Windows 8 Final

Ace your homework & exams now with Quizwiz!

It is possible to create a share that is invisible to users browsing the network simply by appending what character to the end of the share name?

$

Windows Installer uses what file format for single package application installations?

.msi

A Windows Firewall policy file has what file extension?

.wfw

How many active partitions can a hard disk hold?

1

How many primary partitions are supported on a GPT partitioned disk?

128

Considering the listed hardware specifications of your company's computers, which one of the listed specifications would disqualify the computer from being able to have the 64-bit edition of Windows 8 installed on it?

16 GB HDD free space

What is the maximum disk size supported when using GPT partitioning?

18 exabytes

What is the maximum support file name length in the NTFS file system?

255 characters

IPv4 addresses are how long?

32 bits

Remote Assistance requires that access to what port be available on the requesting client?

3389

Using a single Microsoft account, on how many Windows 8 devices can you install a specific Windows app?

5

By default, what is the maximum amount of disk space that will be allocated to the BranchCache data cache?

5%

What is the recommended maximum partition size for exFAT partitions?

512 TB

Before you can convert a basic disk to a dynamic disk, what is the maximum sector size that you can have configured for the disk?

512 bytes

How many basic and advanced permissions does NTFS provide for assignment to a folder or file?

6 basic, 14 advanced

Computers running Windows PE will automatically shut down and reboot after how long?

72 hours

Which IEEE wireless networking protocol was ratified in 1999 and has a maximum defined data rate of 11 Mb/sec?

802.11b

When using BitLocker To Go, which of the following that is typically associated with BitLocker is not required to unlock the drive?

A TPM chip

Which of the following items would not meet the requirements for a DirectAccess server?

A connection to the Internet through a NAT proxy

What does the IP address of 10.240.0.0 with a subnet mask of 255.255.255.0 represent?

A network address

What is Wi-Fi Direct?

A new Microsoft implementation of ad hoc wireless networking

Generally speaking, which of the following password conditions is not considered to be part of a strong password?

A predictable password

An access control list (ACL) is a collection of individual permissions, which are called what?

Access control entries

What must your organization have in place to generate the encryption certificate that is required to become a Data Recovery Agent?

Active Directory Certificate Services

What PowerShell cmdlet would you need to use to install a critical Line of Business (LOB) Windows App that has been created within your organization?

Add-AppxPackage

When an administrator attempts to perform a task that requires administrative access, the system switches the account from the standard user token to the administrative token. What is this known as?

Admin Approval Mode

When configuring Windows Defender, which setting provides options for scanning within archives?

Advanced

Windows 8 provides three basic methods for sharing the files and folders on the computer. Which of the listed items is not one of these methods?

All folder sharing

What happens when the secure desktop is presented to a user?

All other desktop controls are completely suppressed.

When deciding what your auditing policy should be, there are some key things to consider to help you decide which computers, resources, and events you want to audit. Which of the items listed is not one of the items typically considered?

Allow users of computers the ability to manage the logs on those computers.

Software restriction policies can work in three ways, based on the settings you choose for each of the rules. Which of the following is not one of the settings to choose from?

Allowed

When Defender detects a potentially dangerous installation, it alerts and prompts the user to take an action. Of the available actions, which one could be considered to be the least secure option?

Always allow

The App-V system architecture is composed of several components. Which of them is responsible for preparing applications for virtualization?

Application Virtualization Sequencer

Which of the following is not an allowed gesture for a picture password?

Arcs

Digital certificates, smart cards, picture passwords, and biometrics are used to perform what action?

Authentication

When creating AppLocker rules, which option should you choose first to start the option to allow all currently installed Windows apps to run, with the exception of one that you will select later?

Automatically Generate Rules

You have PhotoShop Elements installed on your Windows 8 computer. You want PhotoShop Elements to automatically be launched every time you plug in a memory card that contains photos. What setting do you need modify?

Autoplay settings

If you have Windows 8 Professional workstation clients on your network, what single BranchCache protocol will they be limited to using?

BITS

You want to allow three employees in your company the ability to back up data on the computer. To which local group should you add their accounts in order to grant them the least amount of privileges required to perform their assigned duties?

