ITNW 1354 Midterm
Katya's Windows 10 computer is currently facing issues launching some applications. She recently installed a Windows update. The computer has also slowed down considerably. She suspects the update may have cause some instability.Which of the following Windows Update settings should Katya use in this scenario?
. View update history
Identify the IP address that represents a destination that is same as the computer sending the data.
127.0.0.1
Patrick works as a network administrator in a multinational corporation. To better utilize network resources, he decides to use a WSUS server to control the updates requested by the Windows 10 computers connected to his organization's domain.Which of the following can he use to configure the computers?
A Group Policy object
Which of the following can be categorized as a service?
A firewall
An application on Jared's computer is configured to automatically start every time Jared signs in. The application does not have a registry key in the following folder: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run.What is the most likely mechanism used by the application to start automatically?
A shortcut to the application in the Startup folder
Malaika is modifying the Local Security Policy settings to strengthen the security of the Windows 10 systems in her organization. She wants to lock accounts for 30 minutes if a user enters an incorrect password more than thrice.Which of the following settings should Malaika modify first?
Account lockout threshold
Ruzwana is using the Edge browser on her Windows 10 laptop at work.Which of the following websites is least likely to encounter issues in running on her browser?
An online productivity tool built using HTML5 and CSS.
To secure the company's proprietary program, the management of an e-commerce company decides to block all connections to the program through a Group Policy. However, after a day, it was reported that the program received data packets.Why do you think the inbound traffic to the program was not blocked?
Another rule was configured that allowed secure inbound connections.
You are configuring sharing options for the Public folder on a common system operated by multiple users. You select the Turn off Public folder sharing option in Advanced sharing settings in the Network and Sharing Center.Which of the following users will have access to the Public folder?
Any user who is signed in on the common system
Nanxi, a software developer, has developed an application to capture and analyze data. She wants to test the impact of the application on the processor on a Windows 10 computer. She closes all other applications and runs the sales application. Next, she opens Performance Monitor and adds the necessary counters. The data is displayed in the form of different lines. She wants the region below the lines to be colored in solid colors.Which of the following chart types should Nanxi use?
Area
Athena wants to use volume mount points on a file server in her organization.Which of the following is true of using volume mount points?
Athena can use multiple volume mount points to point to the same target partition
You are using an MMC snap-in to troubleshoot an issue on a user's computer. The MMC snap-in is using the WinRM service to communicate between the user's computer and your computer.Which of the following is true of the security used by WinRM if the port used is 5985?
Authentication to WinRM is protected by Kerberos.
Where are the user accounts created for cloud services such as Office 365?
Azure AD
Windows Virtual Desktop is much faster than Remote Desktop Services provided by Windows 10. Why?
Because it is hosted as a cloud service
How can you configure the firewall settings for hundreds of computers at the same time?
By applying a Group Policy
Haley adds a new SATA drive to her computer. When she turns on the computer, the new drive is not recognized.How can Haley resolve this issue?
By verifying that the SATA port is enabled in firmware
One of your colleagues is trying to install a new software on a Windows 10 computer. However, he is a standard user with no administrative privileges.What can you do to provide him with administrative privileges?
Change his account type
Naomi, a graphic designer, is using an image processing application on her Windows 10 computer. The application crashes and the files that she was working on are lost. Looking up this issue online reveals that the application stores the work in progress in a temporary folder at regular intervals. Restoring these temporary files will recover a significant portion of her work. However, when she navigates to the folder where the temporary files are supposed to be, she cannot find any of these files. The application prevents these files from being displayed in File Explorer to avoid unintentional modification attempts by users.Which of the following options can Naomi use to display the files in File Explorer?
Click View and then enable Hidden items.
Your ISP provides you a router through which your Windows 10 computer has Internet connectivity. How will you share this Internet connection with your smartphone?
Configure the Windows 10 computer as a mobile hotspot.
