? Minimum Password Age Enforce Password History Maximum Password Age Passwords Must Meet Complexity Requirements

Explanation Answer A is correct. You will use the Minimum Password Age policy. It specifies how long a password must be kept before it can be changed. Answer B is incorrect. The Enforce Password History policy allows the system to keep track of a user's password history for up to 24 passwords. This prevents a user from using the same password over and over again. Answer C is incorrect. The Maximum Password Age policy determines the maximum number of days a user can keep a valid password. Answer D is incorrect. The Passwords Must Meet Complexity Requirements require that passwords meet minimum levels of complexity.

If you require that a user has to enter an administrator password to perform administrative tasks, what type of user account should you create for the user? Standard user account Power user account Authenticated user account Administrator user account

Explanation Answer A is correct. You would create the standard user account for the user. Standard users must provide the credentials of an administrator account when prompted by User Account Control (UAC) to perform administrative tasks. Answer D is incorrect because the administrator user account has unrestricted access to perform administrative tasks. Answer B is incorrect because the power user account has limited administrative rights. Answer C is incorrect because the authenticated user account includes any user who can log on to the computer using his credentials.

You are the administrator in charge of a computer that runs both Windows 7 and Windows 10. Windows 10 is installed on a different partition from Windows 7. You have to ensure that the computer always starts Windows 7 by default. What action should you perform? Run bcdedit.exe with the 'import parameter. Run bcdedit.exe with the 'default parameter. Run bcdedit.exe with the 'set parameter. Run bcdedit.exe with the 'createstore parameter.

Explanation Answer B is correct. The Boot Configuration Data (BCD) store contains boot information parameters that were previously found in boot . ini in older versions of Windows. To edit the boot options in the BCD store, use the bcdedit utility, which can be launched only from a command prompt. The /defautt parameter specifies which operating system will start when the time-out expires. Answer C is incorrect because the /set parameter allows you to set an entry option value. Answer D is incorrect because the /createstore parameter creates a new empty Boot Configuration Data store. / import parameter restores the system store by using the data file previously generated by using Answer A is incorrect because the the /export option.

You work as a system administrator for a midsize organization. Recently, some systems of your company had fallen a victim to a boot attack Although you have managed to recover the systems, you want to prevent further attacks at the system startup. Which of the following security features will help you to accomplish this? VBS(Virtualization-Based Security) UEFI (Universal Extensible Firmware Interface) Account Lockout Policy Application Control Policy

Explanation Answer B is correct. The UEFI security feature will help you to protect against attacks at the system startup. This feature protects the system from hacks during the boot process and also from malicious firmware installations. Answer A is incorrect.VBS protects against credential theft attack techniques that are used in most credential attacks. Answer C is incorrect. Account Lockout Policy is used to specify options that prevent a user from attempting multiple failed logon attempts. Answer D is incorrect. Application Control Policy allows you to set up AppLocker. You can use AppLocker to configure a Denied list and an Accepted list for applications.

Tom works as a network consultant for a midsize company. He has been configured as a Helper for users in the enterprise (by domain or OU). One of the users contacts him and invites him for help through Remote Assistance. Which of the following commands will Tom use to accomplish the task? tpmvscmgr.exe msra /offerra wuapp.exe msra /offerr .

Explanation Answer B is correct. Tom will use the msra /offerra command to accomplish the task. Once configured as a Helper, the expert can initiate a Remote Assistance session by issuing the command msra /offerra. This will bring up the Who Do You Want To Help Remote Assistance screen. Answer A is incorrect . The tpmvscmgr . exe command-line tool allows users with administrative credentials to create and delete TPM virtual smart cards on a computer. Answer C is incorrect The wuapp . exe command is used to start Windows Update from a command prompt. Answer D is incorrect. No such command as msra /offerr exists

You are the administrator for StormWind Studios. You want to configure some Local Group Policy Objects(LGPOs)on your Windows 10 machines. Which of the following is not configurable through an LGPO on Windows 10? Administrative templates Folder redirection Internet Explorer settings Windows Update settings

Explanation Answer B is correct. Windows 10 LGPOs allow you to configure all of the above except for Folder redirection. A server-based Group Policy Object(GPO)is used to configure Folder redirection.

You want Windows 10 to be the primary operating system on a dual-boot machine. Which command-line utility will you use to accomplish this? boot.ini bcdboot bcboot.ini bcdedit

Explanation Answer D is correct. bcdedit utility to configure your boot order. You can also type bcdedit/? to see all the different bcdedit You should use the commands. Answer A is incorrect because boot . ini is not a command-line utility, it is a file that was used to store boot information parameters in older versions of Windows. Answer C is incorrect because bcboot.ini is not an internal or external Windows command. Answer B is incorrect because the bcdboot command is used to configure the boot files on a PC.

