TestOut Client Pro 1.3.6 - 7.2.8

Ace your homework & exams now with Quizwiz!

A file or folder cannot be synced.

A solid red circle with a white X

Causes the policy to be enforced

Enabled

What is a group of related domains?

Tree

Which of the following are included as part of Data Link layer specifications?

-Controlling how messages are propagated trough the network. -Identifying physical network devices.

Files that you mark as "Always keep on this device."

A solid green circle with a white checkmark

What is the Windows Configuration Designer

A tool used to create provisioning packages

If you need to customize the files gathered from the standard user profile folders to be migrated, it is recommended that you edit which of the following files?

Config.xml

Which Blu-ray standard defines rewritable disks?

BD-RE

You manage a group of twenty Windows workstations that are currently configured as a workgroup. You have been thinking about switching to an Active Directory configuration. Which advantages would there be to switching to Active Directory? (Select two.)

Centralized authentication and Centralized configuration control

You have a small network as shown, you have configured the IP address and subnet mask on wrk1. You want to be able to use wrk1 to browse the Internet to connect to sites like cisco.com Which other parameters are required on the workstation? (2 answers)

Default gateway DNS server address

Which of the following is *not* an appropriate response to a risk discovered during a risk analysis?

Denial

Which of the following measures will make your wireless network invisible to the casual attacker?

Disable SSID broadcast

Which type of data loss prevention system can be configured to block unauthorized email messages from being sent and, therefore, being subject to email retention rules?

Endpoint DLP

You need to enable sideloading on a Windows 10 system. You have opened the Settings app and have navigated to Update & Security. Click the option that you would use to do this.

For developers

Your company wants to activate Enterprise licenses on a one-time basis by calling Microsoft. Which of the following activation processes will they need to use?

Multiple Activation Key (MAK)

Phone or Internet activation

Full-Packaged (Retail)

You use a Windows computer that is shared by multiple users. The default printer on your computer is a Sharp AL-2040. When you send a print job to the default printer, nothing happens. The other users can send jobs to the same printer without any issues. What should you do?

In Device and Printers, right-click the Sharp AL-2040 icon and click Troubleshoot.

You manage a Windows system. Multiple people use the computer. Users sometimes allow Internet Explorer to remember passwords when accessing various websites. What can you do to prevent the stored password from being stolen from the system?

In the AutoComplete settings, deselect the Usernames and passwords on forms checkbox.

You have several computers in a domain network. Your company develops software that runs on both Windows 7 and Windows 10. Programmers need to have computers that can dual-boot between Windows 7 and Windows 10. You need to configure each system to meet the programmer's requirements. What should you do?

Install Windows 7 first, and then install Windows 10 on another partition.

Which of the following activation processes requires one of the following thresholds to be met? 25 or more client systems (physical or virtual) must require activation. 5 or more servers (physical or virtual) must require activation.

Key Management Services (KMS)

You have a large TCP/IP network and want to keep a host's real time clock synchronized. What protocol should you use? NNTP SMTP SAP SNMP NTP

NTP

If an organization shows sufficient due care, which burden is eliminated in the event of a security breach?

Negligence

Syncing has been paused. Your files are not currently syncing.

OneDrive icon with a gray circle containing two vertical lines

What is a logical organization of resources?

Organizational Unit

You manage a Windows network environment. As part of your IPv6 migration strategy, you have implemented Teredo on your network. You would like to test the communication of a client computer using Teredo. What should you do?

Ping the address beginning with 2001:

Boot from VHD

Pro and Enterprise

Encrypting File System

Pro and Enterprise

You are working on a computer running Windows 10, it is part of a domain. You recently installed Windows 10 Pro. After installation, you are not able to connect to resources on the network. You check Device Manager and see the dialog shown below. (ADBEWK503 is highlighted) What should you do?

Right-click the Broadcom NetXtreme Gigabit Controller and select Update Driver.

Your company has started the migration to IPv6 on your network. Your network administrator tells you that the network is using stateless autoconfiguration. You need to configure your computer to use the correct IPv6 address, default gateway address, and DNS server address. The computer is currently configured to get all IPv6 information automatically. What should you do?

Run "netsh interface ipv6 add dnsserver"

You are about to install a new desktop application that you downloaded from a website. What should you do before you start the installation? (Select two.)

Scan the installer for malware. Create a restore point

Which key combination can you press during the initial boot process to get to Command Prompt prior to the computer running the Out-of-Box Experience

Shift + F10

A OneDrive for business account is configured, it's running without problems, and the sync is up-to-date.

Solid blue cloud

You're not signed in or OneDrive setup hasn't completed.

Solid gray cloud

You need to develop and then install a sideloaded app on the Windows 10 Professional systems within your organization. Which of the following are true regarding this process? (Select two.)

The app may be digitally signed using a self-signed certificate minted by Active Directory Certificate Services on a Windows server. Sideloading must be enabled on the Windows 10 Professional systems using the Settings app.

When working from within the Settings app, some applications include an Advanced options link. Selecting this link allows you to view more details about the application as well as giving you the ability to perform which of the following tasks? (Select two.)

Uninstalling the app Setting the default app

You have a Windows 10 device that is part of a workgroup. You want to be able to install custom apps directly to a device without going through the Windows Store. What do you do?

Use sideloading to install the apps

Internet Explorer user settings

User Configuration policies

How are provisioning packages distributed?

Using a USB flash drive.

Which of the following terms are often synonymous with or made possible with CIDR? (2 answers)

VLSM Classless

Windows Network Diagnostics

attempts to diagnose connection problems and present possible solutions

-e

displays Ethernet statistics

Event Viewer

logs significant events on a computer such as when a process encounters an error.

You want to access your OneDrive account using a web browser. Which URL would you use?

onedrive.live.com

nslookup

resolves the IP address of a hostname

-p

shows connections for a specific protocol

Which of the following functions are performed by the OSI Transport Layer?

-Reliable message delivery -End-to-end flow control -Date segmentation and reassembly

What is a collection of network resources?

Domain

Network communication security settings

Computer Configuration policies

Dual-layer version employs two recordable dye layers, each capable of strong data.

Digital Versitile Disc (DVD-RW)

Which Settings app category would you use to configure accommodations for users with impaired vision or hearing

Ease of Access

Drag each task on the left to the Internet options tab on the right where the task can be performed.

General: Delete temporary internet files, cookies, browsing history, form data, and passwords. Security: Enable Protected Mode Privacy: Configure Pop-up Blocker settings Content: Manage Certificates, trusted root CAs, and trusted publishers Connections: Configure proxy server settings Programs: Add, disable, or remove browser add-ons Advanced: Reset Internet Explorer settings to their default values.

Mobile Device Management

Home,Pro, and Enterprise

Does not change the current setting for the policy

Not Configured

In the OSI model, what is the primary function of the Network layer?

Routes messages between networks

Purchasing insurance is what type of response to risk?

Transference

What is the best definition of a security incident?

Violation of a security policy

You have a small network with three subnets, as shown in the diagram below. IP addresses for each router interface are also indicated. You need to connect Wrk1 to Subnet A, and you need to connect Wrk5 to Subnet C. Each workstation needs a static IP address that allows it to communicate on the connected subnet. Drag the IP addresses on the left to the workstation it should be assigned to on the right. (Only one IP address is appropriate for each workstation).

Wrk1: 192.168.111.62 Wrk5: 10.155.64.97

When piloting a deployment, which actions should you consider taking? (select two.)

You should check all third-party encryption tools and switch to BitLocker if needed You should test deployments with small groups

Which of the following are valid IPv6 addresses? (select two.)

bab3:b834:45a3:0000:0000:762e:0270:5554 35BC:FA77:4898:DAFC:200C:FBBC:A007:8973

You are using PowerShell cmdlets to sideload an app. Which two cmdlets must you run to complete the task?

import-module appx and add-appxpackage

Which of the following are optical storage devices? 1.) BD 2.) SDHC 3.) CD 4.) USB flash drive 5.) DVD 6.) SSD 7.) HDD

1.) BD 3.) CD 5.) DVD

Which optical media has the greatest storage capacity? 1.) Single-layer, single-sided Blu-ray disc 2.) Dual-layer, double-sided DVD 3.) Dual-layer, single-sided DVD 4.) Compact disc

1.) Single-layer, single-sided Blu-ray disc

A host on the network has an IP address of 129.11.99.78 using the default subnet mask, how would you identify the address and mask using CIDR notation?