Michiel, a system administrator, uses provisioning packages to speed up the deployment process for new computers and mobile devices. He uses Windows Configuration Designer to create the provisioning packages.Which of the following will most likely require Michiel to provide the permissions of an administrator account to deploy the provisioning package?
Creating a local user account
You are using WDS to deploy Windows 10 images to computers over your organization's network. Some computers do not support booting directly from the network, so you need to boot from removable media, such as a USB drive.In this scenario, which of the following WSD images should you use?
Discover image
Meera uses facial recognition to sign in to her computer. She also pairs her mobile phone and laptop via Bluetooth. Whenever her mobile phone is out of the range of the computer, Windows automatically returns to the sign-in screen.Identify the authentication method used by Meera.
Dynamic lock
Which of the following address prefixes is used for a site-local unicast address?
FEC0::/10
Which of the following hardware IDs will you use to prevent the installation of new disks on a Windows 10 computer?
GenDisk
Wes, a system administrator, is considering automating VPN deployment to simplify VPN usage in the organization. He wants to create a simple method of VPN deployment for domain-joined users.Which of the following deployment methods is the best choice in this scenario?
Group Policy Preference
As a systems administrator, Dwayne is tasked with troubleshooting an application installed on a Windows 10 computer. The application returns the same error irrespective of the user account being used on the computer.Which of the following hives should Dwayne review to fix the issue?
HKEY_LOCAL_MACHINE
Mikhael works as a network administrator. While troubleshooting an IPv4-based communication issue, he uses the netsh utility to view the IPv4 settings. Despite the IP address being valid, the computers connected to the local network are not able to communicate with a remote host.Which of the following checks should he perform next?
He should verify the information in the routing table.
One of your friends, Antonio, tries to use the Tpmvscmgr.exe command-line tool to create a virtual smart card for Windows authentication. However, he does not have rights to use this option.Why do you think he does not have the required rights on the computer?
He signed in using a standard user account.
Moses is an IT administrator at Cresswell Tech. He is configuring File History for computers in the organization.In which of the following instances is Moses better served by using Backup and Restore (Windows 7) instead of File History?
He wants to back up all files on a computer.
Merwyn wants to implement Storage Spaces on his computer to consolidate all the storage hardware that he possesses into a single storage space. Merwyn wants to combine two hard disks, two SSDs, and a USB drive.Which of the following is true of this scenario?
If the drives contain any data, the data will be erased when they are added to the storage pool.
Ahva, a system administrator, is installing Windows 10 on the organization's computers. To preserve existing data and settings, she chooses to perform an upgrade installation instead of a clean installation.Which of the following installation methods will she be unable to use in this scenario?
Image-based installation
Which of the following is an optional feature provided by Windows 10?
Internet Explorer 11
Mei's organization uses legacy web applications built for Internet Explorer 7. To allow these applications to function smoothly on devices with the Microsoft Edge browser, she configures IE Mode. She wants these applications to run from inside the Microsoft Edge window.Which Configure Internet Explorer integration setting should she use?
Internet Explorer mode
Haley is an IT support engineer at a large financial services organization. She is often tasked with repairing a Windows 10 system at least once a day. When attempting to troubleshoot a malfunctioning computer, she uses WinRE and chooses the Startup Repair option.How can this tool help Haley in repairing the computer?
It attempts to fix common issues that prevent Windows 10 from starting.
Ariela is configuring a collector-initiated subscription to view events from multiple events on a single computer. She enters the wecutil qc command at a Windows PowerShell prompt.What does this command do?
It configures Windows Event Collector Service before starting the subscription.
identify a true statement about Task Scheduler.
It does not compromise on security.
The R&D department of an automobile manufacturer has purchased powerful workstations to run power-intensive engineering applications. The workstations have Windows 10 Pro installed, which needs to be activated. As these workstations are required to handle sensitive information, they are protected by firewalls and do not have direct access to the Internet.Which of the following license activation methods should the system administrator use in the given scenario?