You are the administrator for a large organization with multiple Windows Server 2016 domain controllers and multiple domains. You have a Windows 10 machine that is set up for all users to access. You have an application called StormApp.exe that everyone on this Windows 10 computer can use except for the Sales group. How do you stop the Sales group from accessing this one application? Deny the Everyone group the rights to the application. Create an executable rule from the Application Control Policy. Configure the IP Security Policies on Local Computer. Allow the Everyone group the rights to the application.

Explanation Answer B is correct. You can stop the Sales group from accessing this one application by creating an executable rule from the Application Control Policy. Application Control Policy (AppLocker) allows you to configure a Denied list and an Accepted list for applications or users. Applications that are configured on the Denied list will not run on the system or cannot be run by specific groups, and applications on the Accepted list will operate properly. Answer A is incorrect because if you deny the Everyone group the rights to the application, no one will be able to access the application. Answer C is incorrect because IPsec allows you to secure data packets at the IP level. Answer D is incorrect because if you allow the Everyone group the rights to the application, everyone will be able to access the application including the Sales group.

Your network's security has been breached. You are trying to redefine security so that a user can't repeatedly attempt user logon with different passwords. To accomplish this, which of the following items in the Local Security Policy box should you define? Password Policy Account Lockout Policy Audit Policy Public Key Policy

Explanation Answer B is correct. You should define the Account Lockout Policy, a subset of Account Policies. It is used to specify options that prevent a user from attempting multiple failed logon attempts. If the Account Lockout Threshold value is exceeded, the account will be locked. The account can be reset based on a specified amount of time or through administrator intervention. Answer A is incorrect. A password policy is a set of rules designed to improve computer security by encouraging users to employ strong passwords and use them properly. Answer C is incorrect. Audit Policy allows you to choose to audit the success or failure of specific events. Answer D is incorrect. Public Key Policy allows you to specify how to manage certificates and certificate life cycles.

You are the administrator for a large computer company. You need to set up the company's laptops so that both the hard disk and the display will be turned off after 20 minutes. Which Windows 10 power plan will you use? Custom power plan with the default options Power Saver power plan with the default options Balanced power plan with custom options High Performance power plan with custom options

Explanation Answer B is correct. You will use the Power Saver power plan with the default options. When a Windows 10 computer is configured with the Power Saver power plan, the computer's display and hard disk will be turned off after 20 minutes of inactivity to conserve energy. The computer will be put into sleep mode after one hour of inactivity when using the Power Saver power plan. Answers C, D and A are incorrect because when using the custom options or Custom power plan, the computer's hard disk and display turn off time duration can be customized by the user.

If you require that a user has to enter an administrator password to perform administrative tasks,what type of user account should you create for the user? Administrator user account Standard user account Power user account Authenticated user account

Explanation Answer B is correct. You would create the standard user account for the user. Standard users must provide the credentials of an administrator account when prompted by User Account Control(UAC)to perform administrative tasks. Answer A is incorrect because the administrator user account has unrestricted access to perform administrative tasks. Answer C is incorrect because the power user account has limited administrative rights. Answer D is incorrect because the authenticated user account includes any user who can log on to the computer using his credentials.

You want to track the success or failure of specified user actions. Which of the following will you implement to accomplish the task? Password Policy Account-Lockout Policy Audit Policy Security Options

Explanation Answer C is correct. Audit policies are implemented to track the success or failure of specified user actions. You audit events that pertain to user management through the audit policies.

You are an IT administrator for a large computer-training company that uses laptops for all of its employees. You have to connect to the wireless network. Which Windows 10 built-in feature will you use to accomplish this? Hyper-V Microsoft Edge VAN Secure Boot

Explanation Answer C is correct. In Windows 10, the VAN (View Available Networks) built-in feature is used to connect to the wireless networks. Before Windows 10, when you used a wireless network adapter, you would choose the wireless network that you wanted to connect to by using the wireless network adapter properties. Answer B is incorrect. Microsoft Edge allows you to start using many new Microsoft features, including Web Note, Reading View, and Cortana. Answer A is incorrect. Hyper-V is Microsoft's version of a Virtual Server. Answer D is incorrect. Secure Boot validates all drivers and operating system components before they are loaded against the signature database.