129.11.99.78/16

Which of the following is the last IP address that can be assigned to hosts on the 166.70.0.0 network using the default subnet mask?

166.70.255.254

Which block of address is defined for use with Automatic Private IP Addressing (APIPA)?

169.254.0.0/16

Your network has been assigned a class B network address of 179.113.0.0 Which three of the following addresses can be assigned to hosts on your network?

179.113.89.0 179.113.65.12 179.113.0.118

Your network has been assigned the class C network address 200.78.151.0 Which of the following addresses can be assigned to hosts on your network? (3 answers)

200.78.151.252 200.78.151.111 200.78.151.12

Consider the following IP address that uses CIDR notation: 172.17.8.5/22 Which subnet mask corresponds to the CIDR notation used in this address?

255.255.252.0

You have conducted a risk analysis to protect a key company asset. You identify ff. values: *Asset value = 400 *Exposure factor = 75 * Annualized Rate of Occurrence =.25 What is the Single Loss Expectancy (SLE)?

300

You have a CD-RW drive that advertises speeds of 32x/12x/48x. What is the read speed of the drive?

48x

A OneDrive account is automatically created when you set up an online Microsoft user account. How much storage are you given to use for free?

5 GB

You have booted a new computer (purchased from a manufacture) to PowerShell prior to the computer starting the Out-of-Box Experience. From PowerShell, you run the Set-ExecutionPolicy Unrestricted cmdlet. Which is the function of this cmdlet?

Allows Windows to run scripts.

What is the average number of times that a specific risk is likely to be realized in a single year?

Annualized rate of occurrence

You've decided to use a subnet mask of 255.255.192.0 with your 172.17.0.0 network to create four separate subnets. The network ID for one of the subnets is 172.17.0.0. You are installing the first host (a server) on this subnet, and you want to assign the lowest numbered IP address possible to this system. What should you do?

Assign the system an IP address of 172.17.0.1

You've decided to use a subnet mask of 255.255.192.0 with your 172.17.0.0 network to create four separate subnets. The network ID for one of the subnets is 172.17.128.0. You are installing a DNS/DHCP server on this subnet and want to assign the highest numbered host IP address possible to this system. What should you do?

Assign the system an IP address of 172.17.191.254

Several weeks ago, you installed a desktop application on your Windows system. Yesterday, you installed another desktop application on your system that was developed in-house. After doing so, you notice that the first application behaves erratically and frequently locks up. You have opened Control Panel on your Windows system, accessed Programs and Features, and selected the application. What should you do?

Click Repair

You are consulting a small startup company that needs to know which kind of Windows computer network model they should implement. The company will start small, with only twelve employees, but they plan to double or triple in size within 12 months. The company founders want to make sure they are prepared for growth. Which networking model should they implement?

Client-Server

This signifies that a sync is in progress. This includes uploading files or when OneDrive is syncing new files from the cloud to your device.

Cloud icon with arrows forming in a circle

Your organization's security policy dictates that users are not allowed to load Windows Connect Now (WCN) settings from a USB drive to connect to a wireless network. Which Group Policy contains settings that can be enabled to block this functionality?

Configurations of wireless settings using Windows Connect Now

The hardware in a user's Windows 10 Professional system is configured as follows: integrated 100 Mbps network card, Integrated sound board, Integrated SATA adapted, 1 TB SSD storage, Rewritable DVD Drive. You recently made the following changes to the system hardware: You installed a new 1000 Mbps network card in an expansion slot in the original motherboard. , You connected a new Blu-ray optical drive to a SATA connector on the original motherboard. , You connected a new 2 TB hard disk to a SATA connector on the original motherboard.

The activation status of Windows has not changed. , The system's hardware ID (HWID) has changed.

Your Windows workstation has an IP address of 192.168.1.35 with a subnet mask of 255.255.255.0. It also has a DNS server address of 192.168.1.1 and a default gateway router address of 192.168.1.254. Your workstation is a member of the westsim.com domain. The domain controller's address is 192.168.1.3. Your workstation needs to connect to a web server using the HTTP protocol. The web server has an IP address of 192.168.1.2 and a subnet mask of 255.255.255.0. Where will the packets be sent first?

Directly to the web server.

Prevents the policy from being enforced

Disabled

During a recent site survey, you find a rogue wireless access point on your network. Which of the following actions should you take first to protect your network, while still preserving evidence?

Disconnect the access point from the network

You want to prepare a USB flash drive that you can use as a Windows 10 installation source. Which of the following tools can be used to prepare the USB flash drive? (select three)

DiskPart, WIndows 7 USB/DVD Download Tool, Media Creation Tool

You are conducting a forensic investigation. The attack has been stopped. Which of the following actions should you perform first?

Document what's on the screen

Which of the following statements is true regarding risk analysis? (Select two.)

Don't implement a countermeasure if the cost is greater than loss; Annualized rate of Occurrence (ARO) identifies how often the successful threat attack will occur in a single year.

You are performing a clean installation of Windows 10 on a notebook computer. The notebook system has one SATA hard disk installed. You want to divide the hard disk into two volumes. The C: volume should be 150 GB in size. The D: volume should consume the remaining available space on the drive. Click the option you would use in the Windows installer to implement this configuration.

Drive 0 Unallocated Space

Your company has asked you to look at strategies for migrating from IPv4 to IPv6. Instead of using IPv6 only, you decided you want to allow hosts to use both IPv4 and IPv6 addresses. Which of the following technologies should you implement to allow hosts to use both IPv4 and IPv6 at the same time?

Dual Stack

While working in Device Manager, you notice the display shown below. What does the icon next to USB Mass Storage Device indicate. (the icon is a yellow triangle with an black exclamation mark in the center)

The driver for the device is unavailable.

You need to change the web page that opens when you launch the Edge browser. Click the tool in the Edge browser toolbar that allows you to make this change.

The icon with the three dots

You just created a provisioning package for Windows 10 desktops using the Windows Imaging and Configuration Designer (ICD) found within the Windows ADK. Which of the following are true? (Select two.)

The provisioning package can be applied to an existing Windows 10 image. The provisioning package can be applied to a running Windows 10 system.

You have a computer on your workbench that has no operating system installed on it. You would like to install Windows 10 Enterprise 32 bit edition on the computer. The computer has the following hardware specifications: Hard drive with 12 GB of free space 1 GB of RAM one additional socket available One Pentium 2.8 GHz processor, one additional socket available Display supports 800x600 pixels What should you do?

Free up some space on the hard drive

You frequently use an app from the Windows Store. How can you configure the app so you can access it without having to open the Start menu? (Select two. Each answers is a complete solutions.

From the Start menu, click and drag the app's tile to the taskbar. From the Start menu, right-click the app s tile and select More > Pin to taskbar.

A user has complained about not being able to remove a program that is no longer needed on a computer. The Programs and Features page is not available in Control Panel. You suspect that a policy is enabled that hides this page from the user. But after opening the Local Group Policy Editor, you see that the Hide Programs and Features page is set to Not Configured. You know that other users in this domain can access the Programs and Features page. To determine whether the policy is enable, where should you look next?

GPOs linked to organizational units that contain this user's object.

You have a computer that currently has Windows 7 installed on it. You need to perform a clean installation of Windows 10, but it is very important that you are able to continue using this system with the same applications and data. You must retain the existing data files from the Windows 7 installation and be able to continue using the same applications after the Windows 10 clean install is complete. What should you do?

Gather application installation media and product keys. Back up the user data.

Installed desktop applications on a Windows system that are displayed in Programs and Features typically have associated entries in which registry key?

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Current Version\Uninstall

Which method can you use to verify that a bit-level image copy of a hard drive is an exact clone of the original hard drive collected as evidence?

Hashing

Which protocol is used on the World WIde Web to transmit pages to web browsers? HTTP NNTP HTML SMTP

Hypertext transfer protocol (HTTP).

Which of the following best defines Single Loss Expectancy (SLE)?

