Max Chapter 8, 1-6, 10 Chapter 7

Your page rank:

Total word count: 7966
Pages: 29

Calculate the Price

- -
275 words
Looking for Expert Opinion?
Let us have a look at your work and suggest how to improve it!
Get a Consultant

Which document format is similar to XPS?

PDF

Which of the following are languages used by printers? (Choose all that apply.)

XPS PCL PostScript

Which utilities can be used to manage printers? (Choose all that apply.)

Devices and Printers in Control Panel Print Management snap-in Printers & scanners in Settings

Which of the following are features available only in the Print Management snap-in?
(Choose all that apply.)

Manage remote printers Manage local printers Update printer drivers

Which utility is used to add printer drivers to the printer driver store?

pnputil.exe

When a printer is configured with a lower priority value, the print jobs for that printer are
printed first. True or False?

False

By default, all users are able to manage their own print jobs because the ___________________
group has the manage documents permission.

Creator Owner

When you create a new document in the root of a library, where is the document created?

in the default save location of the library

Which file locations are indexed by default? (Choose all that apply.)

Offline files the Windows folder the Users folder

For each type of file, you can specify whether the contents of the file are indexed. True or
False?

True

Which Internet Explorer 11 security zone is only relevant if the computer is joined to a
domain?

Local intranet

When Internet Explorer 11 runs in Protected Mode, it runs with lower privileges than the
user. True or False?

True

What is the default folder synchronized with OneDrive?

C:\Users\%username%\OneDrive

Which actions for OneDrive can only be performed when accessing files through the web
interface? (Choose all that apply.)

Recover deleted files from the Recycle bin. Edit files by using web-based applications. Access previous versions of files.

Access to shared files in OneDrive can be restricted to specific people. True or False?

True

Which of the following are characteristics of Branch Office Direct Printing? (Choose all
that apply.)

The print server is responsible for rendering the print job. You can centrally manage printers for multiple locations from a single print server.

Microsoft Edge supports ActiveX controls. True or False?

True

Which steps are required to configure Enterprise Mode with Microsoft Edge? (Choose all
that apply.)

Create an XML file with a list of websites requiring Internet Explorer

The SmartScreen filter is used to prevent malware in Microsoft Edge and Internet Explorer
11. True or False?

True

The ___________________ service is responsible for processing print jobs.

Spooling

1.2 The minimum specifications for Windows 10 require greater CPU and RAM resources than Windows 7 T or F

False

1.1 A friend has asked you which version of Windows 10 should be purchased to start a new home-based business. Your friend needs only one computer for now, and requires support for Windows Store applications needed to manage their business. They are not very experienced with computers and have asked for easy-to-use features. Which version of Windows 10 do you recommend?

– Windows 10 Education
– Windows 10 Home
– Windows 10 Professional
– Windows 10 Enterprise

Windows 10 Home

1.23 A thread represents the files, data, and instructions that make up a single running task or application. T or F

True

1. 24 You are installing a computer to run a nuclear reactor management system. The software lists Windows 10 as a requirement. To ensure that future feature updates do not impact the stability of the software, you should consider what type of Windows 10 installation?

– Waas
– Any version
– Core
– LTBS

D. LTSB

1.25 Which of the following is a disadvantage of workgroup computing?

C. no centralized security management

1.4 The new web browser included with Windows 10 is called ___.

– Charlie
– Virtual Desktop
– Cortana
– Microsoft Edge
– Windows Hello

Microsoft Edge

1.5 You are adding a new 500 GB hard drive to your computer. The hard drive must be formatted with a file system to organize files into folders on that drive. The recommended file system to use is ___.

– exFAT
– NTFS
– ReFS
– FAT

NTFS New Technology File System.

1.6 You are considering purchasing an inexpensive computer from a friend that has a 32-bit CPU and 8 GB of RAM. You install Windows 10 Home, 32-bit edition, but you can’t see the full amount of RAM. What is wrong?

– The CPU does not support hyper threading
– You need to install a 64-bit version of Windows 10
– The CPU does not support multiple cores
– You must install Windows 1- Professional
– Windows 10, 32-bit editions cannot support more than 4 GB of RAM

Windows 10, 32- bit editions cannot support more than 4 GB of RAM

1.7 Your workstation is running Windows 10 Professional and you decide to share a folder on your computer. Twenty-two people in your office are trying to connect to that folder at the same time over the network. The first 20 people can connect, the other two cannot. To fix this you could ___.