You have a user named Rob, and he is using the default Windows 10 Desktop on his laptop computer. Rob needs to change his Desktop settings for a customer presentation. Which of the following options should Rob use to configure the Desktop in Windows? Right-click My Computer and choose Manage from the context menu. Select Control Panel, and then click System. Right-click an empty space on the Desktop and choose Personalize from the context menu. Right-click My Computer and choose Properties from the context menu.

Explanation Answer C is correct. Rob should use the Personalize option to configure the Desktop in Windows 10. The easiest way to configure the Desktop is by right- clicking an open area of the Desktop and choosing Personalize. Answer B is incorrect. The System icon in the Control Panel has operating-system information, it also allows you to configure devices, remote settings, and system protection. Answer A is incorrect. Right-clicking My Computer and choosing Manage from the context menu opens up Computer Management. Answer D is incorrect. Right-clicking My Computer and choosing Properties from the context menu opens up the System icon in the Control Panel.

You have been asked to create a new local user on Windows 10 by using Windows PowerShell. Which PowerShell command allows you to create a new local user on Windows 10? Add-LocalUser New-WindowsUser New-LocalUser Add-WindowsUser

Explanation Answer C is correct. The New-LocalUser command allows you to create a new local user on a Windows 10 machine.

You work as a network administrator for Stormwind.com. You have been asked to look at a Windows 10 system for some of the Windows 10 hidden files. How will you unhide those hidden files? From the Folder View options, select Always show menus. From the Folder View options, select Hide empty drives. From the Folder View options, select Hidden files and folders. From the Folder View options, select Display file icon on thumbnails.

Explanation Answer C is correct. You can unhide the hidden files in Windows 1 0 by selecting the Show hidden files and folders option from the Folder View options. Answer B is incorrect because selecting the Hide empty drives option prevents drives that are empty from being displayed. Answer A is incorrect because selecting the Always show menus option shows the File, Edit, View, Tools, and Help menus when you're browsing for files. Answer D is incorrect because selecting the Display file icon on thumbnails option displays the file icon on thumbnails.

If you want to use Device Health Attestation on your network or in the cloud,what port should you open on the firewall? 25 110 443 995

Explanation Answer C is correct. You should open the port 443 on the firewall to use Device Health Attestation on your network or in the cloud.Internet communication needs to be established between your Configuration Manager client agent and has.spserv.microsoft.com (port 443) Health Attestation service. Answer A is incorrect. Port 25 is used for SMTP (Simple Mail Transfer Protocol) to send out emails. Answer B is incorrect. Port 110 is used by POP3 (Post Office Protocol version 3) for unencrypted access to electronic mail. Answer D is incorrect. Port 995 is used to connect using POP3 securely.

You have a Windows 10 machine that multiple users access. All users have the right to use USB removable devices, but you need to deny one user access to USB removable devices. How will you accomplish this? By setting a USB rule on Hardware Manager By using Public Key Policies By creating a removable storage access policy through an LGPO By using Software Restriction Policies

Explanation Answer C is correct. You will accomplish this by creating a removable storage access policy through an LGPO. LGPOs are policies that you can set on a local Windows 10 machine to limit hardware and user usage. You also have the ability to control individual users within the Local Group Policy. Answer B is incorrect because Public Key Policies are used to specify how to manage certificates and certificate life cycles. Answer A is incorrect because Hardware Manager does not exist in Windows 10. Answer D is incorrect because Software Restriction Policies allow you to identify malicious software and control that software's ability to run on the Windows 10 machine and not hardware.

You are the system administrator for a large organization. You have a Windows 10 machine that all users can access. There is a folder on the Windows 10 machine called Apps. You need to set up auditing on this folder. Which of the following methods will you use to accomplish this task? From the Local Group Policy, enable Audit System Events. From the Local Group Policy, enable Audit Directory Service Access. From the Local Group Policy, enable Audit Object Access. From the Local Group Policy, enable Audit Account Management.

Explanation Answer C is correct. You will accomplish this task by enabling Audit Object Access from the Local Group Policy. Audit Object Access enables auditing of access to files, folders, and printers. Answer B is incorrect. The Audit Directory Service Access policy tracks directory service accesses. Answer D is incorrect. The Audit Account Management policy tracks user and group account creation, deletion, and management actions, such as password changes. Answer A is incorrect. The Audit System Events policy tracks system events such as shutting down or restarting the computer as well as events that relate to the security log in Event Viewer.