The total monetary loss associated with a single occurrence of a threat

Your organization uses an 802.11b wireless network. Recently, other tenants installed the following equipment in your building: -A wireless television distribution system running at 2.4 GHz -A wireless phone system running at 5.8 GHz -A wireless phone system running at 900 MHz -An 802.11a wireless network running in the 5.725 to 5.850 GHz frequency range -An 802.11j wireless network running in the 4.9 to 5.0 GHz frequency range Since this equipment was installed, your wireless network has been experiencing significant interference. Which system is most likely to blame?

The wireless TV system

If you want to change the background, color, sounds, and mouse cursor at the same time, you might consider using which of the following Personalization options found in the Settings app

Theme

What is the purpose of using Windows Autopilot?

To make the deployment and management of new Windows 10 new devices easier.

Your Windows workstation has an IP address of 192.168.1.25 assigned to it with a subnet mask of 255.255.255.0. It also has a DNS server address of 137.65.1.10, and it has a default gateway router address of 192.168.1.254 Your workstation needs to send a file to a server that has an IP address of 192.168.2.1 and a subnet mask of 255.255.255.0 Where will the packets be sent first?

To the default gateway router

Which Internet Explorer security feature restricts the browsing session information that can be tracked by external third-arty websites and applications?

Tracking Protection

You are an application developer, and you are writing a program for exchanging video files through a TCP/IP network. You need to selct a transport protocol that will guarantee delivery. Which TCP/IP protocol provides this capability? RIP UDP TCP TFTP IP FTP

Transmission control protocol (TCP).

Which of the following protocols stores email on the mail server and allows users to access messages from various client devices withouth having to download the emails? IMAP4 SMTP POP3 NTP

IMAP4

You are asked to recommend an email retreival protocol for a company's sales team. The sales team needs to access email form various locations and possibly different computers. The sales team does not want to worry about transferring email messages or files back and forth between these computers. Which email protocol is designed for this purpose? MFTP POP3 IMAP4 POP4 SMTP

IMAP4

You recently created a new network segment for Development. Because the hosts are now on a different network segment, they can no longer contact DHCP server. Both network segments are connected wia a Cisco router. Which of the following would be the best action to take in order to fix the problem?

Implement an IP Helper address on the router

Two devices connected to your computer are not working properly. You suspect the devices are using the same system resources, and this is creating a conflict. How can you verify whether or not the devices are conflicting with each other? (Select two. Each answer is a complete solution.)

In Device Manager, open the device's Properties window and click the Resources tab. Run System Information (msinfo32)

You have a notebook system running Windows. The laptop has built-in wired and wireless network cards. Recently, the wireless card stopped working, so you connected an external USB wireless adapter to the system. After you install the wireless adapter, it is not displayed in the list of available network adapters in the Network and Sharing Center. What should you do to troubleshoot the problem?

In Device Manager, right-click the wireless device and click Properties. Examine the device configuration.

The audio card in your Windows system is working, but you learn about an updated driver that adds new features. You download and install the new driver. After you restart and sign in to Windows, you can no longer play audio files. Using minimal administrative effort, you need to find a solution so you are able to play audio. What should you do?

In Device Manager, roll back the driver.

Using Internet options, you must set restrictions for downloading unsigned ActiveX controls. Click the tab you would access to set the restrictions.

Security

During TCP/IP communications between two network hosts, information is encapsulated on the sending host and decapsulated on the receiving host using the OSI model. Match the information format on the left with the appropriate layer of the OSI model on the right. (Not all layers have a matching information format.)

Session Layer--(leave blank) Transport Layer--Segments Network Layer--Packets Data Link Layer--Frames Physical Layer--Bits

Network and Sharing Center

Shows the network status and a graphical representation of network connections

Your company has just acquired another company in the same city. You need to integrate the two email systems so that messages can be exchanged between the email servers. Currently, each network uses an email package from a different vendor. Which TCP/IP protocol witl enable message exchange between systems? POP3 FTP ICMP IMAP4 SMTP

Simple mail transfer protocol (SMTP).

Which of the following includes the benefits of free upgrades when the next version of Windows is released and Microsoft Desktop Optimization pack (MDOP)

Software Assurance

OneDrive is running without problems, and the sync is up-to-date.

Solid white cloud

Which of the following best describes the purpose of using subnets?

Subnets divide an IP network address into multiple network addresses

You manage a subnet that uses subnet address 198.162.1.0/23 Which of the following best describes how addressing is configured for the subnet?

Supernetting

You want to show reminders and incoming VoIP calls on the lock screen. Which of the Settings app categories would you use to make this adjustment.

System

You have just finished installing Windows 10 on a computer that will be the reference system. An i mage needs to be captured from this reference system. You will be deploying the image captured to computers that were made by several different manufacturers and which use a wide range of hardware. Therefore, you need to remove all device-specific information from the reference system prior to capturing the image. Which tool should you use to do this?

System Preparation Tool

Which of the following protocols includes extensive error cheching to ensure that a transmission is sent and received without mistakes? UCP UDP UDB TCP

TCP

You have an IPv4 network that has two IPv6-only hosts that need to be able to communicate with each other. You want to implement a solution that only requires you to configure the two IPv6 hosts. You also want it to work through NAT. Which tunneling method should you use?

Teredo tunneling

You are configuring a provisioning package using the Windows Configuration Designer's Provision desktop devices option. One of the purposes of the package is to give each computer the name TestOut- followed by a random four-digit number. What should you enter for the Device name field?

TestOut-%RAND:4%

You are using a web browser on your Windows notebook to access the http://www.westsim.com website. Your notebook has been configured to use a DNS server that has an IP address of 137.165.1.254 for name resolution. Your notebook sends a name resolution request for www.westsim.com to this DNS server. However, this server isn't authoritative for this domain and doesn't have a record that can be used to resolve this domain name to an IP address. What will happen next?

The DNS server sends a request to a DNS root server for the IP address of a DNS server that is authoritative for the westsim.com domain.

You do not use the Microsoft XPS Document Writer. Which option could you use to disable it?

Turn Windows features on or off

The Hide Programs and Features page setting is configured for a specific user as follows: Local Group Policy----> Enabled Default Domain Policy GPO ---> Not Configured GPO linked to the user's organizational unit ---> Disabled After logging in, the user is able to see the Programs and Features page. Why does this happen?

The GPO linked to the user's organizational unit is applied last, so that this setting takes precedence.

You have a small network connected to the Internet as shown in the exhibit. You need to configure the default gateway address on Wrk1 so that is can communicate with hosts on the Internet. Which address would you use for the default gateway address?

The IP address assigned to Fa0/0 on router one

You have configured a Windows server in your network to provide activation for your Windows workstations through Active Directory using the default settings. Which of the following are true concerning activation in this network? (select two)

The Windows client systems and the Windows server must all be members of the same domain. The Windows client systems will remain activated as long as they stay members of the domain.

You have installed the Microsoft Deployment Toolkit (MDT), the Assessment and Deployment Kit (ADK), and the Windows Preinstallation Environment Add-on (WinPE files) on a management machine. Using the Deployment Workbench on this management machine, you have also created and configured a deployment share. Which of the following steps creates the components required to create and capture an image?

Update the deployment share

You've just connected a USB wireless network adapter to a Windows desktop system in your home office. You want to use the Windows Connect Now (WCN) push-button connect feature to connect your desktop to your wireless network. Which technology must be implemented on both the wireless access point and the wireless network interface to enable this feature?

Wi-Fi Protected Setup (WPS)

Which of the following editions of Windows 10 is described below? Runs on standard desktop computers and notebooks based on the Intel-compatible x86/x64 architecture Supports traditional desktop applications as well as apps from the Windows Store. Built-in apps include Mail,Calendar,Photos and Microsoft Edge. Cannot connect to a corporate network.

Windows 10 Home

Which of the following is available in all editions of Windows 10 and require special hardware for use?

Windows Hello

Drag and Drop each component on the left to its description on the right.

Windows SIM: Creates and manages answer files. Sysprep: Removes machine specific information. DISM: Command line tool that can be used to manually capture, modify, and deploy a Windows image. Windows Configuration Designer: Creates provisioning packages. WinPE: A bare minimum version of Windows that can boot a system.

With Azure Active Directory join, what does the user need to provide to be automatically joined to Azure AD and enrolled in a mobile device management solution with no additional user interaction?

