Windows Client Operating Systems Final
Which of the following simplifies folder and file sharing by controlling both NTFS permissions and share permissions at the same time?
"Share with" method
Each Microsoft account is allocated how much storage that can be used for file storage in OneDrive?
5 GB
If Windows 10 is configured to use dynamic IP configuration and is unable to contact a DHCP server, the default action is to use which type of address?
APIPA
Which security process records the occurrence of specific operating system events in the Security log?
Auditing
A policy that allows employees to bring their own computers, smartphones, and tablets to work and use them to access corporate resources
BYOD
To address the risks to data stored on computers and laptops, which encryption technology is available in Windows 10?
BitLocker Drive Encryption
A policy that allows employees to choose a computer, smartphone, or tablet from a corporate-owned pool of devices and use them to access corporate resources.
CYOD
Which registry key contains the default registry settings that are copied for new user profiles
DEFAULT
An always-on replacement for on-demand VPN connections.
DirectAccess
What type of bottleneck occurs when Windows 10 and running applications want to read and write information to the physical disk in the system faster than the disk can manage?
Disk
A feature of Hyper-V that allows the memory allocated to a virtual machine to be increased and decreased based on demand in the virtual machine while it is running.
Dynamic Memory
File Explorer contains ribbon tabs that can be used for various functions. Which ribbon tab provides options to open a new File Explorer window, command prompt, or Windows PowerShell prompt that is focused on the current folder?
File
The local security policy is part of a larger Windows management system known as which of the following?
Group Policy
Which registry area contains details about the current hardware profile in use?
HKEY_CURRENT_CONFIG
The two most common mechanisms for sharing an IP address are a router or which of the following?
ICS
Which protocol is responsible for responding to discovery requests from other computers?
Link-Layer Topology Discovery Responder
A set of best practices, scripts, and tools to help automate the deployment of Windows operating systems.
Microsoft Deployment Toolkit (MDT)
Which of the following is a new Web browser included with Windows 10?
Microsoft Edge
Software and services responsible for provisioning and controlling access to mobile apps that are used in a business environment, on both BYOD and corporate-assigned devices.
Mobile Application Management
Which type of permissions are considered the most basic level of data security in Windows 10?
NTFS
Rules for communicating across a network that define how much data can be sent and the format of that data is known as which of the following?
Protocols
A feature in Windows 10 that allows a helper to connect to a Windows 10 computer and view the screen or remotely control the computer
Remote Assistance
Which of the following allows you to begin using an application faster after printing by storing the print job as a file and sending the print job to the printer as a background process?
Spooling
Which of the following is an updated version of TCP/IPv4 with a larger address space and additional features?
TCP/IPv6
Which of the following terms is used to describe a virtualized environment that hosts Win32 apps on the 64-bit version of Windows 10?
WOW64
Applications designed to interact with which subsystem were the most common type of application in use with earlier operating systems, such as Windows XP?
Win32
Instead of logging performance counters to disk, you can configure which of the following to occur?
alerts
A type of virtual hard disk that tracks changes that would have been made to a parent disk.
differencing disk
What type of encryption algorithm is one-way encryption, which means that it encrypts data, but the data cannot be decrypted?
hash
The registry is divided into sections and levels of data. Multiple sections exist to organize data by purpose. What are these individual sections called?
hives
The software layer that controls access to hardware after virtualization is enabled.
hypervisor
In Windows 10, which of the following is updated each time a file is changed to ensure that search results are current?
index
Account policies settings are located in which of the following?
local security policy
Data sent to which of the following returns to the computer that sent it and does not appear on the actual network?
loopback address
Characteristics of a file such as file name, creation data, and modified date are known as which of the following?
metadata
Software Windows 10 uses to understand and use the features of a printer is known as which of the following?
printer driver
Besides access and recovery previous version of a file, which of the following is a function that can only be performed in the OneDrive website and not by the OneDrive client?
recover deleted files
When applications or Windows 10 starts, they read their configuration information from which of the following?
registry
Which term best describes a snapshot of operating system and program files at a specific point in time that can be restored to roll back to a point in time when the operating system or applications were stable?
restore point
Which of the following is the name assigned to the WAP to identify itself to clients?
security set identifier
Which IP utility is used to display response times for every router on the path to the destination?
tracert
Each Win32 application runs in its own virtual memory space and is executed by the processor in which mode?
user
All of the application environments in Windows 10 restrict apps to running in which of the following modes?
user mode
An encrypted connection from a client to a remote access server over a public network
virtual private network (VPN)
Which Windows 10 feature allows you to create virtual machines with a completely independent operating system that shares the hardware on the computer running Windows 10?
Client Hyper-V
Which processor feature monitors processes to ensure that they do not access unauthorized memory spaces, which is done by various types of malware, such as viruses, to take control of systems?
DEP
A Microsoft tool for synchronizing copies of local identity information into Azure AD. M
DirSync
A server role in Windows Server that includes replication of shared folders and virtualization of paths providing access to the shared folders.
Distributed File System (DFS)
Which utility is used to browse and manage the records of system events and messages stored in system event logs?
Event Viewer
An authentication-only VPN protocol that is combined with IPsec to provide data encryption.
Layer 2 Tunneling Protocol (L2TP)
What is the name of the cloud-based storage that is automatically included for free when a Microsoft account is created?
OneDrive
Which page description language is the oldest and best supported?
Postscript
If File History or Backup and Restore (Windows 7), or both, had been configured to protect user data, that data can be recovered using which feature?
Previous Versions
Selecting a counter to display will display information about that counter's collected data as a chart type. Which chart type displays the current value of each performance counter in decimal format?
Report
Which of the following are used to process log file data and display it in a meaningful way?
Reports
Which protocol is included with Windows 10 for network communication?
TCP/IP
Which part of the motherboard in your computer is used to store encryption keys and certificates?
TPM
Which Windows 10 feature provides an automated diagnosis and repair of boot problems plus a centralized platform for advanced recovery tool?
WinRE
Which of the following uses a USB drive as a memory cache similar to a paging file?
Windows ReadyBoost
Which rule condition identifies software by file location?
path
Which of the following is considered one of the biggest sources of malware (malicious software)?
the Internet
Running apps in which mode ensures that a poorly written app does not affect system stability?
user