You are the network administrator for a midsize company. You have a computer named Computer1 that runs Windows 10.You need to allow a user named User1 to upgrade the operating system of Computer1.To which of the following built-in local groups will you add User1? Cryptographic Operators Backup Operators Administrators Distributed COM Users

Explanation Answer C is correct. You will add User1 to the Administrators group, as it has full permissions and privileges. Its members can grant themselves any permissions they do not have by default to manage all the objects on the computer. Members of the Administrators group can perform an upgrade to the operating system. Answer A is incorrect. The Cryptographic Operators group has access to perform cryptographic operations on the computer. Answer B is incorrect. Members of the Backup Operators group have permissions to back up and restore the filesystem, even if the filesystem is NTFS, and they have not been assigned permissions to access the filesystem. Answer D is incorrect. The Distributed COM Users group can launch and run Distributed COM objects on the computer.

You are using a Windows 10 Enterprise system. The Windows 10 system had the pre-loaded drivers for a Microsoft mouse. You want to see if Microsoft has any updates to any of its drivers. How will you achieve this the easiest way? By using the Mouse icon in Control Panel to load the current drivers By using the driver download tool to download the current Microsoft drivers By using the Windows Update utility to get the current drivers By searching bing.com and finding where you can download the drivers

Explanation Answer C is correct. You will download the current Microsoft drivers by using Windows Update. Answer D is incorrect because searching and finding the drivers to download from an online site would be ambiguous and tedious. Answer A is incorrect because The Mouse Icon in Control Panel will allow you to update the mouse drivers, but it won't download the current drivers. Answer B is incorrect because no such tool exists.

1 You are the network administrator for your organization. You are away from the office on a business trip, and some problem occurs with the server with resources that requires the server to be updated urgently. Which of the following options will you use to accomplish this? 2 You are the network administrator for your organization. You are away from the office on a business trip, and some problem occurs with the server with resources that requires the server to be updated urgently. Which of the following options will you use to accomplish this? Broadband Tethering Remote Assistance Remote Desktop Easy Connect

Explanation Answer C is correct. You will use Remote Desktop to solve the problem. Remote Desktop allows you to maintain your servers from wherever you are without impacting the clients or other administrators. Remote Desktop also allows you to take control and close the interactive session at the remote machine. Answer A is incorrect. Broadband Tethering allows at least 10 devices to connect to your Internet connection and use your Internet for their access. Answer B is incorrect. Remote Assistance is designed to have an expert user to assist a novice user. When assisting a novice user, the expert can use text-based chat built into Remote Assistance. Answer D is incorrect. Easy Connect is a technology integrated with Remote Assistance and a method for getting remote assistance that is integrated with Windows 10.

You are using a system running Windows 10. You have configured the power settings on your system. You observe that there is some problem with the power scheme that you applied, which may harm your battery life. Which of the following commands will you use to identify the problem? Powercfg -list Powercfg -query Powercfg -energy Powercfg -qh

Explanation Answer C is correct. You will use the Powercfg -energy command to identify the problem. The -energy switch looks for common energy-efficiency and battery-life issues and displays these issues in an HTML format. This switch is used to identify problems with the power scheme. Answer D is incorrect. The Powercfg -qh command displays the content (including hidden content) of the power scheme. -list command shows all the power schemes in the current user's environment. Answer A is incorrect. The Powercfg Answer B is incorrect. The Powercfg -query command shows the content of a power scheme.

You are the administrator of a large company. You believe that your network's security has been compromised. You don't want hackers to be able to repeatedly attempt user logon with different passwords.What Local Security Policy box should you define? Password Policy Audit Policy Security Options Account-Lockout Policy

Explanation Answer D is correct. Account-Lockout Policy, a subset of Account Policies, is used to specify options that prevent a user from attempting multiple failed logon attempts. If the Account-Lockout Threshold value is exceeded, the account will be locked. The account can be reset based on a specified amount of time or through administrator intervention.

You have completed the OS install on one of your new Windows 10 machines. After the install is complete, what's the next step in making sure the machine is ready to be used? Launch \Windows\system32\cmd.exe. Load Microsoft Office. Set up the machine to dual-boot. Check Microsoft's website for all updates and patches.

Explanation Answer D is correct. After you install the Windows 10 operating system, the next step is to load all updates and patches. You can download these patches for free from Microsoft's website by using Windows Update. Windows Update allows you to check for new updates and change settings. Answer C is incorrect. You only set up the machine to dual-boot if you want to run more than one operating system on your machine. Answer A is incorrect. The . exe command opens up the command prompt. Answer B is incorrect. Microsoft Office is a set of application software, and the Windows 10 machine is ready to be used even without this software, depending on the requirement of the user.