Work or school user ID and password

Which of the following are networking models that can be used with the Windows operating system? (select two.)

Workgroup and Client-Server

How can you add storage space to your OneDrive account?

You can purchase more storage for a monthly-fee

You need to develop and install a sideloaded app on the Windows 10 Professional systems within your organization. You plan to use a certificate purchased from Symantec to digitally sign the app prior to sideloading it on your Windows systems. Which of the following is true regarding this process?

You do not need to manually import the certificate used to digitally sign the app on each system.

Your user account is User1. You want to sign in to the corpwest domain from a computer that you haven't used before. You are at the sign-in screen. Just below the username and password fields, you see that this computer will try to sign in to the corpsouth domain by default. Which of the following should you enter in the username field to change the domain the computer signs onto?

corpwest\User1

netsh

displays TCP/IP information for both IPv4 and IPv6 addresses.

-n

displays addresses and port numbers in numerical form

-a

displays all connections and listening ports

ipconfig

displays all current TCP/IP network configuration values and refreshes the DHCP and DNS settings

You use a Windows client system on your desktop. Your company has started the migration to IPv6 on the network. You need to configure your computer with a static IPv6 address. Which command should you use to configure a static IPv6 address?

netsh

You have installed a test network with one server and two Windows workstations. All are running IPv6. You have disabled IPv4 and now want to test to make sure that IPv6 is used to communicate between hosts. You want to ping the link-local address for a host. Which command can you use to do this?

ping FE8-::AB13:7845:410C:9956%12

ping

verifies IP connectivity between two nodes in a network by sending ICMP packets and measuring response time in milliseconds

In the OSI Model, which of the following functions are performed at the Application Layer?

-Integration of network functionality into the host operating system -Enabling communication between network clients and services

You have a notebook computer running Windows that you use both at home and in the office. The laptop has both an Ethernet connection and a wireless network connection. At home, you have created a simple Ethernet network that connects your home computers to the internet through a cable modem. A friend comes over to your house for some help configuring his new laptop computer. His computer has a wireless network adapter, but not an Ethernet network adapter. He wants to connect his laptop to the internet through your network to download some drivers. What should you do? (Select two. Each option is part of the complete solution.)

-On your laptop, configure a network bridge. Set up an ad hoc wireless connection between his computer and yours. -Configure the wireless connection to use WPA2-Personal

You want to capture a system image to deploy Windows to multiple computers. You want to install Windows on the reference computer using an answer file. Which set of steps should you follow to create the answer file?

1. On a technician computer, insert the Windows product DVD. 2. Run Windows SIM and load a preloaded install image. 3. Select and edit the responses to the questions. 4. Validate the file in Windows SIM. 5. Save the answer file.

You've decided to use a subnet mask of 255.255.192.0 on the 172.17.0.0 network to create four seperate subnets. Which network IDs will be assigned to these subnets in this configuration? (2 answers)

172.17.128.0 172.17.0.0

You have conducted a risk analysis to protect a key company asset. You identify ff. values: *Asset value = 400 *Exposure factor = 75 * Annualized Rate of Occurrence =.25 What is the Annualized Loss Expectancy (ALE)?

75

You are designing a wireless network for a client. Your client needs the network to support a data rate of at least 54 Mbps. In addition, the client already has a wireless telephone system installed that operates at 2.4 GHz. Which 802.11 standards can be used in this situation? (Select two.)

802.11 a 802.11n

The file has been download to your local computer.

A white circle with a green border and green checkmark

tracert

tests connectivity between two devices and displays the path between them.

The Windows Network Diagnostics tool analyzes a computer's network connection and verifies connectivity. When connected to a domain, what does the Network Map display?

It displays your computer, the domain, and the internet.

Which of the following is *not* an accepted countermeasure to strengthen a cryptosystem?

Keep the cryptosystem a secret

You need to migrate specific application settings from ComputerA to ComputerB by using USMT. What should you do (Select two. Each answer is part of the complete solution.)

Run scanstate with the /genconfig option. Edit the config.xml file

Your company just installed new wireless access points. The access points use WPA2-Enterpise. The computers you are working with belong in the TestOut workgroup. You are at the point of the process where you need to configure 20 Windows 10 computers to connect to the access point. What should you do?

Use Windows Configuration Designer to create a provisioning package to complete the task. Run the package on each computer.

You have a workstation connected to a small branch network using a single switch. The network using a single switch. The network does not have any routers and is not connected to the Internet. What are the minimum configuration parameters required on the workstation to be able to communicate with all hosts on the network?

IP address and subnet mask

-s

displays per-protocol statistics

-o

displays the owning process ID associated with each connection

-r

displays the routing table

Which data transmission rate is defined by the IEEE 802.1 1b wireless standard?

11 Mbps

You need to determine the binary equivalent of the IPv4 address 192.68.1.1. Which is the correct binary version of this IP address?

110000.10101000.00000001.00000001

Assuming the network is indicated by the default portion of the IP address, which three of the following IP addresses belong to the class A network 114.0.0.0? (3)

114.0.0.15 114.122.66.12 114.58.12.0

You want to connect your client computer to a wireless access point connected to your wired network at work. The network administrator tells you that the access point is configured to use WPA2-Personal with the strongest encryption method possible. SSID broadcast is turned off. Which of the following must you configure manually on the client? (Select three.)

AES, Pre-shared key, and SSID

After an intrusion has occurred and the intruder has been removed from the system, which of the following is the best next step or action to take?

Back up all logs and audits regarding the incident

Which of the following would require you to enter a product key to activate Windows 10?

Buying a new or refurbished device running Windows 10.

Which of the following are limitations of a standard user account? (Select three.)

Can change some settings that apply only to themselves. Can use applications, but cannot install them. Cannot run applications in an elevated state.

You have been asked to draft a document related to evidence gathering that contains details about personnel in possession and control of evidence from the time of discovery up through the time of presentation in court. What type of document is this?

Chain of custody

What is the most important element related to evidence in addition to the evidence itself?

Chain of custody document

Key Management Services (KMS) activation

Commercial-Volume Licensing

Microsoft Active Directory activation

Commercial-Volume Licensing

Can be written, read many times, erased, rewritten, and has a capacity of about 650 MB.

Compact Disc (CD-RW)

First developed to store digital music. Later, was adapter to store digital computer data.

Compact disc (CD)

Password restrictions that must be met for all user accounts

Computer Configuration Policies

Software that should be installed on a specific computer

Computer Configuration Policies

What is the basic purpose of the OSI Physical layer

Coordinates rules for transmitting bits.

Always on VPN

Enterprise

You updated a driver from the manufacturer's website, and not it is making your system unstable. You have decided to restore your system to a restore point. Which two options allow you access the restore points on your system.

Go to System Properties and then System Protection Use your installation media and run a repair.

Which protocol is used to securely browse a website? HTTPS SSH ARP UDP SIP

HTTPS

Cortana

Home,Pro, and Enterprise

You manage several Windows systems that are members of a domain. Your company has an internal website that requires HTTPS. The website's certificate is self-signed. You use HTTP to browse to the website and receive the warning message as seen in the image. What must you do to prevent the warning message from appearing when you access the website?

Import the website's certificate into the Trusted Root CA list.

A user made some modifications on the Advanced tab in Internet Explorer's Internet Options, and now she is having some problems. How do you restore the default Internet Properties settings with the least amount of effort?

In Internet Options on the Advanced tab, click Restore advanced settings

You are managing a workstation that is not part of a Windows domain. Users on this computer should not be permitted to download applications from the Windows Store. Which administration tool can you use to enable a policy that turns off the Store application for all users on this computer?

Local Group Policy Editor

Which type of Data Loss Prevention system is usually installed near the network perimeter to detect sensitive data that is being transmitted in violation of organizational security policies?

Network DLP

You are configuring a small Workgroup. You open System Properties on each computer that will be in the Workgroup. Click the System Properties options you can use to configure each computer's workgroup association. (Select two. Each option is a complete solution.)

Network ID and Change

Hardware manufacturer activation

OEM-Preinstalled

What is a network resource in the directory?

Object

You have two computers. ComputerA is running Windows 7. ComputerB is running Windows 10. You need to migrate all user profiles and data files from Computer A to Computer B. Which command options must you include to ensure the user accounts on the destination computer are created and enabled during the migration?

