Windows 8 Final
It is possible to create a share that is invisible to users browsing the network simply by appending what character to the end of the share name?
$
Windows Installer uses what file format for single package application installations?
.msi
A Windows Firewall policy file has what file extension?
.wfw
How many active partitions can a hard disk hold?
1
How many primary partitions are supported on a GPT partitioned disk?
128
Considering the listed hardware specifications of your company's computers, which one of the listed specifications would disqualify the computer from being able to have the 64-bit edition of Windows 8 installed on it?
16 GB HDD free space
What is the maximum disk size supported when using GPT partitioning?
18 exabytes
What is the maximum support file name length in the NTFS file system?
255 characters
IPv4 addresses are how long?
32 bits
Remote Assistance requires that access to what port be available on the requesting client?
3389
Using a single Microsoft account, on how many Windows 8 devices can you install a specific Windows app?
5
By default, what is the maximum amount of disk space that will be allocated to the BranchCache data cache?
5%
What is the recommended maximum partition size for exFAT partitions?
512 TB
Before you can convert a basic disk to a dynamic disk, what is the maximum sector size that you can have configured for the disk?
512 bytes
How many basic and advanced permissions does NTFS provide for assignment to a folder or file?
6 basic, 14 advanced
Computers running Windows PE will automatically shut down and reboot after how long?
72 hours
Which IEEE wireless networking protocol was ratified in 1999 and has a maximum defined data rate of 11 Mb/sec?
802.11b
When using BitLocker To Go, which of the following that is typically associated with BitLocker is not required to unlock the drive?
A TPM chip
Which of the following items would not meet the requirements for a DirectAccess server?
A connection to the Internet through a NAT proxy
What does the IP address of 10.240.0.0 with a subnet mask of 255.255.255.0 represent?
A network address
What is Wi-Fi Direct?
A new Microsoft implementation of ad hoc wireless networking
Generally speaking, which of the following password conditions is not considered to be part of a strong password?
A predictable password
An access control list (ACL) is a collection of individual permissions, which are called what?
Access control entries
What must your organization have in place to generate the encryption certificate that is required to become a Data Recovery Agent?
Active Directory Certificate Services
What PowerShell cmdlet would you need to use to install a critical Line of Business (LOB) Windows App that has been created within your organization?
Add-AppxPackage
When an administrator attempts to perform a task that requires administrative access, the system switches the account from the standard user token to the administrative token. What is this known as?
Admin Approval Mode
When configuring Windows Defender, which setting provides options for scanning within archives?
Advanced
Windows 8 provides three basic methods for sharing the files and folders on the computer. Which of the listed items is not one of these methods?
All folder sharing
What happens when the secure desktop is presented to a user?
All other desktop controls are completely suppressed.
When deciding what your auditing policy should be, there are some key things to consider to help you decide which computers, resources, and events you want to audit. Which of the items listed is not one of the items typically considered?
Allow users of computers the ability to manage the logs on those computers.
Software restriction policies can work in three ways, based on the settings you choose for each of the rules. Which of the following is not one of the settings to choose from?
Allowed
When Defender detects a potentially dangerous installation, it alerts and prompts the user to take an action. Of the available actions, which one could be considered to be the least secure option?
Always allow
The App-V system architecture is composed of several components. Which of them is responsible for preparing applications for virtualization?
Application Virtualization Sequencer
Which of the following is not an allowed gesture for a picture password?
Arcs
Digital certificates, smart cards, picture passwords, and biometrics are used to perform what action?
Authentication
When creating AppLocker rules, which option should you choose first to start the option to allow all currently installed Windows apps to run, with the exception of one that you will select later?
Automatically Generate Rules
You have PhotoShop Elements installed on your Windows 8 computer. You want PhotoShop Elements to automatically be launched every time you plug in a memory card that contains photos. What setting do you need modify?
Autoplay settings
If you have Windows 8 Professional workstation clients on your network, what single BranchCache protocol will they be limited to using?
BITS
You want to allow three employees in your company the ability to back up data on the computer. To which local group should you add their accounts in order to grant them the least amount of privileges required to perform their assigned duties?