You have an open network and the users who connect don't need to enter a password to connect to the network. Still, many users can't connect to the network. You run the ipconfig command and receive the following output: c Dus suffix NetBIOS over Tcoip. . . . . . . . : Enabled physical Md Fnahled_ DHCP Fnahled k local TPv6 Address _ _ Subnet Mask Obtained. Gateway server TATO . client DUID. . DNS Servers . _ Realtek RTL8773DF 807_11b/g/n Adapter qc-3a-58-73-x-FF 05 701 q 08; 14:00 172.10.1.3 : 172.10.1.3 . 161230939 172.10.1.3 Figure A: Output of the ipconfig command Which configuration on the computer causes the issue? The subnet mask The IPv4 address The DNS servers The DHCP

Explanation Answer D is correct. The DHCP configuration causes the issue. This is because every device that requests a connection will be admitted into the network and assigned an IP. The idea is that most devices dont anticipate the need for a static IP address and request an IP from the router. Since the router has DHCP disabled, it will ignore the request, and the device won't connect. Answers C, A, and B are incorrect because the DNS servers, the IPv4 address, and the subnet mask are configured appropriately.

Which accessibility utility is used by a user with limited vision to read aloud screen text, such as the text in dialog boxes, menus, and buttons? Dialog Manager Orator Read-Aloud Narrator

Explanation Answer D is correct. The Narrator utility is used to read aloud screen text; it uses a sound output device to read the on-screen text. Answers C, B, and A are incorrect because no such utilities exist for the Windows operating system.

You have recently hired Will as an assistant for network administration.You haven't decided how much responsibility you want Will to have. In the meantime,you want Will to be able to restore files on Windows 10 computers in your network,but you don't want Will to be able to run the backups.What is the minimum assignment that will allow Will to complete this task? Add Will to the Administrators group. Grant Will the Read right to the root of each volume he will back up. Add Will to the Backup Operators group. Grant Will the user right Restore Files and Directories.

Explanation Answer D is correct. The Restore Files and Directories user right allows a user to restore files and directories regardless of file and directory permissions.Assigning this user right is an alternative to making a user a member of the Backup Operators group.

You are the network administrator for a large company. You have a Windows 10 computer having a security feature which prompts the user if an action requires privilege elevation to help prevent malicious code from automatically running on the computer. What is this functionality called? Schannel WEAS TPM UAC

Explanation Answer D is correct. This functionality is called UAC (User Account Control). When any standard user tries to run an application that requires an administrator access token, the UAC requires that the user provide valid administrative credentials. It prompts the user if an action requires privilege elevation, which helps prevent malicious code from automatically running on the computer. Answer C is incorrect. TPM (Trusted Platform Module) devices allow to use cryptographic capabilities like physical smart cards but without the cards. Answer B is incorrect. WFAS (Windows Firewall with Advanced Security) provides network security for Windows computers. It allows you to set domain, private, and public profiles. Answer A is incorrect. Schannel (Secure Channel) is a set of security protocols that offer secure encrypted communications and authentication between a client and a server.

You have a Windows 10 machine that multiple users access. All users have the right to use USB removable devices, but you need to deny one user access to USB removable devices. How will you accomplish this? By creating a policy in the Device Guard By using Windows PowerShell By using Easy Connect By creating a policy in an LGPO

Explanation Answer D is correct. You can control individual users from the LGPO (Local Group Policy Object) by creating a removable storage access policy. LGPOs are policies that you can set on a local Windows 10 machine to limit hardware and user usage. Answer A is incorrect. Device Guard is used to lock a system down so that only trusted applications can run on the operating system. Answer B is incorrect. Windows PowerShell is used to create and service code integrity policies. Answer C is incorrect. Easy Connect is used for getting remote assistance that is integrated with Windows 10.

Your network contains an Active Directory domain. The domain contains 10 computers that run Windows 10. Users in the Finance department use these computers. You have a computer named Computer1 that runs Windows 10. From Computer1, you plan to run a script that executes Windows PowerShell commands on the Finance department computers. You need to ensure that you can run the PowerShell commands on the Finance department computers from Computer1. What should you do first on the Finance department computers? From the Windows PowerShell, run the New-PSSessionConfigurationFile cmdlet. From the Windows PowerShell, run the New-LocalUser cmdlet. From the Windows PowerShell, run the Get-LocalUser cmdlet. From the Windows PowerShell, run the Enable-PSRemoting cmdlet.

Explanation Answer D is correct. You should run the Enable-PSRemoting cmdlet from the Windows PowerShell on the Finance department computers. This command enables remote PowerShell commands on a Windows computer. The New-PSSessionConfigurationFile cmdlet allows administrators to create a file that defines a session's configuration. Answer A is incorrect. The New Answer B is incorrect. The New-Local User cmdlet allows administrators to run commands on the local and remote computers. Answer C is incorrect. The Get-Local User cmdlet allows administrators to view a local user account.