On ComputerB, run loadstate with the /lae and /lac options

You are installing Windows on a new computer. Using the RAID controller on the motherboard, you configure three hard disks in a RAID S array. You leave the array unpartitioned and unformatted. You edit the BIOS boot order to boot from the optical drive. You insert the installation DVD, boot to the disk, and start the installation. When you are prompted to select the disk where you want to install Windows, the RAID array you created does not show as a possible destination disk. What should you do?

On the screen where you select the disk to install Windows, click Load Driver.

Your job requires a considerable amount of travel. While working in your office, you use a Windows desktop system. While on the road, you use a Windows tablet device. While traveling, you frequently need to access files stored on the desktop system from your tablet device. Which Windows service can you implement to use your tablet to access files stored on the desktop?

OneDrive

A file or folder cannot be synced.

OneDrive icon with a solid red circle containing a white X

Your account needs attention. Select the icon to see the warning message displayed in the Activity Center.

OneDrive icon with a yellow triangle containing an exclamation mark

Which of the following TCP/IP protocols do email clients use to download messages from a remote mail server? SMTP POP3 SPC FTP SNMP

POP3

The file or folder has settings that prevent it from syncing.

Padlock

You have discovered a computer that is connected to your network that was used for an attack. You have disconnected the computer from the network to isolate it from the network and stop the attack. What should you do next?

Perform a memory dump

Match each layer of the TCP/IP model on the left with the corresponding layer of the OSI model on the right. Each option on the left can be used more then one.

Presentation--Application Data Link--Network Access Application--Application Session--Application Network--Internet Transport--Host-to-host

Which Settings app category would you use to configure options such as: Letting apps use your advertising ID for experience across apps Letting apps use your camera Letting Windows track app launches to improve Start and search results Inking and Typing personalization Enabling or disabling Location Services

Privacy

Management has decided to purchase new desktop systems for the users in the engineering department. A needs assessment has determined that the systems must meet the following requirements: The systems must be joined to the organization's existing Active Directory domain. The systems must support high performance device configuration Whole disk encryption must be implemented with BitLocker. The system must support virtualization technology using Hyper-V Virtual Machine Manager. A sales rep from a computer manufacturer recently offered you a very competitive price on desktop systems with the following specifications: CPU:64 bit AMD 3.0 GHz quad-core RAM:8 GB Hard disk: 1TB Operating system: Windows 10 Pro for Workstations What should you do?

Purchase the desktop systems as configured and implement them in the network

You have a computer that runs Windows and is connected to a domain network with a DHCP server. One day you find that your computer cannot connect to any network resources. You run the ipconfig command and find that the network connection has been assigned the address of 169.254.12.155 with a mask of 255.255.0.0. Which of the following actions should you take?

Run the ipconfig /release and ipconfig /renew commands

Your company has started the migration to IPv6 on your network. Your network administrator tells you that the network is using stateless autoconfiguration. You need to reconfigure your computer to use the correct IPv6 address, default gateway address, and DNS server address. After accessing the Internet Protocol Version 6 (TCP/IPv6) properties for the network adapter, what should you do?

Select "Obtain an IPv6 address automatically and Use the following DNS server address".

You are a contract support specialist managing the computers in a small office. You see that all the computers are only using local user accounts. Which of the following models could this office be using? (Select two.)

Standalone and Workgroup

Which of the following statements are true regarding creating user accounts? (Select two.)

The Computer Management method allows you to restrict the user from changing their password. The Windows settings app requires you to create three security questions

When conducting a risk assessment, how is the Annualized Rate of Occurrence (ARO) calculated?

Through historical data provided by insurance companies and crime statistics.

You want to change the speech voice from Microsoft David to Microsoft Zira. Under which Settings app category would you locate this option?

Time & Language

Which OSI model layer is responsible for guaranteeing reliable message delivery?

Transport

Windows Autopilot depends on a variety of internet-based variety. Access to these services must be provided for Autopilot to function properly. Which of the following should you ensure are applied in order to achieve proper Autopilot functionality? (Select two.)

Using DNS name resolution for internet DNS names Having access to all hosts via ports 80,443, and 123

You are using your Windows 10 notebook computer at a coffee shop. You notice that your notebook has automatically connected to a wireless network that you do not trust. In the Settings app under Network & Internet, which link should you access for the option to disconnect from this wireless network and reconnect to a network you trust?

Wi-Fi

Which service allows a device to set up to a higher version of Windows?

Windows Subscription Activation

With the free version of OneDrive, your files stay in the Recycle bin anywhere from 3 to 30 days as long as you don't exceed which percentage of your storage?

10%

match each Networking function or device on the left with its associated OSI model

Application--HTTP Presentation--ASCII Session--Session ID Number Transport--Port Numbers Network--Router Data Link--Switch Physical--Modem

You do not want any on-premises servers, and you want users to be able to sign in and access both internal and external resources. Which option would you select for user accounts?

Azure AD accounts

Which of the following is intended for organizations that do not have an on-premises Windows Server, Active Directory Infrastructure?

Azure Activity Directory Join

Scripts that should run at startup or shutdown

Computer Configuration policies

Your account is blocked.

OneDrive icon with a red "no entry" icon

The file or folder has been shared with other people.

White cloud with blue borders and a people icon

You have a new Windows notebook system with both wired and wireless network adapters. You want to configure a small wireless network at home. You install an access point/router device that connects your network to the internet. You have turned off SSID broadcast on the access point. You will connect devices using a pre-shared key. You need to configure your notebook to connect to the wireless network. You would like to use the most secure method available as well. What should you do? (Select two. Each option is part of the complete solution.)

- Use WPA2-Personal security - Manually create a network profile.

You have a small wireless network with 10 client computers configured in a Workgroup. You need to secure the wireless network using the most security and least amount of effort. You also want to do this without replacing any of the existing wireless infrastructure. Which tasks should you perform to secure the network? (Select two.)

-Configure each client with the same key. - Implement WPA2-Personal

In the OSI Model, which of the following functions are performed at the Presentation Layer?

-Encrypt and compress data -Specify data format (such as file formats)

Which of the following are functions of the MAC sublayer?

-Letting devices on the network have access to the LAN -Defining a unique hardware address for each device on the network

The Data Link Layer of the OSI model is comprised of two sublayers. What are they?

-MAC (media access control) -LLC (logical link control)

What are the most common types of files used to install Windows desktop applications? (Select two.)

.exe .msi

Prior to capturing the system image, you need to use the sysprep utility to prepare a system image for deployment to other computers. Which option must you use with sysprep to remove machine specific information from the installation?

/generalize

Drag each scanstate command option on the left to the description of its function on the right.

/o : allows overwriting of existing data /ue : specifies user(s) to omit from migration /ui : specifies user(s) to be migrated /p : generates a space estimate

Drag each loadstate command line option on the left of its function on the right.

/ui : specifies user(s) to be migrated /ue : specifies user(s) to omit from migration /lac : creates user accounts /lae : enables user accounts

Put the network troubleshooting steps in the proper order.

1)Identify the scope of the problem 2) Check IP address configuration 3) Check hardware configuration 4) Perform communication tests

You are using a Premium account for OneDrive. How long will your files stay in the Recycle Bin?

93 days

You want to connect a laptop computer running Windows to a wireless network. The wireless network uses multiple access points and is configured to use WPA2-Personal security. SSID broadcast has been disabled. Which type of authentication method and encryption combination should you use for the strongest security possible?

A pre-shared key and AES encryption

When you initially installed your Windows system, you created a Microsoft online account and received the default allocation of OneDrive storage space. You have found that you are storing enough files in the OneDrive folder that you are nearly out of space. You need to add more capacity, so you have opened the OneDrive Settings dialog as shown below. Which tab contains the option to increase your OneDrive storage capacity?

Account

You purchased a copy of Windows 10 Pro for Workstation from a Microsoft reseller. You need to activate the software. Which methods would you use?

Activate the license over the Internet or call Microsoft.

What is the name of the service included with the Windows Server operating system that manages a centralized database containing user account and security information?

Active Directory

Desktop users access an in-house application that is hosted on your intranet web server. When users click a specific option in the application, they receive an error message that the pop-up was blocked. How do you configure the security settings so that users can see the pop-up without compromising overall security?