– buy a computer, software, and licenses to run Windows Server 2016
– restart your computer
– make sure the network card is using WDF device drivers
– one of the above

by a computer, software, and licenses to to run Windows Server 2016.

1.8 Computers that belong to the same domain can access a common security database of user and computer account information. This type of database on Windows Server 2016 domain controller servers is also known as a(n) ___ database.

– primary
– workgroup
– jet
– Active Directory
– backup

Active Directory

1.9 Which of the following is an advantage of domain networking?

C. centralized security management

1.10 A new company will have 40 workstations in one building sharing a single network. All users must be able to share files and printers with each other. Access to shared information must be secure and simple to administer. The best technology for this system is:

D. domain networking

1.12 In tablet mode, Windows 10 will assume that ___ is not generally available:

B. keyboard and mouse

1.13 The main network protocol used to communicate between Windows 10. computers is _______?

– TCP/IP
– X.25
– SLIP
– Peer-to-peer
– Teredo

A. TCP/IP

1.14 The Window 10’s version of TCP/IP supports the newer communication protocol called ___.

B. IPv6

1.15 A user has a computer running Windows 7 but cannot seem to activate the free upgrade offer to Windows 10. The computer is a 32-bit CPU model with 4 GB of RAM and a 500 GB hard drive with 200 GB of free space. The free upgrade is likely unavailable because ___.

-their system does not meet minimum hardware specifications
-there is not enough free space on the hard drive
-the system is missing prerequisite Windows Updates
-they are running Windows 7 Extreme
-the offer is only available of Windows 8 or 8.1

C. the system is missing prerequisite Windows updates

1.16 Application windows can be docked to the sides and corners of the screen using a feature called ____.

A. Snap

1.18 Windows Hello supports multiple biometric authentication methods, including facial recognition. The failsafe method to authenticate in case the facial recognition method is unavailable is ___.

C. PIN

1.19 Some hardware can be added to the computer without having to restart or power down the computer. After a short period of time the device driver automatically loads and the hardware is available to applications and the user. This type of hardware is considered compatible with what type of technology?

C. Plug and Play

1.20 Windows 10 takes up less room on storage devices when the operating system is installed. One reason for this could be the enhanced ___ feature of the newer edition NTFS file system:

B. compression

1.21 Software Assurance customers can take advantage of extra applications provided with Windows 10 Enterprise edition. What feature included with this edition will allow a virtual computer to be hosted by the computer running Windows 10?

-Soc
– NTFS
– UNIX native application support
– Client Hyper-V
– Terminal Services

D. Client Hyper-V

1.22 Which of the following is an advantage of HomeGroup computing?

D. simple to set up initially

1.3 _____________on a Chip is a hardware component capable of reducing the overall size of a computer.

System6

1.17 An administrator of a manufacturing company would like to manage corporate computers with group policy. They are reviewing a purchase request for 20 new computers from the business owners. Which version of Windows 10 should they consider for installation on the new computers they would like to buy (select two)?

B. Windows 10 Professional D. Windows 10 Enterprise

1.11 The new virtual personal assistant built into Windows 10 can search multiple places for information that relates to your needs, including (select three):

A.The local computer, C.The web D.External accounts

the Windows 10 feature that automatically adjusts Windows 10 between desktop mode and tablet mode as the device state changes

Continuum

a personalized virtual search assistant

Cortana

the traditional configuration for a Windows 10 computer that is optimized for use with a mouse and keyboard

desktop mode

software written by the developer of a hardware component that tells the operating system how to talk to and control the hardware

device driver

server responsible for holding a domain security database

domain controller

a file that holds application code modules

Dynamic Link Library

a technique used in certain Intel processors to improve their overall performance by working on more than one independent piece of code at a time

hyperthreading

term used to describe the appearance of more than one application sharing the CPU of the computer

Multitasking

the amount of time allocated to a program running in a preemptive multitasking environment

Quantum

T or F—Business enhancements such as encrypted files, joining a domain, and processing Group Policy settings are available in Windows 10 Home.

False

T or F—Cortana can optionally link external accounts that the user has on services such as Office 365.

True

T or F—In Windows 10, the standard protocol for computers to format and exchange data across a network is Remote Assistance.