Key Management Service (KMS)
Lara works as a systems administrator in a small firm. To enhance security, the managements asks her to restrict the installation of new disks on the Windows 10 computers being used in the firm. She fetches the hardware ID from the device manager and updates the Group Policy settings to prevent disk installation. However, the very next day, one of her colleagues is able to plug in and use a USB device in a Windows 10 computer.
Lara specified a hardware ID specific to the disk installed on her computer.
Lashonda is installing the Windows 10 Home edition on a computer using the DVD boot installation method. On the Which type of installation do you want screen, she chooses the Custom: Install Windows only (advanced) option. The computer is currently running Windows 7 SP1.
Lashonda wants to perform a new installation.
Identify the correct order in which GPOs are applied when a Windows 10 computer is booted.
Local computer, site, domain, parent OU, and child OU
Maria is procuring 100 computers for use in a school. The computers will be accessed by students in a computer lab. Maria decides to install the Windows 10 Education edition instead of the Windows 10 Pro Education edition.Which of the following reasons justifies Maria's decision?
Maria wants to have control over the Start menu, Taskbar, and Cortana settings.
Zachary is using the laptop provided by his organization. The operating system and other important files are located on the C: drive or the root folder.Which of the following is a default permission assigned to this folder?
Members of the computer's Users group have the ability to read and execute programs.
A small e-commerce firm recently transitioned to cloud-based computing. All the computers are Azure AD-joined. Several of its marketing personnel use Windows 10 mobile devices when they are off-site. The company wants to be able to deploy updates to these devices even when they are not on the premises.Which of the following cloud-based solutions can the company use?
Microsoft Intune
Moira is facing an issue with the sound card on her computer. To allow Aslam from the IT team to fix the issue with the sound card, she decides to use Easy Connect.Which of the following is true of this scenario?
Moira should give Aslam a password for remote assistance
Naphtali, a system administrator, configures ten Windows 10 systems to be a part of a workgroup. After a few weeks, he wants to add three of these computers to a domain.Which of the following statements is true of this scenario?
Naphtali should first remove these computers from the workgroup before adding them to the domain.
Which of the following is true of the configuration options available in Windows 10 settings?
Once a toggle switch is changed to ON, it cannot be undone or canceled.
Iba handles the IT functions of a small start-up that has 10 employees who use Windows 10 laptops. He purchases a new printer and configures it to work using Wi-Fi. Any employee can now print file over Wi-Fi on this printer.Which of the following is true of this scenario?
Only one computer can use the printer at a time.
In which of the following networks is data transmitted as cleartext?
Open
It has been 6 months since Natasha bought her printer. To keep the device updated, she downloads the latest driver from the website of the manufacturer.How can she install the new driver?
Open Device Manager, right-click on the device and click Properties, and click Update Driver under the Driver tab.
You need to group all the users in a domain named Metcorp.com based on the departments they belong to. Which of the following will you use?
Organizational units
Adrian has connected his laptop to the class projector. Before beginning the presentation, he needs to run the slides on his computer for a final check. He wants to ensure that the presentation is not projected on the screen while he is checking.Which of the following configuration options should he choose?
PC only
Which of the following authentication methods will be used when biometric authentication fails?
PIN authentication
Your friend has built a home network with five computers. He uses one of the computers as a commonplace to store files and documents that can be shared among all the other users. Windows provides users with access to the shared files by accessing the computer using the same names and passwords as that of the local users.
Pass-through authentication
Which of the following is the command-line tool for testing network connectivity?
Ping.exe
An application on Welma's computer crashes whenever she tries to save a file that she is working on. To help resolve the issue over the Internet, she contacts Ezekiel from the tech support team. After signing in using his Microsoft Azure AD account, he receives a security code that he sends across to Welma. Welma uses this code to grant Ezekiel access to her computer.Which of the following remote assistance tools are Ezekiel and Welma most likely using?
Quick Assist
Which of the following allows a user to access an app installed on a different computer as a locally installed application?