Add the URL of the website to the Local intranet zone.

You recently developed a productivity app for your Windows 10 systems and now need to sideload it on the Windows 10 Professional systems in your organization. Which PowerShell cmdlet can be used to do this?

Add-AppxPackage

There are registry-based settings that can be configured within a GPO to control the computer and the overall user experience, such as: Use of WIndows features such as Bitlocker, Office Files, and Parental Controls Customize the Start Menu, taskbar, or desktop environment Control Notifications Restrict access to Control Panel features Configure Internet Explorer features and options What are these settings known as?

Administrative Templates

You recently purchased a large number of Windows 10 systems for deployment in a university writing lab. These system already have Windows 10 Professional installed and configured. You need to customize these systems to work in an open lab environment, where they will be used by many different people. For each system, you need to: Configure a device name Configure Wi-Fi network settings Join an AD domain Configure the device for shared use Configure a test-taking account using the Take a Test app Because of the large number of systems involved, you need to complete these tasks as efficiently as possible. Click the best option in the Windows Configuration Designer start page to do this.

Advanced provisioning

You have two computers. ComputerA is running Windows 8.1, and ComputerB is running Windows 10. You need to migrate all user profiles and data files form ComputerA to ComputerB. In Command Prompt, you have entered the following command: Loadstate f:\UserA_Profile /i:migapp.xml /ui:UserA /ui:* /lac /lae What will the result of this command be?

All of UserA's information is migrated, and UserA's account is disabled

Which of the following is an important aspect of evidence gathering?

Backing up all log files and audit trails

When duplicating a drive for forensic investigative purposes, which of the following copying methods is most appropriate?

Bit-level cloning

Was originally developed for high definition video (expanded content on movie discs), but can also be used for data storage.

Blu-ray Disc (BD)

Uses blue laser light which has a shorter wavelength, which allows data to be packed more tightly on the disc and is rewritable.

Blu-ray disc (BD-RE)

To deploy Windows 10, you want to use the Windows 10 installation on a selected computer as a system image. After removing machine-specific information from the computer, you are ready to capture the image as a WIM file. What should you do?

Boot to Windows PE and use MDT to capture the Windows installation onto a network share.

Windows accessibility options can be enabled to support users with physical limitations. Which of the following items can be configures in the Settings app under Ease of Access

Change brightness and automatically or use night light, Select the primary mouse button, Change the size and color of your cursor and mouse pointer.

You have downloaded a custom app from a vendor that you want to sideload. In PowerShell, you have used the import-module appx and add-appxpackage cmdlets, but you are getting an error. What should you do next?

Check for the root certificate and verify the digital signature for the app.

Your windows workstation has a binary IP address of 00001010.00000000.00000000.01000001 assigned to it. Which class of IP addresses does this address fall within?

Class A

You manage a server that uses an IP address of 192.168.255.188 with a mask of 255.255.0.0 Which of the following describes the address type?

Classless

You recently set up a DHCP server, and you need to configure your computer to start using it. Click the IPv4 Properties option that you would select to use the DHCP server to receive IP configuration information.

Click "Obtain an IP address automatically"

You are performing an installation of Windows 10 on a desktop PC that uses a newly configured RAID 1 disk array. You booted the system from the Windows 10 installation DVD and navigated through the first few screens of the installation wizard. You've reached the following screen. What action should you take?

Click Custom: Install Windows only (Advanced)

Several weeks ago, you installed a desktop application on your Windows system using the default parameters suggested by the application installer. After using the application for a time, you realize that you need an optional application feature that wasn't included in the default installation. You have opened the Settings app and have navigated to the Apps & features page. You have also selected the application. Using the least amount of effort, what would you do to add the optional features?

Click Modify

Single- sided discs can hold about 4.7 GB of data. Dual-layer discs can hold up to 8.5 GB of data.

Digital Versatile Disc (DVD)

You have just received a new laptop that you will use on your company network and at home. The company network uses dynamic addressing, and your home network uses static addressing. When you connect the laptop to the company network, everything works fine. When you take your laptop home, you cannot connect to devices on your home network or to the internet. You run ipconfig on the laptop and receive the following output: Connection-specific DNS Suffix . . :IPv4 Address. . . . . . . . . . . . : 169.254.22.74Subnet Mask . . . . . . . . . . . . : 255.255.0.0Default Gateway . . . . . . . . . . : You need to be able to connect to both the company network and your home network with the least amount of configuration and cost. What should you do?

Configure an alternate TCP/IP configuration

An employee in your organization has started to work from home two days a week. The employee uses the same company laptop at the office and at home. The laptop automatically connects to the wireless network in the office, but it does not automatically connect to the employee's home wireless network. The employee would like the laptop to connect automatically both at home and at work. What should you do?

Configure an alternate TCP/IP configuration on the laptop's wireless adapter to use a static IP address that is compatible with the home network

Which of the following tasks is associated with the Session layer?

Connection establishment

The UDP transport protocol provides which of the following features? (Select all that apply.) Sequence numbers and acknowledgements. Connectionless datagram services. Low overhead Guaranted delivery

Connectionless datagram services. Low overhead.

You are using Cortana, and you would like to configure it to respond even when the screen on your device is locked. Which Settings app category would you use to make the changes?

Cortana

Your company has started the transition to IPv6. You need to configure records on the DNS server so that clients can submit a hostname query and receive back an IPv6 address for the specified host. What should you do?

Create AAAA records

Your company has started the transition to IPv6. You need to configure records on the DNS server so that clients can submit an IPv6 address and receive the hostname for that computer. What should you do?

Create PTR records

How can a criminal investigator ensure the integrity of a removable media device found while collecting evidence?

Create a checksum using a hashing algorithm

You have two computers. ComputerA is running Windows 8.1, and ComputerB is running Windows 10. You are using USMT to migrate the user profiles and the default date files from ComputerA to ComputerB. The user works with graphics, so you must also include .jpg files. Which actions should you take to specify that the migration includes all .jpg files?

Create a custom XML file

All your users work remotely. One of your users buys a notebook computer with Windows 10 Pro from an online store. The computer is to be used for company business. You need to upgrade the computer to Windows 10 Enterprise and join it to the CorpNet.xyz domain. You have the proper Microsoft 365 subscription and all other required licenses. What do you do?

Create a provisioning package and email it to the user with instructions on how to run it.

You need to install Windows 10 Enterprise edition on multiple computers. Each computer has a single SATA hard drive, a PXE-compliant network card, a DVD drive, and several open USB ports. You will not use WDS or MDT for the installation. When you start each computer, you would like the computer to boot and start the installation process automatically without any intervention. You want to minimize the actions that you must perform on each computer. What should you do next?

Create an Unattend file on a USB drive. On each computer, edit the BIOS to boot from the optical drive first. Insert the Windows installation disk into the DVD drive and the USB drive into a USB port.

Using a USB flash drive, you intend to install Windows 10 on several computers. To save time, you would like to automate the installation of Windows 10 for each computer. What should you do?

Create an answer file names unattend.xml. Place the file on a USB flash drive and run setup.exe.

You manage a large number of workstations that belong to a Windows domain. You want to prevent anyone that might try to gain access to a computer from guessing login information by trying multiple passwords. Which GPO contains a policy you can enable to guard all computer in the domain against this security breach?

Default Domain Policy

Which of the following describes the role of a DHCP server (select two.) ?

Delivers DNS server addresses and other configuration information to hosts. Automates the process of assigning IP Addresses, subnet masks, and default gateway addresses to network hosts.

To determine the value of the company assets, an anonymous survey was used to collect the opinions of all senior and mid-level managers. Which asset valuation method was used?

Delphi method

You are creating a reference Windows 10 image that will be used on 100 computers. Each of these systems needs a custom app to be sideloaded. Which tool is used to add the sideloaded app package to the image?

Deployment Image Servicing and Management

You have just finished installing Windows 10 on a reference system from which you need to capture an image. You've already removed device-specific information from the system and are ready to capture the image files. Which tools can you use to do this?

