Final Exam Practice
The OneDrive Recycle Bin is limited in capacity. What percentage of the storage limit purchased for OneDrive storage is the typical capacity of the OneDrive Recycle Bin?
10%
What is the default value for the "Maximum password age" setting in the Password Policy?
42 days
What is used to store permissions?
ACL
When accessing an object, which of the following lists each user that can access the object and what each user can do with the object?
ACL
Which policy allows you to configure an account to be temporarily disabled after a number of incorrect log-on attempts?
Account Lockout
Which of the following expands on the domain concept by linking domains in logical structures named trees, and multiple trees into forests?
Active Directory
Which of the following is defined by IP subnets instead of physical locations?
Active Directory site
How do you share a folder so that is invisible to users browsing the network?
Add a dollar sign ($) to the share name
Instead of logging performance counters to disk, you can configure which of the following to occur?
Alerts
Which of the following can be used to define which programs are allowed or disallowed in the system?
AppLocker
Applications that are not designed for Windows 10 and that require administrative privileges do not properly request elevated privileges, generating an error. You can eliminate this error by using which of the following?
Application Compatibility Toolkit
What type of encryption algorithm uses two keys to encrypt and decrypt data?
Asymmetric
Which security process records the occurrence of specific operating system events in the Security log?
Auditing
Which of the following is the process of verifying the identity of the person operating the computer?
Authentication
Which of the following is the process of granting an authenticated user a specific degree of access to specific computer or data resources?
Authorization
Windows 10 introduces a newer version of Windows Backup. What did Microsoft decide to call this newer version?
Backup and Restore (Windows 7)
To address the risks to data stored on computers and laptops, which encryption technology is available in Windows 10?
BitLocker Drive Encryption
When a limitation in a single computer system component slows down the entire system, which of the following occurs?
Bottleneck
In which technology are files stored in a file share in a central location, but are cached at the remote site to make it faster to open the files?
BranchCache
Which of the following permissions is the minimum that allows you to add files to a Shared folder?
Change
Which USMT file is generated by running ScanState.exe with the /genconfig option?
Config.xml
In Active Directory, which partition holds general information about the Active Directory forest?
Configuration
Which processor feature monitors processes to ensure that they do not access unauthorized memory spaces, which is done by various types of malware, such as viruses, to take control of systems?
DEP
Which of the following appears to be a single, large file structure, but can really be composed of shared folders on multiple servers?
DFS namespace
When a new device is installed into a Windows 10 computer, the operating system uses a device setup class and which of the following in order to properly install the new device?
Device Identification String
During the installation process for a new device, what are used in order to describe how the installation should be performed?
Device setup classes
What type of bottleneck occurs when Windows 10 and running applications want to read and write information to the physical disk in the system faster than the disk can manage?
Disk
Which area of the Resource Monitor is used to monitor disk performance and determine whether the disk subsystem is a bottleneck?
Disk
What is a collection of computers that all utilize a central directory service for authentication and authorization and is usually associated with Active Directory?
Domain
Which Active Directory component has a central security database that is used by all computers that are members of it?
Domain
Which Active Directory component is responsible for authenticating users when they log on to a workstation?
Domain controllers
The process of taking data and making it unreadable is known as which of the following?
Encryption
Data Collector Sets organize multiple counters into a single unit. Which type of data can a Data Collector Set monitor to track when system events occur.
Event Trace
Which utility is used to browse and manage the records of system events and messages stored in system event logs?
Event Viewer
Active Directory is a single monolithic database with all of the information about the network (T/F)`
False
In Windows 10, advanced audit policies can only be edited at a command-line. (T/F)
False
Like Resource Monitor, Performance Monitor allows you to select the counters you wish to view (T/F)
False
Network bottlenecks are more common for computers than servers running Windows 10 (T/F)
False
The Account Policies in the Local Security Policy can be used to control domain accounts (T/F)
False
The Services tab in Task Manager shows all user applications running on the computer (T/F)
False
When accessing a resource over the network, the least restrictive permission of share and NTFS permissions applies (T/F)
False
Windows 10 is a desktop operating system and is able to function as either a member server or a domain controller (T/F)
False
This NTFS and or share permission should be only assigned to administrative users.
Full Control
This NTFS permission allows the user to change permissions and take ownership of a folder.
Full Control
This share permission allows the user to configure share permissions for other users.
Full Control
Which NTFS permission allows you to take ownership of a folder on an NTFS volume?
Full Control
The local security policy is part of a larger Windows management system known as which of the following?
Group Policy
Which of the following can be pushed down to a computer and can be changed by the user?
Group Policy Preference
The Group Policy settings used by Windows 10 are contained in which of the following?
Group Policy object
What is the most specific device identification string?
Hardware ID
What type of encryption algorithm is one-way encryption, which means that it encrypts data, but the data cannot be decrypted?
Hash
Selecting a counter to display will display information about that counter's collected data as a chart type. Which chart type displays the current value of each performance counter in decimal format?
Histogram bar
What do you call permissions that run downward through a hierarchy?
Inheritance
Account policies settings are located in which of the following?
Local Security Policy
To enable centralized management of BitLocker, you need to install which of the following on each computer?
MBAM agent
Newer Windows applications use which of the following to describe the structure of an application?