You are the network administrator for a small organization that has a workgroup environment. A new employee has joined the company and needs to use the company's laptop. He currently doesn't have the credentials to log in to the system. You are asked to provide him access to the laptop but only with limited privileges. Which of the following built-in accounts will you enable? DefaultAccount Administrator Initial User Guest

Explanation Answer D is correct. You will enable the Guest account for the user. The Guest account allows users to access the computer even if a person doesn't have a unique username and password. Because of the inherent security risks associated with this type of user, the Guest account is disabled by default. When this account is enabled, it is usually given very limited privileges. Answer B is incorrect. The Administrator account is a special account that has Full Control over the computer. Answer A is incorrect. This DefaultAccount is created by the system and used by the system. Answer C is incorrect. The Initial User account uses the name of the registered user. By default, the initial user is a member of the Administrators group.

A user named User1 has a computer named Computer1 that runs Windows 10. User1 connects to a Microsoft Azure virtual machine named MI by using Remote Desktop. User1 establishes a VPN connection to a partner organization. Once the VPN connection is established, Userl can't connect to M1. When User1 disconnects from the VPN, the user can connect to M1. You need to ensure that User1 can connect to MI while connected to the VPN. Which of the following methods will you use to accomplish this? - From the properties of the Remote Desktop connection to M1, specify a Remote Desktop Gateway. - From the Change adapter options, delete your VPN. - From the proxy settings, add the IP address of MI to the bypass list to bypass the proxy. - From the properties of VPN, uncheck the Use default gateway on remote network check box.

Explanation Answer D is correct. You will uncheck the Use default gateway on remote network check box from the properties of VPN to accomplish this. Once you configure the VPN connection to use the default gateway on the remote network, this setting overrides the default gateway settings that you specify in your TCP/IP settings. To solve this issue, you need to configure the client computers to use the default gateway on the local network for Internet traffic. Answer C is incorrect. If you add the IP address of MI to the bypass list to bypass the proxy, then you won't be able to connect to MI . Also, the proxy settings don't apply to VPN connections. Answer A is incorrect. The Remote Desktop Gateway allows you to connect to remote computers on a corporate network from any external computer, but if you configure the VPN connection to use the default gateway on the remote network, this setting overrides the default gateway settings. Answer B is incorrect. Deleting your VPN will permanently remove your VPN connection, and you won't be able to connect to it any longer.

You work as a system administrator for a large organization that uses Windows 8 for its systems. The organization asks you to upgrade all of its computers to Windows 10. Only the operating system will be upgraded, and each employee will have the same computer. Which of the following tools will you use to accomplish this efficiently? Windows Configuration Designer DISM (Deployment Image Servicing and Management) Windows PE (Windows Preinstallation Environment) USMT (User State Migration Tool)

Explanation Answer D is correct. You will use USMTto accomplish this efficiently. USMT migrates users from one computer to another via a command-line utility. It consists of two executable files: scanState.exe and loadState.exe. Answer B is incorrect. DISM is a command-line tool that works in conjunction with Sysprep to create and manage Windows 10 image files for deployment. Answer C is incorrect. Windows PE sets the Windows PE specific configuration settings as well as several Windows Setup settings. Answer A is incorrect. Windows Configuration Designer allows an administrator to work with images.

You are a system administrator for your company. You want to see what group policies have been applied to the Windows 1 0 computer and user's account. Which of the following utilities will you use to accomplish this? NET USER /? wuapp.exe DISM.exe gpresult

Explanation Answer D is correct. You will use the Group Policy Result Tool, gpresutt to determine what policies have been applied to the Windows 10 computer and user's account. NET USER /? Answer A is incorrect. The utility is used to create users. Answer B is incorrect. The wuapp. exe command-line utility is used to start Windows Update from a command prompt. Answer C is incorrect. The command-line utility is used to manipulate a Windows image. DISM. exe

you are a network technician for your company, and you need to deploy Windows 10 to multiple computers. You want to aut the installation of Windows 10 so that no user interaction is required during the installation process. Which of the following u Nill you use? WDSUTIL System Preparation Tool Windows Performance Toolkit Windows SIM

Explanation Answer D is correct. You will use the Windows SIM utility. It is a graphical utility that can be used to create an answer file. Answer files can be use( automate the installation routine so that no user interaction is required. Answer C is incorrect. Windows Performance Toolkit is a utility to locate computers on a network and then perform a thorou inventory of them. Answer B is incorrect. The System Preparation Tool is used to prepare the computer for disk imaging. Answer A is incorrect. is used to configure Windows Deployment Services (WDS) on a server. WDSUTIL

You work as a network administrator for XYZ.com. You enable PowerShell remoting on a computer that runs Windows 10. You need to limit which PowerShell cmdlets can be used in a remote session. Which of the following actions should you perform in sequence to accomplish this? Each correct answer represents a part of the solution. Choose all that apply. Run the New-PSSession cmdlet. Run the Exit-PSSession cmdlet. Run the New-PSSessionConfigurationFile cmdlet. Run the Register-PSSessionConfiguration cmdlet.