Backup Operators

Which power plan on a portable Windows 8 system dims the display after 5 minutes?

Balanced (AC)

What name is given to a set of readings, captured under normal operating conditions, which you can save and compare to readings taken at a later time?

Baseline

The Windows Firewall in Windows 8 can have rules configured that allows traffic to flow in which direction(s)?

Both inbound and outbound

What is the main difference between BranchCache version 1 and version 2?

BranchCache V1 uses large, fixed-length file segments, while V2 uses smaller segments of variable length

You have a small number of Windows XP computers in your organization. You need to manually move as much data from the user profile locations for these computers as possible to the new Windows 8 computers these users will be receiving shortly. Where in the file system would you find the profile information?

C:\Documents and Settings

What keyboard combination will directly open the Task Manager in Windows 8?

CTL + SHIFT - ESC

What type of Software Restriction Policy rule identifies applications based on a certificate signed by the software publisher?

Certificate rules

What are the buttons called in the Windows 8 edge UI that provide access to common operating system functions such as Search and Settings?

Charms

Which IPv4 IP class provides for 126 unique networks, each having up to 16,777,214 hosts?

Class A

What name is used to describe the installation process where you boot from the Windows 8 setup disk and create or select a blank partition where the operating system will reside?

Clean installation

What feature does IE 10 offer that enables it to correctly display pages that were developed using older technologies?

Compatibility View

Which NTFS permission should you configure for a security group when you want members of the group to be able to edit existing files but not create new files?

Create Folders/Append Data

What is the first step that you must perform if you wish to give certain users in your organization priority access to a print device so that when a print device is busy, their jobs are processed before those of other users?

Create multiple printers.

What name is given to the user account(s) that have been authorized to recover BitLocker drives for an organization?

Data Recovery Agent

What is the largest danger that high-capacity removable storage devices pose to an enterprise network?

Data can be taken out of the network without authorization.

What Windows 8 feature prevents applications from executing code in prohibited areas?

Data execution prevention

What type of attack is occurring when attackers are replaying data packets on a wireless network?

Data tampering

Before performing an upgrade to Windows 8, several tasks should be performed to ensure the procedure goes smoothly. Which of the following is not one of these tasks?

Defragment the hard drive

To communicate with the operating system running on the computer, each device also requires a software element known as what?

Device driver

Which Device Manager view will display a list of device categories?

Devices by type

As a Windows 8 user, what can you configure within Windows 8 to protect your Personally Identifiable Information?

Disable Windows location

How can you go about obtaining Windows PE 4.0 for usage in your organization?

Download the Windows 8 Assessment and Deployment Kit

There are four types of rules in AppLocker. Which of the following is not one these rule types?

Downloaded App rules

On which tab of a driver's properties dialog box will you find buttons that will allow you to update, roll back, or uninstall the device driver?

Driver

Windows 8 supports multiple types of EAP-based authentication for VPN connections. Which of these is not supported for VPN connections?

EAP-TLS

While a Remote Assistance session is in progress, what keyboard key(s) can the requestor press to terminate the connection?

ESC

Which of the following wireless network attacks is a user of a public Wi-Fi hot spot most susceptible to?

Eavesdropping

If you plan to activate Public folder sharing in Windows 8, what must be done before you can select the Turn on sharing so anyone with network access can read and write files in the Public folders option on the Advanced sharing settings control panel?

Enable Network Discovery.

What Group Policy setting causes Windows 8 to save copies of files that users access from remote servers on a local drive, regardless of whether they are configured as offline files?

Enable Transparent Caching

On which tab of a driver's properties dialog box will you find information about the driver's provider and date of creation?

Events

By default, which accounts are assigned the Print permission?

Every account assigned to the Everyone special identity

When configuring Windows Defender, which setting allows you to prevent certain file types from being scanned?

Excluded file types

What can the powercfg.exe utility be used to accomplish that can be accomplished in no other way?

Export and import power management plans.

What uses a modified hiberfil.sys that contains only the essential kernel and driver elements of the operating system to enable both visibly and measurably faster boot times?

