On the IE General tab you can block cookies. True or False |
False |
The default value of the security level in IE is Medium-high. True or False |
True |
To use Remote Desktop, the computer you access remotely can be running Windows 8 Home Edition or Windows 8.1 Professional. True or False |
False |
When a user logs on to a Windows 7 computer using Remote Desktop, users that are logged on locally are unaffected. True or False |
False |
If a Windows computer belongs to a domain, all security is managed by the network administrator for the entire network. True or False |
True |
What task can’t be performed from the IE General tab? change the home page |
disable file downloads |
What port is utilized by the Remote Desktop service? 22 |
3389 |
What kind of a computer intercepts requests that a browser makes of a server and can cache received content? DNS server |
proxy server |
Which of the following is NOT true about Remote Desktop? -the client can be running any version of Windows 7 |
by default all users can access Remote Desktop |
If you want to be able to power up a computer remotely, what feature should you use? QoS |
Wake-on LAN |
Regarding the use of Group Policy, what statement is NOT accurate? -policies can be applied to a computer |
all policies are applied before the logon screen appears |
What statement about controlling access to folders and files is accurate? -permissions refer to the tasks an account is allowed to do in the system |
rights are assigned to accounts |
What statement about user accounts and groups is NOT true? -a user account can belong to only one group at a time |
a user account can belong to only one group at a time |
When attempting to access a remote computer on which your user name and password do not exist, what user group will you be placed in? Administrators |
Anonymous users |
To which group does Windows give access to folders that you create which are not part of your user profile? Power Users |
Authenticated Users |
When all users on a network require the same access to all resources, what type of network model should you use? Domain |
Homegroup |
When working with a workgroup, what statement is accurate regarding which folders to use to hold shared data? -private data for each user should be kept in their C:\Users folder |
private data for each user should be kept in their C:\Users folder |
What type of permission should you set to control access to files and folders by local and network users? -sharing on FAT32 volumes only |
NTFS on NTFS volumes only |
What command launches the Remote Desktop client for Windows? rdp |
mstsc |
When utilizing both share and NTFS permissions, what statement is inaccurate? -if both permissions are used, the least restrictive permission between the two applies |
if both permissions are used, the least restrictive permission between the two applies |
When mapping a drive, you can type in the path to the shared folder on the host computer. What is the syntax for the path? \\sharedfolder\server |
\\server\sharedfolder |
What is a valid reason for wanting to configure a proxy server in Internet Explorer? -to increase the security of the connection |
to connect to secured websites on a corporate network VPN |
Windows 10 features what new web browser, which is designed to replace Internet Explorer? Microsoft Spartan |
Microsoft Edge |
What protocol must be supported by routers in order to utilize Remote Assistance Easy Connect? SMTP |
PNRP |
User accounts that are issued a temporary user profile that is deleted when the user signs out are members of what group? Administrators group |
Guests group |
What two applications are an example of a mail server and a mail client application, respectively? Exchange |
Exchange Outlook |
What NTFS permissions should you assign if the user should be able to create folders and files and open files to read data, but not delete files? (Choose all that apply.) Full control |
Read Write |
When using Group Policy to configure QoS, what options are available? (Choose all that apply.) -the priority is a number from 0 to 63 |
the priority is a number from 0 to 63 outbound traffic can be throttled |
Which of the following are true about NTFS permissions? (Choose all that apply.) -inherited permissions override explicit permissions |
when a subfolder is created, it is assigned the permissions of its parent folder if NTFS permissions conflict locally, the more liberal permission applies |
What are the two most popular web server applications? Nginx |
Apache IIS |
Chapter 17 – Hardware Support A+
Share This
Unfinished tasks keep piling up?
Let us complete them for you. Quickly and professionally.
Check Price