Explanation Answers A C, and D are correct. You should perform the following three actions in sequence to limit which PowerShell cmdlets can be used in a remote session: Run the New-PSSession cmdlet. Run the New-PSSessionConfigurationFi1e cmdlet. Register-PSSessionConfiguration Run the cmdlet. The New-PSSession cmdlet allows you to start a PowerShell session, the New-PSSessionConfigurationFile cmdlet allows administrators to create a file that defines a session's configuration, and the Register-PSSessionConfiguration cmdlet creates and registers a new session configuration on the local computer. This is an advanced cmdlet that you can use to create custom sessions for remote users. Answer B is incorrect. The Exit-PSSession cmdlet allows you to exit a PowerShell session.

Which of the following statements are true regarding the creation of a group in Windows 10? Each correct answer represents a complete solution.Choose two. - Only members of the Administrators group can create users on a Windows 10 computer. - Group names can be up to 64 characters. - Group names can contain the backslash (\)character. - Group names should be unique to the computer.

Explanation Answers A and D are correct. The following are correct statements about the creation of a group in Windows 10: Only members of the Administrators group can create users on a Windows 10 computer. Group names can be up to 256 characters. Group names can't contain the backslash (\) character. Group names should be unique to the computer.

You have just purchased a new computer that has Windows 10 preinstalled. You want to migrate existing users from a previous computer that was running Windows XP Professional. Which files would you use to manage this process through the User State Migration Tool? Each correct answer represents a complete solution. Choose two. loadState.exe windows7migrate.exe usmt.exe scanState.exe

Explanation Answers A and D are correct. Windows 10 ships with a utility called the User State Migration Tool (USMT) that is used by administrators to migrate users from one computer to another via a command-line utility. USMT consists of two executable files: scanState . exe and loadState . exe. Answers C and B are incorrect because there are no such files in USMT.

You are attending a large conference with your team, and none of your group members can get onto the Internet except you. You decide to use broadband tethering to connect your devices to access the Internet service. Which of the following methods will you use to accomplish this? Each correct answer represents a part of the solution. Choose all that apply. Go to your Windows 10 mobile device and open your Internet connection by sharing the connection. Open the Local Users and Groups MMC Desktop shortcut and expand the Local Users and Groups Snap-in. Open Settings, go to Accounts and change your password. Set up a password and share it with your team members.

Explanation Answers A and D are correct. You will go to your Windows 10 mobile device and open your Internet connection by sharing the connection. After opening the connection, set up a password and share it with your team members who you want to allow your Internet to be shared with. Answer B is incorrect. You open the Local Users and Groups MMC Desktop shortcut and expand the Local Users and Groups Snap-in to manage user account properties. Answer C is incorrect. Changing the password from the Accounts section of the Settings app changes your Windows password.

You work as a network consultant for a midsize company. Your company has recently updated its systems to Windows 10. You have decided to enable transparent caching in all of the company's systems. Which of the following statements are true about transparent caching? Each correct answer represents a complete solution. Choose all that apply. Transparent caching increases the time required to access files for the second and subsequent times across a slow network. Windows 10 transparent caching enables computers to cache the remote files. Transparent caching can be enabled through the use of a group policy. Transparent caching is enabled by default on fast networks.

Explanation Answers B and C are correct. The following are correct statements about transparent caching: • Transparent caching can be enabled through the use of a group policy. Windows 10 transparent caching enables computers to cache the remote files. Answer A is incorrect. Transparent caching reduces the time required to access files for the second and subsequent times across a slow network. Answer D is incorrect. Transparent caching is not enabled by default on fast networks.

You are the administrator for a printing company.After you configure the Password Must Meet Complexity Requirements policy, several users have problems when changing their passwords. Which of the following passwords meet the minimum complexity requirements? Each correct answer represents a complete solution. Choose all that apply. aBc-1 Abcde! 1247445Np 1@#$%^&*(-

Explanation Answers B and C are correct. The password Abcde! meets complexity requirements because it is at least six characters long and contains an uppercase letter, lowercase letters, and a symbol. The password 1247445Np meets complexity requirements because it is at least six characters long and contains an uppercase letter, a lowercase letter, and numbers. Complex passwords must be at least six characters long and contain three of the four types of characters: uppercase letters, lowercase letters, numbers, and symbols.