False

T or F—Windows 10 Enterprise and Education editions do not include support for tablet computers as a standard feature.

False

T or F —The installation process of Windows 10 takes a snapshot of the computer’s hardware and calculates a digital signature to identify that computer.

True

What Windows 10 feature should you use if you need to run an older application on an earlier version of Windows using the same computer you are using to run Windows 10?

Client Hyper-V

Which of the following terms is a collection of computers and users that are identified by a common security database?

domain

2.1 Which task cannot be performed by using DISM?
-create an image
-add files to an image
– add service packs to an image
-apply an image.

C. add service pack to an image

Which utility is used to create answer files for unattended installations?

-DISM
-Windows System Image Manager
-Windows ICD
-Sysprep

Windows System Image Manager

Which utility is used to prepare computers for imaging by removing specific information, such as the computer name and computer SID?

-DVD boot installation
-distribution share installation
-unattended installation
-image-based installation
-attended installation

image-based installation

Which folder is used to store user profiles in Windows 10?

C:\Documents and Settings
C:\ Profiles
C:\Windows\Profiles
C:\Users
C:\Documents and Settings\Profiles

C:\Users

Which utility can be used update drivers in an existing Windows 10 image?

-WISM
-DISM
-Windows ICD
-Package Manager
-Windows Update

DISM

Which configuration pass can be used to perform disk partitioning operations?

-windowsPE
-offlineServicing
-Specialize
-generalize
-oobeSystem

generalize configuration

Which tool is used to create provisioning packages?

-Windows PE
-Windows ICD
-Windows SIM
-ACT
PCmover Express

Windows ICD

Which installation methods require booting into Windows PE before Windows 10 starts? (Choose all that apply.)

– DVD boot installation
– image-based installation
– image-based installation
– distribution share installation

-distribution share installation – image-based installation

Which methods can you use to migrate user settings from a previous operating system to Windows 10? (Choose all that apply.)

– Copy the user profile from the old computer to the new computer.
– Perform an upgrade
– Use Windows Easy Transfer.
– Use the User State Migration Toolkit

– Copy the user profile from the old computer to the new computer. – Use Windows Easy Transfer.

Which methods can you use to place applications from a previous operating system on Windows 10? (Choose all that apply.)

– Perform an upgrade over the top of the previous operating system.
– Perform an upgrade over the top of the previous operating system.
– Reinstall the applications on the new computer.
– Reinstall the applications on the new computer.

– Reinstall the applications on the new computer. – Perform an upgrade over the top of the previous operating system.

Which configuration passes automatically search for an autounattend.xml file, if an answer file is not specified? (Choose all that apply.)

– windowsPE
– specialize
– offlineServicing
– generalize
– oobeSystem

– windowsPE – offlineServicing

Which options must be used with DISM to save changes to an image? (Choose two.)
– /mount-image
– /unmount-image
– /commit
– save

– /commit – /unmount-image

Which of the following are benefits of DISM? (Choose all that apply.)

– There is no charge to use DISM for Windows 10 imaging.
– Images can be taken of an entire partition or just a single folder.
– Images can be taken of an entire partition or just a single folder.
– Partitions can be created automatically.
– Images are always compressed to save disk space.

– WIM image file size is minimized by single instance storage. – Images can be taken of an entire partition or just a single folder. – There is no charge to use DISM for Windows 10 imaging.

Which of the following are scenarios where you could use provisioning? Choose all that apply.

– Deploying Microsoft Office.
– Deploying Microsoft Office.
– Deploying new Windows Store applications.
– Upgrading Windows 8.1 to Windows 10.
– Performing a clean installation of Windows 10.

– Deploying new Windows Store applications. – Updating Windows 10 Pro to Window 10 Enterprise.

The __________ installation method is best suited to small organizations that install Windows 10 only occasionally.

-DVD Boot
– clean

DVD Boot

A WIM image file containing two Windows 10 images will be approximately twice as big as a WIM image file containing one Windows 10 image.

-True
-False

False

Windows To Go is available in Windows 10 Pro and Windows 10 Enterprise.

-True
-False

False

Windows ICD cannot be used to completely automate the deployment of Windows 10.

-True
-False

True

A clean installation is an installation of Windows 10 performed on a computer that has existing data or applications.