Backup Operators
Which power plan on a portable Windows 8 system dims the display after 5 minutes?
Balanced (AC)
What name is given to a set of readings, captured under normal operating conditions, which you can save and compare to readings taken at a later time?
Baseline
The Windows Firewall in Windows 8 can have rules configured that allows traffic to flow in which direction(s)?
Both inbound and outbound
What is the main difference between BranchCache version 1 and version 2?
BranchCache V1 uses large, fixed-length file segments, while V2 uses smaller segments of variable length
You have a small number of Windows XP computers in your organization. You need to manually move as much data from the user profile locations for these computers as possible to the new Windows 8 computers these users will be receiving shortly. Where in the file system would you find the profile information?
C:\Documents and Settings
What keyboard combination will directly open the Task Manager in Windows 8?
CTL + SHIFT - ESC
What type of Software Restriction Policy rule identifies applications based on a certificate signed by the software publisher?
Certificate rules
What are the buttons called in the Windows 8 edge UI that provide access to common operating system functions such as Search and Settings?
Charms
Which IPv4 IP class provides for 126 unique networks, each having up to 16,777,214 hosts?
Class A
What name is used to describe the installation process where you boot from the Windows 8 setup disk and create or select a blank partition where the operating system will reside?
Clean installation
What feature does IE 10 offer that enables it to correctly display pages that were developed using older technologies?
Compatibility View
Which NTFS permission should you configure for a security group when you want members of the group to be able to edit existing files but not create new files?
Create Folders/Append Data
What is the first step that you must perform if you wish to give certain users in your organization priority access to a print device so that when a print device is busy, their jobs are processed before those of other users?
Create multiple printers.
What name is given to the user account(s) that have been authorized to recover BitLocker drives for an organization?
Data Recovery Agent
What is the largest danger that high-capacity removable storage devices pose to an enterprise network?
Data can be taken out of the network without authorization.
What Windows 8 feature prevents applications from executing code in prohibited areas?
Data execution prevention
What type of attack is occurring when attackers are replaying data packets on a wireless network?
Data tampering
Before performing an upgrade to Windows 8, several tasks should be performed to ensure the procedure goes smoothly. Which of the following is not one of these tasks?
Defragment the hard drive
To communicate with the operating system running on the computer, each device also requires a software element known as what?
Device driver
Which Device Manager view will display a list of device categories?
Devices by type
As a Windows 8 user, what can you configure within Windows 8 to protect your Personally Identifiable Information?
Disable Windows location
How can you go about obtaining Windows PE 4.0 for usage in your organization?
Download the Windows 8 Assessment and Deployment Kit
There are four types of rules in AppLocker. Which of the following is not one these rule types?
Downloaded App rules
On which tab of a driver's properties dialog box will you find buttons that will allow you to update, roll back, or uninstall the device driver?
Driver
Windows 8 supports multiple types of EAP-based authentication for VPN connections. Which of these is not supported for VPN connections?
EAP-TLS
While a Remote Assistance session is in progress, what keyboard key(s) can the requestor press to terminate the connection?
ESC
Which of the following wireless network attacks is a user of a public Wi-Fi hot spot most susceptible to?
Eavesdropping
If you plan to activate Public folder sharing in Windows 8, what must be done before you can select the Turn on sharing so anyone with network access can read and write files in the Public folders option on the Advanced sharing settings control panel?
Enable Network Discovery.
What Group Policy setting causes Windows 8 to save copies of files that users access from remote servers on a local drive, regardless of whether they are configured as offline files?
Enable Transparent Caching
On which tab of a driver's properties dialog box will you find information about the driver's provider and date of creation?
Events
By default, which accounts are assigned the Print permission?
Every account assigned to the Everyone special identity
When configuring Windows Defender, which setting allows you to prevent certain file types from being scanned?
Excluded file types
What can the powercfg.exe utility be used to accomplish that can be accomplished in no other way?
Export and import power management plans.