RemoteApp
Remy wants to install Windows 10 on a computer using the DVD boot installation method. He inserts a DVD with the installation files into the DVD drive and restarts the computer. Instead of beginning the installation process, the computer boots up and displays the login screen of his Windows 8.1 system.What should Remy do to get his computer to boot from the DVD?
Remy should change the BIOS or UEFI firmware settings on his computer.
Rhonda, a software developer, is using a Windows 10 laptop in his organization. He wants to use the Disk Management console to make changes to the disk configuration on his computer.Which of the following conditions must be met for Rhonda to perform this task successfully?
Rhonda must be a member of the Administrators group
Sara, a network administrator, is conducting a session on using administrative tools. She asks the attendees to try and defragment the drives in their laptops using the MMC console. When they open the console, they notice that the console tree is empty.What do you see as the quickest solution to this situation?
Sara can save the Disk Management snap-in as an .msc file and share it with everyone
Maya, a writer, is constantly on the move from one city to another as she is researching different locations for her new novel. She does not always have access to her laptop and needs access to her work documents on her phone. She is considering getting a OneDrive subscription to store all of her work-related documents so that she can access these documents from any device.What other benefit can Maya expect to receive from a OneDrive subscription?
She can recover deleted or modified files that were earlier saved to OneDrive
ba is using the DISM utility to create an image of a Windows 10 system for deployment. Of the available options, she decides to use WIM.Which of the following justifies her decision?
She wants to store multiple images in the same file.
Mei notices a yellow exclamation sign on the App & browser control icon in the Windows Security settings window.Which of the following reasons is most likely to cause this?
SmartScreen for Microsoft Edge is set to Off.
Samir is performing an unattended installation of Windows 10 on a new computer. After the installation begins, the process enters the windowsPE configuration pass phase.Which of the following tasks is accomplished by the windowsPE configuration pass?
Specifying the local partition on which to install Windows 10
Anasofia, an amateur photographer, carried her personal laptop with her on a recent vacation to Thailand. She would click photographs on her camera and transfer these to her computer at the end of the day. She occasionally used her phone as a hotspot to share mobile phone data with her laptop to check emails. Although her use of mobile data on the phone was minimal, she received a hefty bill when she returned from her vacation.If the reason for this was that Anasofia's laptop had downloaded and installed Windows Updates using the hotspot connection, which of the following must also be true?
The Download updates over metered connections option is on.
Ayaka configures her VPN client to use the PPTP protocol when communicating with the remote access server in her organization.Which of the following is true of the GRE packets created in this scenario?
The GRE packets are IP protocol type 47 and need to be allowed through any firewalls.
yaka, an interior designer, uses Windows 10 on her laptop. She wants to minimize all the windows on her screen, so she decides to use a shortcut instead of manually minimizing each window. She looks up the shortcut to minimize all windows and it says press Win+D, so she presses the Win key and the + key. She is interrupted before she can press the D key.What is the most likely interruption in this scenario?
The Magnifier was turned on
Darwish tethers his Windows 10 laptop through his mobile to access the Internet. He has enabled the Automatically pause sync when this device is on a metered network option. Despite this, OneDrive begins syncing data from OneDrive using the mobile data.Which of the following is most likely causing the issue?
The Wi-Fi network is not designated as metered by default
Hakeem is an analyst at a marketing firm. He develops software to predict market trends on his computer that runs on a Windows 10 operating system. However, when he tries to run the software on his Linux computer, it fails to load.What is the most likely reason the software does not work on the Linux system?
The application programmer interfaces (APIs) of Linux and Windows 10 are different.
Maya purchases a computer that has the operating system preinstalled. The operating system installed on the newly purchased computer is the Windows 10 Home edition.Which of the following is a possible disadvantage that Maya may face in this scenario?
The computer is likely to contain unwanted software that could slow down the computer.
Which of the following is true of Advanced Audit Policy settings?