-True
-False

False

The DVD boot installation method is the most suitable method for a large volume of computers.

-True
-False

False

Windows PE includes networking components and allows you to use current Windows drivers for network connectivity.

-True
-False

True

A distribution share installation is always faster than a DVD boot installation.

-True
-False

-False

Windows 10 maximizes user involvement during attended installation with an abundance of prompts that user must answer in the middle part of the installation.

-True
-False

-False

Which of the following moves desktop settings and applications from one computer to another?

-ImageX
-Application State Migration Tool (USMT)
-Which of the following moves desktop settings and applications from one computer to another?
-Windows PE

User State Migration Tool (USMT)

The functionality provided by which of the following Windows 7 features has now been included in DISM for Windows 10?

-Windows PE
-WAIK
-USMT
-ImageX

ImageX

Which of the following is a limited and non-GUI version of Windows based on Windows 10 technologies that can be used for installing, troubleshooting, and repairing Windows 10?

-Windows PE
-WAIK
-USMT
-DISM

-Windows PE

Which of the following is used to perform offline servicing of WIM images?

– WDS
– Package Manager
– Deployment Image Servicing and Management (DISM)
– Windows PE

Deployment Image Servicing and Management (DISM)

Which of the following installation methods is the least suitable method for a large volume of computers?

– DVD boot
– distribution share
– image-based
– local share
– DVD boot

DVD boot

The Account Policies in the Local Security Policy can be used to control domain accounts.
T or F

False

NTFS permissions can be easily circumvented when you have physical access to a computer.
T or F

False

In Windows 10, advanced audit policies can only be edited at a command-line.
T or F

False

Every object in Windows 10 has audit events related to it.
T or F

True

Which advanced audit policy setting tracks when tasks are performed that require a user rights assignment, such as changing the system time?
– privilege use
– privilege use
– account management
– process tracking

privilege use

Newer Windows applications use which of the following to describe the structure of an application?

– manifest
– log
– record
– hash

manifest

Applications that are not designed for Windows 10 and that require administrative privileges do not properly request elevated privileges, generating an error. You can eliminate this error by using which of the following?
– Application Compatibility Toolkit
– Private Toolkit
– Secure Toolkit
– Application Compatibility Toolkit

Application Compatibility Toolkit

Which of the following is considered one of the biggest sources of malware (malicious software)?
– the Internet
– a cloud library
– a hard disk
– a router

the Internet

What type of software is silently installed on your computer, monitors your behavior, and performs actions based on your behavior?
– worm
– Spyware
– Advance
– Virus

Spyware

Which of the following accurately describe the Administrative Tools available in Control Panel? (Choose all that apply.)
– Most are MMC consoles.
– You can schedule tasks.
– You can change the screen resolution.
– You can change power options.
– You can manage device drivers.

Most are MMC consoles. You can schedule tasks. You can manage device drivers.

Which of the following are found in Administrative Tools? (Choose all that apply.)
– Event Viewer
– Windows Memory Diagnostic
– Computer Management
– Installed Programs
– Task Scheduler

Event Viewer Windows Memory Diagnostic Computer Management Task Scheduler

Which snap-ins are available in Computer Management? (Choose all that apply.)
– Task Scheduler
– Folder Options
– Services
– Security Configuration Management
– Device Manager

Task Scheduler Services Device Manager

Which tasks can you accomplish using the Services administrative tool? (Choose all that apply.)
– Stop a service.
– Configure a service to start automatically.
– Configure the credentials for a service.
– Schedule the time when a service will start.
– Configure the dependencies for a service.

Stop a service. Configure a service to start automatically. Configure the credentials for a service.

Which tasks can you perform in Device Manager? (Choose all that apply.)
– Determine which devices do not have a driver loaded.
– Disable devices.
– Install new hardware
– View hardware resource configuration.
– Roll back device driver.

– Determine which devices do not have a driver loaded. – Disable devices – View hardware resource configuration. – Roll back device driver.

With a signed device driver, which of the following can Windows 10 do? (Choose all that apply.)
– Determine if a driver has been modified.
– Determine if a driver has been adequately tested.
– Determine if the publisher is valid.
– Determine if the driver is 32-bit or 64-bit.
– Automatically download updates.

Determine if a driver has been modified. Determine if the publisher is valid.