What uses a modified hiberfil.sys that contains only the essential kernel and driver elements of the operating system to enable both visibly and measurably faster boot times?
Fast Boot
Which of the following is not an option on the Second screen menu of Windows 8?
First screen only
Within the Windows UI, what option will you need to select to delete a wireless network profile?
Forget this network
A 2x2 MIMO device has how many total transceivers?
Four
What PowerShell cmdlet can be used to display the Event Logs?
Get-WinEvent
Which of the following is not one of the methods that the SmartScreen Filter uses to identify potential phishing web sites?
Group Policy
Which power plan is not shown by default in the Power Options control panel?
High Performance
What protocol is responsible for the end-to-end transmission of a packet, to its final destination on a network?
IP
In what scenario should you consider clicking the Go online to get the latest updates for installation option during an installation of Windows 8?
If the computer is connected to the Internet and you expect that Windows will have the drivers for the network adapter
How long after you complete the configuration of local security policies on a computer will it take for those policies to become effective?
Immediately upon completion of the configuration
When examining effective access, there are three rules that must be understood. Which of the following is not one of these rules?
Implicit permissions break permissions inheritance.
In which part of the Local Security Policy will you find settings that control how Windows 8 applies firewall settings on different networks?
In which part of the Local Security Policy will you find settings that control how Windows 8 applies firewall settings on different networks?
What is the first step to create a printer pool?
Install multiple identical print devices.
On your Windows Server 2012 server, what must you do to enable HTTP and BITS support for BranchCache?
Install the BranchCache feature
Before you can change the default search engine of IE 10 from Bing to something else, such as Google, what must you first do?
Install the appropriate add-on.
What feature of Windows 8 allows a computer to function as a router, providing Internet access to other computers in the same location?
Internet Connection Sharing
What is the paging file used for?
It allows Windows to store data that overflows system memory.
When you use BitLocker To Go on a Windows To Go USB drive, how is the internal TPM chip of the computer used?
It is not used at all.
During which phase of the Windows 8 startup process does the system run the Windows Executive (consisting of the Windows kernel and the HAL), which processes the registry hive and initializes the drivers and services specified there?
Kernel loading phase
For VPN connections involving Windows clients, what is typically the preferred protocol?
Layer 2 Tunneling Protocol (L2TP)
Which user profile type is automatically created the first time a user logs into a Windows 8 computer?
Local user profile
During what phase of the Windows 8 startup process is the Local Security Authority loaded?
Logon phase
What Windows 8 feature assigns one of four integrity levels to running processes?
Mandatory integrity control
What is the name of the security feature in Windows 8 that assigns various integrity access levels to processes running on the computer?
Mandatory integrity control
What volume type consists of an equal amount of space from two disks, both of which must be dynamic disks?
Mirrored volume
What is the executable file name for the Windows Installer application on a Windows 8 computer?
Msiexec.exe
Which of the following folders is not found as part of a default user profile?
My Contacts
What type of permissions control access to the files and folders stored on disk volumes formatted with the NTFS file system?
NTFS permissions
Which IPv6 address typeis the equivalent to the loopback address in IPv4?
Node local unicast
What is the name used for the file that contains a mandatory profile?
Ntuser.man
What Windows 8 feature provides a form of fault tolerance that individual users can employ to maintain access to their server files, even in the event of a network service failure?
Offline Files
When using distributed-cache mode for BranchCache, where is the cache hosted in the branch office?
On Windows 8 computers in the branch office
How many inbound Remote Desktop connections will Windows 8 allow?
One
When do data protection technologies such as the Windows 8 Encrypting File System (EFS) and BitLocker protect data?
Only when the data is stored on a disk
Which of the following is not an item that can be used when building Windows Firewall rules?
Packet sequence numbers
When mobile devices are controlled by a Mobile Device Mailbox Policy in Exchange 2013, what is the best way for the device owner to ensure the remote wipe command is issued as soon as possible, following loss of the device?
Perform the remote wipe from the Outlook Web App.
The members of which built-in security group have privileges that enable them to schedule the logging of performance counters, enable trace providers, and collect event traces on this computer, both locally and from remote locations?