The default configuration for these settings can be viewed only by using the auditpol.exe utility.
Identify the user profile that is created when a new user signs in for the first time.
The default profile
How is a session-based virtual desktop different from a virtual machine-based one?
The former provides a shared operating system, whereas the latter provides independent ones.
Haley, from the IT helpdesk, receives a support request for an issue on a user's computer. The user requesting her assistance sends across an invitation file for her to connect using Remote Assistance. However, Haley is unable to connect over the NAT router.What is the reason for this?
The invitation file contains the internal IP address of the user's computer
Which of the following is configured if you decide to make your computer visible to other computers on a new network?
The network discovery feature
Four years ago, Osman purchased a laptop with Windows 10 preinstalled. Now, he wants to replace his laptop with one that that has better specifications. To save money, he considers reusing the OS license from his older laptop on the new one.Which of the following is true of this scenario?
The older laptop has an OEM license that cannot be transferred to the new laptop.
An organization uses roaming profiles to allow its users access to organization's resources from any computer. However, the sign-in process is impacted because of the accumulation of data in these profiles over time. Atharva, the IT admin, is evaluating various alternatives to using roaming profiles at the organization.Which of the following justifies Atharva's decision to use credential roaming?
The organization issues certificates to users for authentication to resources
Athena has configured File History on her laptop. The backup files and folders are stored on an external hard drive. The original files on Athena's laptop are encrypted, and the external hard drive is formatted with NTFS. When Athena is traveling, someone steals the hard drive from her backpack
The thief will be able to access the contents on the drive
On a Windows 10 system that has UAC enabled, a user signs in with standard user privileges. The user attempts to run an application that requires administrative privileges.
The user will be prompted to enter the credentials of a user with administrative privileges
Phomolo wants to send a folder with sensitive data to Aga. She uses Aga's public encryption key to encrypt this data. Aga uses her private key to decrypt this data and access the data.Which of the following is true in this scenario?
This form of encryption is less secure than using a symmetric key.
Juanita decides to use EFS to encrypt the files on a hard drive partition that stores media files such as movies and images.Which of the following will cause Juanita's attempt to fail?
This is a FAT-32-formatted partition
You are using WinRE to repair a Windows 10 computer that crashed recently and won't start. You are sure that a recent feature update caused the issue because other users have complained about this update crashing their systems.Which of the following options in WinRE should you use to resolve this issue?
Uninstall Updates
Identify one difference between Group Policy settings and Group Policy preferences.
Unlike the former, the latter can be changed by users
You are preparing a Windows 10 image-based installation. In the process of creating the image, you use Sysprep to generalize the source workstation. After this, you boot the source workstation using Windows PE.What is the next step in the process?
Use DISM to capture the image from the source workstation.
Identify the mode that isolates an application from the core functionalities of the Windows 10 operating system.
User mode
Identify one restriction imposed by Windows 10 on user names.
User names cannot have the plus symbol.
Andrade works as a system administrator in a large company that uses 1000 computers for its day-to-day operations. He needs to install a new MSI-based application on 250 computers.Identify the quickest way to deploy the application.
Using Group Policy to deploy the app to the computers
Michaela is creating a VHD on her Windows 10 computer. She wants the VHD to only take up enough space to hold the data within it. As the size of the data increases, she wants the size of the VHD to scale accordingly.Which of the following attributes should Michaela use to specify this requirement?
Virtual Hard Disk Type
Magna Inc. uses Remote Desktop Services to allow its employees to access RemoteApp programs. The organization has decided to shift to Microsoft Azure.Which of the following can it use to provide access to the RemoteApp programs?
Windows Virtual Desktop
Which of the following is used to access virtual computers in Microsoft Azure?
Windows Virtual Desktop
Jin has a Windows 10 laptop with a 500 GB hard disk. The hard disk is running out of space. To resolve this issue, Jin wants to compress some of the files and folders on her laptop.Which of the following command-line utilities can Jin use in this scenario?
compact