Deployment Image Servicing and Management

You manage a Windows system connected to a business network that uses switches and multiple subnets. You connect a workstation to the 192.168.1.0/24 subnet. The workstation can communicate with some hosts on the private network, but it cannot communicate with other hosts. You enter ipconfig /all in Command Prompt and see the following output: Ethernet adapter Local Area Connection: Connection-specific DNS Suffix . : mydomain.local Description . . . . . . . . . : Broadcom network adapter Physical Address . . . . . . . : 00-AA-BB-CC-74-EF DHCP Enabled . . . . . . . . . : No Autoconfiguration Enabled. . . : Yes IPv4 Address . . . . . . . . . : 192.168.1.102(Preferred) Subnet Mask . . . . . . . . . : 255.255.255.0 Default Gateway. . . . . . . . : 192.168.2.1 DNS Servers. . . . . . . . . . : 192.168.2.20 What should you do?

Edit the IPv4 properties and change the default gateway

You manage a small network with Windows clients, multiple subnets, and servers. You want your computer to be able to resolve a hostname for a server on your network to its IPv4 address. Which should you do? (Select two. Each answer is a complete solution.)

Edit the hosts file on the computer. Add an A record on the DNS server

You are trying to listen to audio CDs on a Windows system, but no audio is coming from the speakers. After checking the speaker cables, volume level, and the mute feature, you check Device Manager and see the dialog box image shown in the image below. What should you do?

Enable the SoundMAX Integrated Digital HD Audio Driver device

What is a collection of related domain trees?

Forest

On the C: drive, what is the difference between the Program Files folder and the Program Files (x86) folder?

Program Files keeps 64-bit files, while Program Files (x86) keeps 32-bit files

You have received a new laptop for use at work. It is running Windows. You've configured the wireless adapter to connect to the network at work. You also have a wireless network at home, and you have configured a second profile for your home network. For several weeks, the wireless connection has worked fine. Whether you are at home or at work, you can start your computer and make a connection without browsing for the list of available networks. One day, you come to work to find that you can't connect to the network. You check with the network administrator, and he states that he has prevented the SSID of the company wireless network from being visible. You need to reconfigure your system to connect to the company wireless network now and in the future in the easiest manner possible. What should you do?

In the wireless network profile, select Connect even if the network is not broadcasting its name (SSID)

Last month, you deployed Windows 10 Enterprise to all of the desktop computers in your company using a single system image. To install this image, you created a WinPE boot CD. You recently received new desktop computers, and one of your colleagues is not able to install the image using the WinPE CD. The WinPE CD cannot boot to the network drive. What should you do?

Install the latest hardware drivers for these new desktop computers on the WinPE image.

Your organization's in-house software development team has written a custom app that allows Windows 10 systems to connect to your company's sales database and update contact information for sales leads. During the process of developing and digitally signing the app, an .appx file and a root certificate were created. The root certificate is self-signed. What must you do before you can install the app on users' workstations?

Install the root certificate into each workstation's Trusted Root Certification Authorities certificate store

You manage a Windows computer that is being used by multiple people. One of the users installs a new Internet Explorer add-on that interferes with the browsing functionality of other users on the system, but the add-on is necessary for business purposes. What should you do?

Instruct the other users to log on and disable the add-on

Which of the following protocols allows hosts to exchange messages to indicate problems with packet delivery? DHCP IP IGMP ICMP ARP TCP

Internet control message protocol (ICMP).

You have a small network with a single subnet connected to the Internet as shown in the Exhibit. The router has been assigned the 2 addresses shown. You need to manually configure the workstation to connect to the network. The workstation should use RouterA as the default gateway and DNS1 as the DNS server address. From the drop-down options, select the appropriate parameters to configure the workstations TCP/IP settings.

Ip Address 192.168.12.46 Subnet 255.255.255.240 Default gateway 192.168.12.34 DNS Server 198.162.1.22

You have configured a Windows server in you network to provide activation for your Windows workstations using the Key Management Service (KMS) Which of the following are not true concerning activation in this network? (select two)

KMS activations are valid for 180 days. By default, the Windows client systems will attempt to renew their activation status every seven days.

You are using the Privacy category found in the Settings App. If you do not want to send your browsing habits to Microsoft, which option would you turn off?

Let apps use advertising ID to make ads more interesting to you based on your app activity.

Addresses that are valid on only the current subnet are known as:

Link-local

The chain of custody is used for which purposes?

Listing people coming into contact with evidence

You access the WidgetProject share on a server at your organization's headquarters over a WAN link using the following UNC path: \\FS3\WidgetProject. Click the zone this site belongs to by default in Internet options.

Local Intranet

Which of the following can be used to verify that the TCP/IP Protocol stack has been properly installed on the host?

Loopback

You manage the network for your company. You have recently discovered information on a computer hard drive that might indicate evidence of illegal activity. You want to perform forensic activities on the disk to see what kind of information it contains. What should you do first?

Make a bit-level copy of the disk

You manage a small office network with a single subnet. The network is connected to the internet. All client computers run Windows. A single server runs Windows Server 2016. The client computers are not joined to a domain. All hosts use IPv6 addresses on the private network. All computers on the private network are assigned host names (such as Computer1, Computer2, etc.). All hosts use the DNS server provided by the Internet Service Provider (ISP) to resolve hostnames for internet hosts. You need to implement a solution so that hosts on your private network can resolve hostnames for other hosts on the private network. You want to implement the solution with the least amount of effort. What should you do?

Make sure that LLMNR is enabled on all computers.

You are preparing to install Windows on a new computer. You copy the installation files from a DVD to a USB flash drive and then use bootsect to make the USB drive bootable. Using the RAID controller on the motherboard, you configure three hard disks in a RAID 5 array. Using disk tools, you create a single partition that takes up the entire array. You insert the USB drive and boot the computer. The computer boots and displays the following message: Error loading operating system. Reboot and select proper boot device. What should you do?

Modify the boot order to boot from the USB device in the BIOS.

Your notebook computer is configured to connect to the wireless network at work using a wireless profile named Company1. The profile is configured to connect using 802.11b. During a recent upgrade, your company added an 802.11n wireless access point. The access point is configured to support 802.11n using one radio and 802.11b/g with the other radio. You create a second profile on your computer for the 802.11n network. You notice that your computer is connecting automatically using 802.11b. You want the computer to connect to 802.11n whenever it's available and only use 802.11b if 802.11n is unavailable. What should you do?

Move the 802.11n profile up in the list of preferred networks

Which of the following functions are performed at the Physical layer of the OSI model?

Moving data across networking cables

When using Windows Autopilot deployment profiles to customize the Out-of-Box Experience, you can create a default deployment profile of settings for a device group. Which types of groups can you use? (Select two.)

Office 365, Security Group

You are using an Android tablet system. You need to get access to some of the files in your OneDrive account. Which option would you use?

OneDrive website

You have several personal mobile devices that you use on a daily basis. You want to be able to authenticate to each device with the same user account so you can share your personal data and apps regardless of which mobile device you use. Which type of user account must you create?

Online user account

You install a new internal sound card in your Windows system. After you reboot and install the driver, the device does not appear to be working. You need to view information for the device and perform troubleshooting steps. What should you do first?

Open Device Manager to view the status of the sound card.

On your Windows systems, you want to prevent Edge from leaving a trail of your browsing session. What should you do?

Open a new InPrivate window

You have a computer running Windows 8.1. You want to migrate to Windows 10 using a wipe-and-load migration to transfer files and folders.. Which of the following methods could you use?

PCmover Express

You have two computers. ComputerA is running Windows 7 Professional, and ComputerB is running Windows 10 Professional. You need to transfer user profiles and data files from ComputerA to ComputerB. Which tool should you use?

PCmover Express

Which Settings app category would you use to customize the appearance and behavior of the Start menu?

Personalization

You manage a Windows network environment. As part of your IPv6 migration strategy, you have implemented ISATAP on your network. You would like to test the communication of a client computer using ISATAP. What should you do?

Ping the address beginning with FE80:

You recently installed Windows 10 on a reference system and have captured an image from that system. Since creating the image, you have determined that several customizations need to be made. Rather than reconfigure the reference system and recapture the image, you decide to use the Windows Configuration Designer to create a provisioning package that can be used to apply the customizations after the image has been deployed. Click the options in the Windows Configuration Designer start page that you could use to create this package (select two.)