Performance Log Users
In the OSI model, which layer is at the bottom and represents the hardware that forms the network?
Physical
Which of the following statements is true of Public folder sharing?
Places all shared files in a single location
When configuring folder redirection, which setting option could render the redirected contents inaccessible to the users at some point in the future?
Policy Removal
Which power plan on a portable Windows 8 system puts the computer to sleep after 15 minutes?
Power Saver (AC)
Which of the following methods is not a way to close unused apps that are still running on a Windows 8 computer?
Press Windows+C on the keyboard.
When using the Allow/Prevent installation of devices that match any of these device IDs setting in the Device Installation Restrictions folder of a GPO, what other setting must you ensure you also configure to provide the intended results?
Prevent installation of devices not described by other policy settings.
What is the intended function of the User Account Control (UAC) feature in Windows?
Preventing unauthorized changes to your computer
Which print architecture component is a computer (or standalone device) that receives print jobs from clients and sends them to print devices that are either locally attached or connected to the network?
Print server
Which print architecture component is the software interface through which a computer communicates with a print device?
Printer
On which tab of an Active Directory user's account object would you configure a roaming profile path?
Profile
To enable roaming profiles, what attribute would you need to modify on a user account?
Profile path
What is the name of the mode that IE 10 operates in by default that is designed to prevent attackers that penetrate the computer's defenses from accessing vital system components?
Protected mode
When the computer's network profile is set to a specific firewall location when you attempt to configure WinRM for the first time, WinRM will fail to configure the required firewall exception. What network profile location causes this problem?
Public
After changing the configuration of the User Account Control: Run all administrators in Admin Approval Mode setting, what must next be done to make the change effective?
Reboot the computer.
What is the name of the feature that enables an administrator, trainer, or technical specialist at one location to connect to a distant user's computer, chat with the user, and either view all the user's activities or take complete control of the system?
Remote Assistance
What is the name of the Remote Desktop Services feature that enables clients to run Remote Desktop server applications within an individual window?
RemoteApp
What tool extends the basic functionality provided in Task Manager with additional features and tools?
Resource Monitor
On which tab of a driver's properties dialog box will you find information about any conflicts the driver may be experiencing?
Resources
After updating a device driver, the device has started to malfunction. What should you do first to try and resolve this issue?
Roll back the driver
Windows SmartScreen has three levels of approval that can be configured to determine how it behaves. Which of the following does not represent one of those levels?
Run all downloaded apps, and submit to Microsoft for offline analysis.
Which VPN protocol encapsulates PPP traffic using the Secure Sockets Layer (SSL) protocol?
Secure Socket Tunneling Protocol (SSTP)
Where are user accounts stored for computers that are in a workgroup?
Security Accounts Manager
To create a new Microsoft account, where on your Windows 8 computer will you need to go?
Settings > Change PC Settings > Users
What type of permissions control access to files and folders shared over a network?
Share permissions
When planning your NTFS/Share permissions on storage spaces or volumes in which files/folders are shared, which of the following is generally considered the best approach?
Share permissions: Full Control, NTFS permissions: desired access
IE 10 supports multiple types of add-ons that can be used to extend the functionality of IE 10. Which of the following is not a supported add-on type?
Shell Extensions
In the scenario where you are installing Windows 8 on a new computer and plan to dispose of an old computer running Windows XP, which Windows Easy Transfer method would be most appropriate to use?
Side-by-side
The process used when Windows Store certification is bypassed for an app that is provided to internal users is known as what?
Sideloading
What volume type consists of space from a single disk?
Simple volume
Which IPv6 address scope was originally intended to be the equivalent of private IPv4 addresses but is now deprecated?
Site local unicast
What is the term used when a password is obtained through tricking a user into giving it to another party?
Social engineering
When configuring AppLocker rules, you can opt to either allow or block access to specific resources based on three criteria. Which of the following is not one of those criteria?
Source
802.11n wireless networking equipment uses two, three, or more different frequencies for transmission and the subsequent receiving of traffic. The sending system splits its data into multiple signals for transmission, and the receiving device reassembles the signals into a single data stream. What is the name of this process?