Fast Boot

Which of the following is not an option on the Second screen menu of Windows 8?

First screen only

Within the Windows UI, what option will you need to select to delete a wireless network profile?

Forget this network

A 2x2 MIMO device has how many total transceivers?

Four

What PowerShell cmdlet can be used to display the Event Logs?

Get-WinEvent

Which of the following is not one of the methods that the SmartScreen Filter uses to identify potential phishing web sites?

Group Policy

Which power plan is not shown by default in the Power Options control panel?

High Performance

What protocol is responsible for the end-to-end transmission of a packet, to its final destination on a network?

IP

In what scenario should you consider clicking the Go online to get the latest updates for installation option during an installation of Windows 8?

If the computer is connected to the Internet and you expect that Windows will have the drivers for the network adapter

How long after you complete the configuration of local security policies on a computer will it take for those policies to become effective?

Immediately upon completion of the configuration

When examining effective access, there are three rules that must be understood. Which of the following is not one of these rules?

Implicit permissions break permissions inheritance.

In which part of the Local Security Policy will you find settings that control how Windows 8 applies firewall settings on different networks?

In which part of the Local Security Policy will you find settings that control how Windows 8 applies firewall settings on different networks?

What is the first step to create a printer pool?

Install multiple identical print devices.

On your Windows Server 2012 server, what must you do to enable HTTP and BITS support for BranchCache?

Install the BranchCache feature

Before you can change the default search engine of IE 10 from Bing to something else, such as Google, what must you first do?

Install the appropriate add-on.

What feature of Windows 8 allows a computer to function as a router, providing Internet access to other computers in the same location?

Internet Connection Sharing

What is the paging file used for?

It allows Windows to store data that overflows system memory.

When you use BitLocker To Go on a Windows To Go USB drive, how is the internal TPM chip of the computer used?

It is not used at all.

During which phase of the Windows 8 startup process does the system run the Windows Executive (consisting of the Windows kernel and the HAL), which processes the registry hive and initializes the drivers and services specified there?

Kernel loading phase

For VPN connections involving Windows clients, what is typically the preferred protocol?

Layer 2 Tunneling Protocol (L2TP)

Which user profile type is automatically created the first time a user logs into a Windows 8 computer?

Local user profile

During what phase of the Windows 8 startup process is the Local Security Authority loaded?

Logon phase

What Windows 8 feature assigns one of four integrity levels to running processes?

Mandatory integrity control

What is the name of the security feature in Windows 8 that assigns various integrity access levels to processes running on the computer?

Mandatory integrity control

What volume type consists of an equal amount of space from two disks, both of which must be dynamic disks?

Mirrored volume

What is the executable file name for the Windows Installer application on a Windows 8 computer?

Msiexec.exe

Which of the following folders is not found as part of a default user profile?

My Contacts

What type of permissions control access to the files and folders stored on disk volumes formatted with the NTFS file system?

NTFS permissions

Which IPv6 address typeis the equivalent to the loopback address in IPv4?

Node local unicast

What is the name used for the file that contains a mandatory profile?

Ntuser.man

What Windows 8 feature provides a form of fault tolerance that individual users can employ to maintain access to their server files, even in the event of a network service failure?

Offline Files

When using distributed-cache mode for BranchCache, where is the cache hosted in the branch office?

On Windows 8 computers in the branch office

How many inbound Remote Desktop connections will Windows 8 allow?

One

When do data protection technologies such as the Windows 8 Encrypting File System (EFS) and BitLocker protect data?

Only when the data is stored on a disk

Which of the following is not an item that can be used when building Windows Firewall rules?

Packet sequence numbers

When mobile devices are controlled by a Mobile Device Mailbox Policy in Exchange 2013, what is the best way for the device owner to ensure the remote wipe command is issued as soon as possible, following loss of the device?

Perform the remote wipe from the Outlook Web App.

The members of which built-in security group have privileges that enable them to schedule the logging of performance counters, enable trace providers, and collect event traces on this computer, both locally and from remote locations?

Performance Log Users

In the OSI model, which layer is at the bottom and represents the hardware that forms the network?

Physical

Which of the following statements is true of Public folder sharing?