Hybrid sleep is a combination of which ACPI power states? (Choose two.)
– S0
– S3
– S4
– S5
– G5

S3 S4

Which requirements must be met for display adapters in Windows 10? (Choose all that apply,
– Minimum 256 MB of RAM on the video
– Support for WDDM
– Support for DirectX9
– Do not use Windows 10 Starter Edition
– Computer is certified as "Designed for Windows 10"

Support for WDDM Support for DirectX9

Which Settings category allows you to control whether apps can access your location?
– System
– Privacy
– Network & Internet
– Accounts
– Devices

Privacy

Which of the following is used by apps to connect to databases?
– ODBC
– DB sources
– SQL
– RPC
– Local Ports

ODBC

Which MMC access mode allows users to create new windows, but prevents them from viewing some of the console tree?
– Author mode
– User mode – Full access
– User mode—limited access, multiple window
– User mode — limited access, single window

User mode—limited access, multiple window

Which new function in Windows 10 allows you to switch a single monitor between sets of open apps?
– Application virtualization
– Multiple monitors
– App groups
– Virtual desktops
– Multiple desktops

Multiple desktops

Modern Standby puts the computer in which ACPI power state?
– S0
– S3
– S4
– S5
– G3

S0

A _____________ is a type of Windows application that runs in the background without user intervention.

service

You can build a customized MMC console by adding ___________ to the console.

snap-ins

A __________________ is software used to manage communication between hardware components and Windows 10.

device driver

To find a list of hardware components certified to run on Windows 10, you should consult the Hardware Compatibility List.
T or F

False

You can use the Get-Member cmdlet to view the properties available for an object.
T or F

TrueThe primary purpose of a screen saver is to prevent screen burn in.

The primary purpose of a screen saver is to prevent screen burn in.
T or F

False

Windows 10 supports attaching more than two monitors to a computer and extending the desktop across all of them.
T or F

True

Local user accounts can be used to access resources on other computers in a workgroup or a domain.
T or F

True

Secure sign-in increases security on your computer by forcing you to press Ctrl+Alt+Delete before signing in.
T or F

True

With fast user switching, only one user can be actively using the computer at a time.
T or F

False

The Administrator and a user-specified initial account are called built-in accounts because they are created on every Windows 10 computer.
T or F

False

In Windows 10, most actions that are triggered by an Administrator do not result in a prompt from User Account Control.
T or F

True

Which of the following are required for individuals to log on to Windows 10 and use resources on the computer?
– Public Keys
– IP Adresses
– User accounts
– Digital Certificates

User accounts

Each time a user logs on locally, which database is used to verify sign-in credentials?
– SAM
– SSID
– SID
– NID

SAM

Which of the following is used to protect your computer from malware that may attempt to steal your password?
– Fast user switching
– Secure sign-in
– Windows Welcome
– Manual sign-in

Secure sign-in

Which Windows 10 feature ensures that a second user can log on to a locked computer without logging off the first user and losing their work?
– Secure sign-in
– Windows Welcome
– Fast user switching
– Automatic sign-in

Fast user switching

In order to stop the automatic sign-in from occurring, which key should be held down during the boot process?
– Shift
– Crtl
– Alt
– Esc

Shift

What type of startup firmware best supports Windows 10 with regard to device operation and management?
– BIOS
– GPT
– UEFI
– MBR

UEFI

A VHD has been created using the Disk Management utility. Before the newly created VHD can be used to store files it must be ______.
– detached
– initialized
– configured as a dynamic disk
– set to GPT partition style
– Set to MBR partition style

initialized

A drive is attached to a custom hardware RAID controller. It does not show up as being available for use with Storage Spaces. To make the drive appear for use with Storage Spaces the hardware RAID controller must be:
– Configured as mirrored RAID 1
– BIOS managed
– Configured as parity RAID 5
– UEFI managed
– Removed

Configured as mirrored RAID 1

You have just plugged a USB portable hard drive into an older laptop and the disk has not appeared as available. You are concerned that the hard disk controller hardware has not been recognized by the computer. What utility would you use to verify that the controller is functioning correctly?
– DiskPart
– Disk Management console
– Device Manager
– USB Management console
– none of the above

Device Manager

The number of physical disks required to implement three-way resilience for a Storage Spaces volume is ___.
– 1
– 2
– 3
– 5
– 7