Spatial multiplexing
Of the listed BitLocker authentication methods, which is considered to be the least secure?
Startup key only
What volume type writes data one stripe at a time to each successive disk in the volume?
Striped volume
Which touch gesture requires you to draw a finger across the screen in the indicated direction?
Swipe
In which type of Event Log would you most likely find useful information about services and device drivers?
System
Which BitLocker authentication method requires a PIN code to be entered before the system will be allowed to fully boot?
TPM + startup PIN
Of the listed BitLocker authentication methods, which is considered to be the most secure?
TPM + startup PIN + startup key
Which BitLocker authentication method stores the BitLocker encryption key on the TPM chip and requires an administrator to use a USB drive containing the startup key before the system can unlock?
TPM + startup key
Which BitLocker authentication method allows BitLocker to automatically access the encryption key if the boot environment is determined to be unmodified?
TPM only
What option does BitLocker give you to allow system maintenance to be performed, such as the installation of software or updating of firmware, without BitLocker interfering?
The Suspend protection option
By default, IE 10 is granted access to which area of the computer?
The Temporary Internet Files\Low folder and the HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer/LowRegistry registry key.
Your users use Windows 8 workstations that are joined to an Active Directory domain. You have been asked several times recently why users cannot configure Compatibility View options in IE 10. What is the most likely reason for this issue?
The Turn off Compatibility View option has been enabled.
When Windows fails to correctly identify a detected device during the Windows installation, several things can happen. Which of these options is not one of the possible outcomes?
The Windows installation program reboots the computer and attempts to identify the device again.
What do NTFS quotas provide an administrator?
The ability to limit the quantity of storage space utilized by users on the volume.
What special feature do Windows apps have that is particularly attractive for an organization with many various types of Windows 8 devices in use?
The apps use the new Windows user interface (UI) designed to display and work across Windows 8 devices with different form factors and display sizes.
Why do some snap-ins, such as the Active Directory Domain Services consoles, not provide a means to redirect the console to another computer?
The console will automatically locate a domain controller.
In order to use the Custom Classes: Deny read/write access setting of the Removable Storage Accesspolicy settings, what will you need to know about each device to which you wish to allow read or write access?
The device GUID
What is the basic process employed to digitally sign a device driver or other piece of software?
The device driver files are run through a hash algorithm and then encrypted using the publisher's private key.
What is the net effect of deleting a device using Device Manager and then restarting the computer?
The device will be detected by Windows during the restart and Windows will try to reinstall it automatically.
If you apply a change to a folder to enable EFS for the folder only, what happens to the files currently in the folder?
The files currently in the folder are not encrypted.
When none of your configured Software Restriction Policies are matched, what happens?
The settings in the default rule are used.
What disadvantage is encountered when using Software Restriction Policies?
They must be configured manually.
In most cases, how is malware introduced into a computer system?
Through a deliberate act of the computer's user
In Windows 8, why might a user wish to close running but idle applications using Alt+F4?
To clean up the thumbnail bar
Which IE security zone contains the web sites that you would not expect to damage the computer?
Trusted sites
Which Application Compatibility GPO setting can boost system performance at the cost of possible problems running legacy applications?
Turn off Application Compatibility Engine
When UAC is configured, how many tokens will an administrator account holder receive when they log into the computer?
Two
What system requirements must you have to take advantage of Secure Boot?
Unified Extensible Firmware Interface
Most cabled networks today use what type of cabling?
Unshielded twisted pair
If you are currently running Windows 8 on your computer, what is the easiest way to upgrade to Windows 8 Professional?
Use Anytime Upgrade
Remote Assistance offers several methods to send the invitation for assistance. Which of the following is not one of those options?
Use Remote Desktop
What must you do to enable the Windows Store on Windows Server 2012?
Use the Add Roles and Features section of the Server Manager.
When a specific file type, such as .mp3, can be opened by many different applications, how can you configure Windows 8 to use a specific application to open an .mp3 file that is double-clicked?