Provision desktop devices, and advanced provisioning

Due to a blackout, power is no longer coming from the wall outlet and your computer is now off. You do not have a UPS and you need to remove a disc out of the DVD drive. What is the easiest method to retrieving the disk?

Push an unbent paper clip into the hole on the front of the drive.

You want to implement 802.1x authentication on your wireless network. Which of the following will be required?

RADIUS

After you upgrade a video driver on a Windows system, the screen becomes unresponsive. You need to get the system working properly with the least amount of effort and time. Which of the following options can you use to get your Windows system back to a stable state? (Select two. Each option is a complete solution.)

Reboot the computer into Safe Mode and use Device Manager to roll back the driver. Reboot the computer with the Windows installation disk and select Repair Your Computer to launch the System Restore utility.

Your company has developed and implemented countermeasures for the greatest risks to their assets. However, there is still some risk left. What is the remaining risk called?

Residual risk

After completing a clean installation of Windows 10, you realize your computer is unable to connect to the network. You decide to open Device Manager to see if you can identify the problem. Based on this screenshot of Device Manager, which action should you take to resolve the issue? (The issue is RealTek RTL8139C Fast Ethernet Controller's driver is unavailable.)

Right-click the RealTek RTL8139C Fast Ethernet Controller and click Update Driver Software.

You want to capture your Windows installation as a system image. You need to remove any computer-specific information from the computer prior to capturing the image.

Run Sysprep

You want to deploy Windows 10 to multiple computers using a system image. You would like to use an answer file to automate the installation process of a reference computer. What should you do first?

Run Windows System Image Manager (Windows SIM)

You have a stand-alone dual-boot system running both Windows 7 and Windows 10. The computer currently boots to Windows 7 by default. You need the computer to boot to Windows 10 by default instead.

Run bcdedit.exe

Your network has just transitioned from using IPv4 to IPv6. IPv6 configuration is performed automatically using information received by network routers. The network does not use a DHCPv6 server. Your Windows system is unable to communicate with a server named Srv1. A ping test to the server works using its IPv6 address, but it fails when you use its hostname. What should you do?

Run netsh with the add dnsserver option

You have a computer that runs Windows 7. You want to perform a clean installation of Windows 10 and maintain as much of the application settings, user profile, and user data as possible. Which steps should you perform to complete the migration with the least amount of effort possible?

Run scanstate in Windows 7. Perform a custom (advanced) installation of Windows to the existing hard drive. Boot into Windows 10 and re-install all applications. Run loadstate.

You have a computer running Windows that is connected to a domain network. After reconfiguring the static address of an internal web server named WEB3, your computer can no longer connect to WEB3. But other users are still able to connect to the same web server. You need to be able to connect to the website on the WEB3 server. Which of the following actions should you take?

Run the ipconfig /flushdns command

Your network has just transitioned from IPv4 to IPv6. IPv6 configuration is performed automatically using stateful DHCPv6. A DNS server on your network provides name resolution for IPv6. Your Windows system is having problems communicating on the network. You would like to receive new configuration information from the DHCP server as well as remove all old DNS entries in your local DNS cache. Which of the following actions should you take? (Select two. Each answer is part of the complete solution.)

Run the ipconfig /release6 and ipconfig /renew6 commands. Run the ipconfig /flushdns command

You have a Windows laptop that uses DHCP for IPv4 addressing information. You need to see the IPv4 address, subnet mask, and DNS server addresses that the network connection is currently using. Which of the following actions should you take? (Select two. Each answer is a complete solution.)

Run the netsh command. Run the ipconfig and ipconfig /all commands

What protocol sends email to a mail server? TFTP FTP POP3 SMTP SNMP

SMTP

Which of the following wireless network methods make it easy for clients to find and connect to the wireless network?

SSID broadcast

You have an app installed on your Windows system that has not been pinned to your Start menu. How can you locate the app? (Select two. Each answer is a complete solution.)

Search for the app by typing its name in the search field on the taskbar. Click the Start tile, and then scroll through the list of apps.

You manage desktop systems for a small organization. Currently, all of your systems have the following hardware installed: CPU:AMD Sempron 2.8 GHz Memory: 2 GB Hard disk: 500 GB Windows 10 Home Edition came pre-installed on all of the systems, and they are currently configured to run in a workgroup environment. Your organization recently decided to implement a Window Server 2016 with Active Directory installed. Management has asked you to join your Windows 10 client systems to the new domain. What should you do?

Upgrade the desktop systems to Windows 10 Professional

Management has decided to purchase new notebook systems for the users in the marketing and sales department. After conducting a needs assessment, they have determined that the new systems must meet the following requirements: The systems must be joined to the organizations Active Directory domain. Application restrictions must be implemented with AppLocker Whole disk encryption must be implemented with BitLocker. The notebooks must support remote connections to your organization's DirectAccess server, as sales rep travel frequently. A sales rep from a computer manufacturer recently offered you a very competitive price on notebook systems with the following specifications: CPU:64-bit AMD 3.6 GHz quad-core Ram:8GB Hard disk:2TB Operating System: Windows 10 Pro What should you do?

Upgrade the operating system to Windows 10 Enterprise

You have several computers running Windows 10. The computers are members of a domain. For all computers, you want to remove access to administrative tools from the Start menu and hide notifications from the System Tray. What should you do?

Use Group Policy

You have fifteen Windows 10 computers in a workgroup. Your task is to create a Local User account on each computer called BackupAdmin. The account must be part of the Backup Operators Group. What should you do?

Use Windows Configuration Designer to create a provisioning package. Run the package on each computer.

You have been asked to install Windows 10 on several computers that do not have optical drives. What should you do? (Select three. Each choice is part of the entire solution)

Use a USB flash drive with at least 4 GB of storage space; Copy the product DVD to a USB flash drive and boot from the drive; Use the bootsect command to make the USB flash drive bootable.

Scripts that should run at logon or logoff

User Configuration policies

Software that should be installed for a specific user

User Configuration policies

Your Windows system has an application installed on it that you no longer need. What should you do?

Using the setting app > apps & features, locate the application and click uninstall

You manage a Windows system connected to a business network that uses switches and multiple subnets. One day you find that the computer is unable to connect to the internet, but it can communicate with a few other computers on the local subnet. You enter ipconfig /all in Command Prompt and see the following output: Ethernet adapter Local Area Connection: Connection-specific DNS Suffix . : mydomain.localDescription . . . . . . . . . . : Broadcom network adapterPhysical Address . . . . . . . . : 00-AA-BB-CC-74-EFDHCP Enabled . . . . . . . . . . : YesAutoconfiguration Enabled. . . . : YesIPv4 Address . . . . . . . . . . : 169.254.155.1(Preferred)Subnet Mask . . . . . . . . . . : 255.255.0.0Default Gateway. . . . . . . . . :DNS Servers. . . . . . . . . . . : What should you do?

Verify that the DHCP server is up and functional

You need an app for employees to manage their time off requests with human resources. You find an app that fits your needs perfectly from a website called freeapps4u.ru. You know you could download the app and sideload it onto the Windows 10 devices. What should you do?

Verify that the app is from a trusted source

Which of the following offers the weakest form of encryption for an 802.11 wireless network?

WEP

You need to add security for your wireless network. You would like to use the most secure method. Which method should you implement?

WPA2

You can use a Windows notebook system that is a member of the domain on your network at work. You need to configure the wireless network card in the system to connect to the wireless network at work. The connection should require a username and password for authentication using AES encryption. Which type of security standard should you use while configuring the connection?

WPA2-Enterprise

When would choosing to do nothing about an identified risk be acceptable?

When the cost of protecting the asset is greater than the potential loss

The file or folder is only available online when you're connected to the internet.

White cloud with blue borders


Related study sets

Explain the main goal of chemistry

View Set

Exam II. Chapters 7-12 in Cockerham

View Set

AP Human Geography - Unit 2 TEST STUDY GUIDE Part 1

View Set

Nutrition Chapter 5: Carbohydrates DR AL

View Set

Moneyball: The Art of Winning an Unfair Game

View Set

Ch 18 - Personal Selling and Sales Promotion

View Set

Chem 144 Final Exam Prep (Labs 5-10)

View Set

RN Mental Health Online Practice 2019 A With NGN

View Set