Places all shared files in a single location

When configuring folder redirection, which setting option could render the redirected contents inaccessible to the users at some point in the future?

Policy Removal

Which power plan on a portable Windows 8 system puts the computer to sleep after 15 minutes?

Power Saver (AC)

Which of the following methods is not a way to close unused apps that are still running on a Windows 8 computer?

Press Windows+C on the keyboard.

When using the Allow/Prevent installation of devices that match any of these device IDs setting in the Device Installation Restrictions folder of a GPO, what other setting must you ensure you also configure to provide the intended results?

Prevent installation of devices not described by other policy settings.

What is the intended function of the User Account Control (UAC) feature in Windows?

Preventing unauthorized changes to your computer

Which print architecture component is a computer (or standalone device) that receives print jobs from clients and sends them to print devices that are either locally attached or connected to the network?

Print server

Which print architecture component is the software interface through which a computer communicates with a print device?

Printer

On which tab of an Active Directory user's account object would you configure a roaming profile path?

Profile

To enable roaming profiles, what attribute would you need to modify on a user account?

Profile path

What is the name of the mode that IE 10 operates in by default that is designed to prevent attackers that penetrate the computer's defenses from accessing vital system components?

Protected mode

When the computer's network profile is set to a specific firewall location when you attempt to configure WinRM for the first time, WinRM will fail to configure the required firewall exception. What network profile location causes this problem?

Public

After changing the configuration of the User Account Control: Run all administrators in Admin Approval Mode setting, what must next be done to make the change effective?

Reboot the computer.

What is the name of the feature that enables an administrator, trainer, or technical specialist at one location to connect to a distant user's computer, chat with the user, and either view all the user's activities or take complete control of the system?

Remote Assistance

What is the name of the Remote Desktop Services feature that enables clients to run Remote Desktop server applications within an individual window?

RemoteApp

What tool extends the basic functionality provided in Task Manager with additional features and tools?

Resource Monitor

On which tab of a driver's properties dialog box will you find information about any conflicts the driver may be experiencing?

Resources

After updating a device driver, the device has started to malfunction. What should you do first to try and resolve this issue?

Roll back the driver

Windows SmartScreen has three levels of approval that can be configured to determine how it behaves. Which of the following does not represent one of those levels?

Run all downloaded apps, and submit to Microsoft for offline analysis.

Which VPN protocol encapsulates PPP traffic using the Secure Sockets Layer (SSL) protocol?

Secure Socket Tunneling Protocol (SSTP)

Where are user accounts stored for computers that are in a workgroup?

Security Accounts Manager

To create a new Microsoft account, where on your Windows 8 computer will you need to go?

Settings > Change PC Settings > Users

What type of permissions control access to files and folders shared over a network?

Share permissions

When planning your NTFS/Share permissions on storage spaces or volumes in which files/folders are shared, which of the following is generally considered the best approach?

Share permissions: Full Control, NTFS permissions: desired access

IE 10 supports multiple types of add-ons that can be used to extend the functionality of IE 10. Which of the following is not a supported add-on type?

Shell Extensions

In the scenario where you are installing Windows 8 on a new computer and plan to dispose of an old computer running Windows XP, which Windows Easy Transfer method would be most appropriate to use?

Side-by-side

The process used when Windows Store certification is bypassed for an app that is provided to internal users is known as what?

Sideloading

What volume type consists of space from a single disk?

Simple volume

Which IPv6 address scope was originally intended to be the equivalent of private IPv4 addresses but is now deprecated?

Site local unicast

What is the term used when a password is obtained through tricking a user into giving it to another party?

Social engineering

When configuring AppLocker rules, you can opt to either allow or block access to specific resources based on three criteria. Which of the following is not one of those criteria?

Source

802.11n wireless networking equipment uses two, three, or more different frequencies for transmission and the subsequent receiving of traffic. The sending system splits its data into multiple signals for transmission, and the receiving device reassembles the signals into a single data stream. What is the name of this process?

Spatial multiplexing

Of the listed BitLocker authentication methods, which is considered to be the least secure?

Startup key only

What volume type writes data one stripe at a time to each successive disk in the volume?