You are the administrator for a large training company. You have decided that everyone needs to configure the Password Must Complexity Requirements policy. Users are not sure what they can use. You decide to send an email out showing people examples of what types of passwords they can use. Which of the following passwords meet the minimum complexity requirements? Each correct answer represents a complete solution. Choose all that apply. 123456789M aBcdEfG1! abcde!

Explanation Answers B and C are correct. The password aBcdEfG1 ! meets complexity requirements because it is at least six characters long and contains an uppercase letter, lowercase letters, and a symbol. The password 123456789nA meets complexity requirements because it is at least six characters 10 and contains an uppercase letter, a lowercase letter, and numbers. Complex passwords must be at least six characters long and contain three of the four types of characters: uppercase letters, lowercase letters, numbers, and symbols. Answers D and A are incorrect because abcde! and ab!@#$%A&* don't contain uppercase letters or numbers.

You have a machine that runs Windows 10. You need to update one of the applications that you recently downloaded from the Windows Store. Which of the following methods will you use to accomplish this? Each correct answer represents a part of the solution. Choose all that apply. Go to Settings, and click the Update & Security option. Go to Windows Store and then click on the three dots to the right of your Microsoft account. Click on the Downloads and updates option. Run the wuauclt.exe /reportnow command.

Explanation Answers B and C are correct. You can use the following steps to update an application from the Windows store: Go to Windows Store, and then click on the three dots to the right of your Microsoft account. Click on the Downloads and updates option. On the Downloads And Updates page, click the Get updates button. wuauclt . exe / reportnow command allows you to send all queued reporting events to the Answer D is incorrect because the server asynchronously. Answer A is incorrect because the Update & Security option allows you to update the Windows operating system and not the applications.

You have recently bought a new computer system that runs Windows 10. You need to dual boot the system with Linux, but you are unable to perform it. The system is also having issues with high-end graphics cards. You suspect UEFI Secure Boot to be the reason for it and decide to disable it. How will you accomplish this? Each correct answer represents a part of the solution. Choose all that apply. Open the Local Users and Groups MMC Desktop shortcut and expand the Local Users and Groups Snap-in. Go to Control Panel, then under System and Security, select Windows Defender Firewall. Choose Troubleshoot Advanced Options: UEH Firmware Settings. From the Windows 1 0 operating system, hold the Shift key while selecting Restart.

Explanation Answers C and D are correct. You will disable Secure Boot using the following steps: 1 . From the Windows 10 operating system, hold the Shift key while selecting Restart. Then, select Troubleshoot > Advanced Options: UEFI Firmware Settings. 2. Under the Secure Boot setting (normally under the Security tab or Boot tab), set it to Disabled. 3. Save the changes and reboot the system. Answer B is incorrect. The Windows Defender Firewall helps prevent unauthorized users or malicious software from accessing your computer. Answer A is incorrect. You expand the Local Users and Groups Snap-in from the Local Users and Groups MMC Desktop shortcut to configure user account properties.

Which filename extension is applied by default to custom consoles that are created for the MMC (Microsoft Management Console)? .mmc .msc .con .mcn

Explanation Answer B is correct. When you create a custom console for the MMC, the .msc filename extension is automatically applied. Answer A is incorrect because the Microsoft Media Catalog is stored in the MMC format and is affixed with the .mmc extension. Answer C is incorrect because the .con file extension is used for a configuration file format. Answer D is incorrect because the .mcn file extension is an unknown or unassigned file extension.

You need to set up auditing on a folder.How do you accomplish this task?

From the Local Group Policy, enable Audit Object Access.

In what order are GPOs applied?

Local,Site,Domain,and Organizational Unit

You don't want to make a user a local administrator,but you do want to give this user the right to change Windows updates manually.How can you perform this?

Modify the LGPO(Local Group Policy Object)for Windows update to allow the user to make changes manually


Set pelajaran terkait

Property and Casualty - Chapter 5 - Texas Statutes and Rules Common to All Lines

View Set

Literary Terms/Devices in Fighting Ruben Wolfe

View Set

HEALTHCARE FINAL EXAM GLOSSARY TERMS

View Set

Psychiatric-Mental Health Practice Exam HESI

View Set

NUR114 Exam 3 Colorectal Cancer (CRC)

View Set

Georgia Laws, Rules, and Regulations Common to All Lines

View Set