Use the Pick an application to open this file link in the Default Programs control panel.
Which UAC Group Policy setting would best be used to force all application installation attempts to fail?
User Account Control: Detect application installations and prompt for elevation
By default, eight tiles appear in the Windows Mobility Center. Which of the listed items does not appear by default here?
User Accounts
The Network Service special identity allows services, configured to run as a network service, permissions on the computer equivalent to what built-in group?
Users
Which of the following benefits is not provided when BranchCache is used?
Users access data over the faster WAN link
How does Windows 8 transmit display signals to a network projector?
Using RDP
On which tab of a disk's properties dialog box will you find information about the partition style and capacity of the disk?
Volumes
Why should you not deploy a wireless network using WEP for security?
WEP is insecure due to very weak cryptographic protocols.
What design feature of WEP makes it a poor choice for wireless network security in larger wireless networks with hundreds or thousands of clients?
WEP provides no mechanism for automatically changing the shared secret.
To exclude just MP3 players and digital cameras from being installed on your organization's computers, which Removable Storage Access setting should you configure to deny?
WPD Devices
What event type indicates a service degradation or an occurrence that can potentially cause a service degradation in the near future?
Warning
What new standard defines a protocol that allows clients and servers to exchange data immediately as it becomes available without the overhead created by HTTP and TCP?
WebSockets
Windows 8 provides many emulation modes for older versions of Windows. Which of the listed modes is not available to select from?
Windows 2000
When you perform an in-place upgrade to Windows 8 from Windows 7, what will be names of the "Windows" folders in Windows 7 and Windows 8?
Windows 7: Windows.old; Windows 8: Windows
Which version of Windows 8 is designed for larger businesses and is only available through volume licensing programs?
Windows 8 Enterprise
What is the minimum Windows 8 edition that you will need to use if you plan on joining the Windows 8 computer to an Active Directory domain?
Windows 8 Professional
Your organization currently uses roaming profiles for all users. All users use Windows 7 computers. Windows 8 will be introduced shortly in your organization. Given the information presented, what issue should you be aware of?
Windows 8 roaming profiles and Windows 7 roaming profiles are not compatible with each other.
During which phase of the Windows 8 startup process does the system initiate the memory paging process and load various operating system elements into memory?
Windows Boot Loader phase
During which phase of the Windows 8 startup process does the system read the Boot Configuration Data (BCD) registry file?
Windows Boot Manager phase
What is the name of the Windows 8 application provided by Microsoft that is designed to stop the infiltration of spyware into the computer system?
Windows Defender
What name is given to a Windows PE installation on a computer with Windows 8 already installed?
Windows Recovery Environment
What is the central location included in Windows 8 for the distribution and purchase of Windows apps?
Windows Store
What was the first 32-bit version of Windows to support the GPT partitioning style?
Windows Vista
The User State Migration Tool uses several files to control the migration process. What is the file format of these files?
XML
What makes connecting to a remote computer by redirecting an existing console an inefficient method over time?
You can access only one computer at a time.
When you create your first new rule in AppLocker, what will happen if you do not have the default rules in place?
You will be prompted to create the default rules.
You are trying to configure location-aware printing on your new Windows 8 computer. The option to configure location-aware printing is not available. What is the most likely reason for this scenario?
Your computer does not utilize an internal battery.
You want to create a domain level GPO that will specify the storage location of roaming profiles. Which of the following UNC paths represents the best configuration to place each user's profile in a unique location?
\\Server\share\%USERNAME%
By default, Windows 8 is configured to check for updates for installed apps _________ and then _________ the needed updates.
daily, download but not install
What should you enter into the Run dialog box to open the Device Manager console?
devmgmt.msc
How often does the Reliability Monitor gather data for the stability index?
every hour
What command can you issue from the command line to view all configured wireless networks on your Windows 8 computer?
netsh wlan show profiles
Which troubleshooting utility allows you to generate DNS request messages and transmit them to specific DNS servers on the network?
nslookup
What command-line utility could be used to elevate privileges in a script?
runas.exe