Striped volume

Which touch gesture requires you to draw a finger across the screen in the indicated direction?

Swipe

In which type of Event Log would you most likely find useful information about services and device drivers?

System

Which BitLocker authentication method requires a PIN code to be entered before the system will be allowed to fully boot?

TPM + startup PIN

Of the listed BitLocker authentication methods, which is considered to be the most secure?

TPM + startup PIN + startup key

Which BitLocker authentication method stores the BitLocker encryption key on the TPM chip and requires an administrator to use a USB drive containing the startup key before the system can unlock?

TPM + startup key

Which BitLocker authentication method allows BitLocker to automatically access the encryption key if the boot environment is determined to be unmodified?

TPM only

What option does BitLocker give you to allow system maintenance to be performed, such as the installation of software or updating of firmware, without BitLocker interfering?

The Suspend protection option

By default, IE 10 is granted access to which area of the computer?

The Temporary Internet Files\Low folder and the HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer/LowRegistry registry key.

Your users use Windows 8 workstations that are joined to an Active Directory domain. You have been asked several times recently why users cannot configure Compatibility View options in IE 10. What is the most likely reason for this issue?

The Turn off Compatibility View option has been enabled.

When Windows fails to correctly identify a detected device during the Windows installation, several things can happen. Which of these options is not one of the possible outcomes?

The Windows installation program reboots the computer and attempts to identify the device again.

What do NTFS quotas provide an administrator?

The ability to limit the quantity of storage space utilized by users on the volume.

What special feature do Windows apps have that is particularly attractive for an organization with many various types of Windows 8 devices in use?

The apps use the new Windows user interface (UI) designed to display and work across Windows 8 devices with different form factors and display sizes.

Why do some snap-ins, such as the Active Directory Domain Services consoles, not provide a means to redirect the console to another computer?

The console will automatically locate a domain controller.

In order to use the Custom Classes: Deny read/write access setting of the Removable Storage Accesspolicy settings, what will you need to know about each device to which you wish to allow read or write access?

The device GUID

What is the basic process employed to digitally sign a device driver or other piece of software?

The device driver files are run through a hash algorithm and then encrypted using the publisher's private key.

What is the net effect of deleting a device using Device Manager and then restarting the computer?

The device will be detected by Windows during the restart and Windows will try to reinstall it automatically.

If you apply a change to a folder to enable EFS for the folder only, what happens to the files currently in the folder?

The files currently in the folder are not encrypted.

When none of your configured Software Restriction Policies are matched, what happens?

The settings in the default rule are used.

What disadvantage is encountered when using Software Restriction Policies?

They must be configured manually.

In most cases, how is malware introduced into a computer system?

Through a deliberate act of the computer's user

In Windows 8, why might a user wish to close running but idle applications using Alt+F4?

To clean up the thumbnail bar

Which IE security zone contains the web sites that you would not expect to damage the computer?

Trusted sites

Which Application Compatibility GPO setting can boost system performance at the cost of possible problems running legacy applications?

Turn off Application Compatibility Engine

When UAC is configured, how many tokens will an administrator account holder receive when they log into the computer?

Two

What system requirements must you have to take advantage of Secure Boot?

Unified Extensible Firmware Interface

Most cabled networks today use what type of cabling?

Unshielded twisted pair

If you are currently running Windows 8 on your computer, what is the easiest way to upgrade to Windows 8 Professional?

Use Anytime Upgrade

Remote Assistance offers several methods to send the invitation for assistance. Which of the following is not one of those options?

Use Remote Desktop

What must you do to enable the Windows Store on Windows Server 2012?

Use the Add Roles and Features section of the Server Manager.

When a specific file type, such as .mp3, can be opened by many different applications, how can you configure Windows 8 to use a specific application to open an .mp3 file that is double-clicked?

Use the Pick an application to open this file link in the Default Programs control panel.

Which UAC Group Policy setting would best be used to force all application installation attempts to fail?

User Account Control: Detect application installations and prompt for elevation

By default, eight tiles appear in the Windows Mobility Center. Which of the listed items does not appear by default here?