Manifest
Running fewer applications at once is a way to resolve which type of bottleneck?
Memory
What type of bottleneck occurs when the applications you are running require more memory than is physically available in the computer?
Memory
This NTFS permission allows the user to delete folders and includes all permisisons in Write and Read & Execute permission.
Modify
Active Directory information can be changed on any domain controller and those changes will be replicated to other domain controllers. What is this type of replication called?
Multimaster
Which type of permissions are considered the most basic level of data security in Windows 10?
NTFS
Each domain can be subdivided into which of the following, that allow you to organize the objects in a domain?
Organizational units (OUs)
Which policy controls password characteristics for local user accounts?
Password
Which rule condition identifies software by file location?
Path
What utility allows you to visually display the data generated by counters, and allows you to select the individual counters you want to view?
Performance Monitor
Which of the following enables the user to manage, configure, or perform certain tasks on an object?
Permissions
If File History or Backup and Restore (Windows 7), or both, had been configured to protect user data, that data can be recovered using which feature?
Previous Versions
Which advanced audit policy setting tracks when tasks are performed that require a user rights assignment, such as changing the system time?
Privilege Use
This share permission allows the user to see, but not make changes to files over a network.
Read
What Windows 10 feature is a user-specific data protection mechanism that protects local resources by allowing user files to be backed up to an external hard drive or a network location?
Relog
Which feature enables users to access computers from remote locations with no interaction required from the remote site?
Remote Desktop Connection
Which term best describes a snapshot of operating system and program files at a specific point in time that can be restored to roll back to a point in time when the operating system or applications were stable?
Restore Point
To make Active Directory more manageable, it is divided into the domain partition, configuration partition, and what other partition?
Schema
What type of software is silently installed on your computer, monitors your behavior, and performs actions based on your behavior?
Spyware
Which of the following is a threat to privacy and is sometimes installed when you visit a website?
Spyware
What Windows 10 feature captures a screenshot each time the user clicks on a screen item and saves the screenshots and users actions in a report that can be emailed or saved to a shared storage location?
Steps Recorder
What type of encryption algorithm uses the same key to encrypt data and decrypt data?
Symmetric
Which of the following tools can be used to deploy operating systems to the point where you do not need to physically touch the computer?
System Center Configuration Manager
Which part of the motherboard in your computer is used to store encryption keys and certificates?
TPM
Data Execution Prevention (DEP) is a processor feature in Windows 10 that monitors processes to ensure that they do not access unauthorized memory spaces (T/F)
True
When accessing a resource over the network, both share and NTFS permissions are needed (T/F)
True
When you establish a baseline, it is important to ensure that you are measuring the normal state of the performance indicators (T/F)
True
Within a site, Active Directory replication is uncontrolled (T/F)
True
What utility can be used to migrate user settings, documents, and application configuration settings from the previous operating system to Windows 10?
User State Migration Tool (USMT)
Which of the following enables users to perform specific operating system tasks such as shut down the system or perform backups?
User rights
A server role included with Windows Server 2008 and newer that can be used to deploy operating system images over the network is known as which of the following?
WDS
Which of the following contacts Microsoft Update and downloads updates rather than each client computer downloading updates?
WSUS
Which of the following uses a USB drive as a memory cache similar to a paging file?
Windows ReadyBoost
Which Windows 10 feature provides an automated diagnosis and repair of boot problems plus a centralized platform for advanced recovery tool?
Windows Recovery Environment (WinRE)
What is a collection of computers that are all peers?
Workgroup
Which of the following do you have to create the same user account for on each computer that a user needs to access?
Workgroup
This share permission allows the user to see and make changes to files over a network
change
Which of the following is considered one of the biggest sources of malware (malicious software)?
the Internet
You have a PC named PC1. You have a c:\Data folder that is shared as Data. You log on directly to PC1 and access the c:\Data folder using File Explorer. Which permissions apply?
NTFS Permissions only
You have a PC named PC-Z that is on the same network as PC-A. You have a c:\Data folder that is shared as Data from PC-Z. You log on over the network from PC-A to PC-Z and access the \\PC-Z\Data share. Which permissions apply?
NTFS permissions combined with Share Permissions as most restrictive
This NTFS permission allows the user to view files, folders and subfolders along with viewing ownership, permissions and attributes
Read
Which NTFS permission allows you to navigate through restricted folders to reach other files and folders?
Read & Execute
Which of the following are used to process log file data and display it in a meaningful way?
Reports
Which utility can be used to provide an overview of the current state of a computer?
Task Manager
Active Directory uses the same naming convention for domains and objects contained in these domains as DNS. (T/F)
True
Domain controllers download Group Policy settings every five minutes (T/F)
True
The most common use for AppLocker is malware prevention (T/F)
True
This NTFS permission allows the user to create new files and folders, change folder attributes and view ownership and permissions.
Write
Every object in Windows 10 has audit events related to it
True
Mapping a network drive that points to a shared folder creates an alias to the network drive that makes it easier to access. (T/F)
True
NTFS permissions can be easily circumvented when you have physical access to a computer (T/F)
True
Public folder sharing is a way to share folders across the network without configuring permissions for individual folders.(T/F)
True