User Accounts

The Network Service special identity allows services, configured to run as a network service, permissions on the computer equivalent to what built-in group?

Users

Which of the following benefits is not provided when BranchCache is used?

Users access data over the faster WAN link

How does Windows 8 transmit display signals to a network projector?

Using RDP

On which tab of a disk's properties dialog box will you find information about the partition style and capacity of the disk?

Volumes

Why should you not deploy a wireless network using WEP for security?

WEP is insecure due to very weak cryptographic protocols.

What design feature of WEP makes it a poor choice for wireless network security in larger wireless networks with hundreds or thousands of clients?

WEP provides no mechanism for automatically changing the shared secret.

To exclude just MP3 players and digital cameras from being installed on your organization's computers, which Removable Storage Access setting should you configure to deny?

WPD Devices

What event type indicates a service degradation or an occurrence that can potentially cause a service degradation in the near future?

Warning

What new standard defines a protocol that allows clients and servers to exchange data immediately as it becomes available without the overhead created by HTTP and TCP?

WebSockets

Windows 8 provides many emulation modes for older versions of Windows. Which of the listed modes is not available to select from?

Windows 2000

When you perform an in-place upgrade to Windows 8 from Windows 7, what will be names of the "Windows" folders in Windows 7 and Windows 8?

Windows 7: Windows.old; Windows 8: Windows

Which version of Windows 8 is designed for larger businesses and is only available through volume licensing programs?

Windows 8 Enterprise

What is the minimum Windows 8 edition that you will need to use if you plan on joining the Windows 8 computer to an Active Directory domain?

Windows 8 Professional

Your organization currently uses roaming profiles for all users. All users use Windows 7 computers. Windows 8 will be introduced shortly in your organization. Given the information presented, what issue should you be aware of?

Windows 8 roaming profiles and Windows 7 roaming profiles are not compatible with each other.

During which phase of the Windows 8 startup process does the system initiate the memory paging process and load various operating system elements into memory?

Windows Boot Loader phase

During which phase of the Windows 8 startup process does the system read the Boot Configuration Data (BCD) registry file?

Windows Boot Manager phase

What is the name of the Windows 8 application provided by Microsoft that is designed to stop the infiltration of spyware into the computer system?

Windows Defender

What name is given to a Windows PE installation on a computer with Windows 8 already installed?

Windows Recovery Environment

What is the central location included in Windows 8 for the distribution and purchase of Windows apps?

Windows Store

What was the first 32-bit version of Windows to support the GPT partitioning style?

Windows Vista

The User State Migration Tool uses several files to control the migration process. What is the file format of these files?

XML

What makes connecting to a remote computer by redirecting an existing console an inefficient method over time?

You can access only one computer at a time.

When you create your first new rule in AppLocker, what will happen if you do not have the default rules in place?

You will be prompted to create the default rules.

You are trying to configure location-aware printing on your new Windows 8 computer. The option to configure location-aware printing is not available. What is the most likely reason for this scenario?

Your computer does not utilize an internal battery.

You want to create a domain level GPO that will specify the storage location of roaming profiles. Which of the following UNC paths represents the best configuration to place each user's profile in a unique location?

\\Server\share\%USERNAME%

By default, Windows 8 is configured to check for updates for installed apps _________ and then _________ the needed updates.

daily, download but not install

What should you enter into the Run dialog box to open the Device Manager console?

devmgmt.msc

How often does the Reliability Monitor gather data for the stability index?

every hour

What command can you issue from the command line to view all configured wireless networks on your Windows 8 computer?

netsh wlan show profiles

Which troubleshooting utility allows you to generate DNS request messages and transmit them to specific DNS servers on the network?

nslookup

What command-line utility could be used to elevate privileges in a script?

runas.exe


Related study sets

Capítulo 13 Corazón partido y 14 Detrás del volante

View Set

Quiz 2 Review - Chapter 20: Our Universe

View Set

VII. Unfair, Deceptive, and Abusive Practices - Federal Trade Commission Act/Dodd-Frank Act

View Set

Organizational Behavior: Chapter 15

View Set

Basic Life Support - American Heart Association Pt. 1

View Set