5

The preferred technology to set up disk storage with mirrored fault tolerance for a user’s backup data is _____
– Basic disks
– Dynamic Links
– Hardware- based RAID 5
– Storage Spaces
– Hardware based RAID 1

– Storage Spaces

A NTFS partition has disk quotas enabled. You would like to run a weekly report that summarizes how much space each user is consuming. The _____ utility allows you to review quota details from the command line.
– convert
– get-disquota
– diskpart
– dsquota
– fsutil

fsutil

A 127 GB volume on a dynamic disk can be formatted with which file system?
– FAT32
– NTFS
– ReFS
– FAT

NTFS

The _____ file system is the only one that supports file compression in Windows 10.
– NTFS
– FAT32
– ReFS
– FAT

NTFS

A user is given Read permission to a file stored on an NTFS-formatted volume. The file is then moved to a different folder on a different NTFS-formatted volume where the user has been given Modify permission for that folder. The file is then moved to a folder on a FAT32-formatted volume. When the user signs in to the computer holding the file and accesses it via a drive letter, what is the user’s effective permission to the file?
– No permissions apply
– Read
– Change
– Modify
– no permission apply

No permissions apply

A user is assigned Read permission to the NTFS folder C:\ACCOUNTING. The user requires full access to the folder C:\ACCOUNTING\FORMS and its contents. This can be accomplished by ___.

-blocking permission inheritance at C:\ACCOUNTING and signing the user full control to C:\ACCOUNTING\FORMS

-assigning the user Full control to C:\ACCOUNTING\FORMS

-assigning the user Full control to C:\ACCOUNTING

-blocking permission inheritance at C:\ACCOUNTING\FORMS and assigning the user Full control to C:\ACCOUNTING\FORMS

-not possible

assigning the user Full control to C:\ACCOUNTING\FORMS

A user checks the free space in a folder, Y:\BusReports, and notices that 3 GB of disk space is reported as available. When the user checks free space in Y:\BusReports\Archive, he notices that 5 GB of disk space is reported as available. The difference in available disk space is probably because the folder Y:\BusReports\Archive is ___
– a mount point
– archived
– compressed
– encrypted
– dynamic

a mount point

Upon opening the Disk Management console, you notice a disk whose status is reported as Foreign Disk. This is most likely because ____.
– the disk’s Unicode property is enabled
– the disk has been corrupted
– the disk is shared on the network
– the disk was moved from another computer

the disk was moved from another computer

A user is given Read permission to a file stored on an NTFS-formatted volume. The file is then moved to a different folder on a different NTFS-formatted volume where the user has been given Full control permission to that folder. When the user signs in to the computer holding the file and accesses its new location via a drive letter, what is the user’s effective permission to the file?
– read
– no access
– Full control
– modify
– none of the above

Full control

A user is given Read permission to a file stored on an NTFS-formatted volume. The file is then moved to a folder on the same NTFS-formatted volume where the user has been given Modify permission to that folder. When the user signs in to the computer holding the file and accesses its new location via a drive letter, what is the user’s effective permission to the file?
– Read
– full control
– no access
– modify
– none of the above

Read

A storage ____ acts as a logical container grouping multiple physical disks.

pool

You have recently added a new USB portable hard disk to your computer. You have received a notice that new hardware has been detected but the disk does not appear as a storage location. Which utility would you use to verify that the hard disk’s logical disk information is recognized by Windows 10 (select two)?
– DiskPart
– Device Manager
– Disk Management console
– USB Management
– none of the above

– DiskPart – Disk Management console

Windows 10 supports locally encrypted files stored on these types of partitions (Select all that apply).
– NTFS
– FAT32
– ReFS
– FAT

– NTFS – FAT32

A file is currently compressed in its local file system. For security reasons, the file is required to be encrypted. The file can be both compressed and encrypted.
T or F

False

When assigning NTFS permissions, an ACE entry can explicitly define who is denied access to a resource.
T or F

False

The choice of file system can limit the total amount of data stored in a partition or volume.
T or F

True

NTFS stores files and folders in a way that looks very similar to the FAT file system.
T or F

False

Files and folders on an NTFS file system in Windows 7 cannot use Unicode characters in the filename.
T or F

False

Changes in the ownership of a file do not change the amount of data that is considered to belong to a user.
T or F

False

Which of the following types of storage can be partitioned using MBR or GPT and are supported by all versions of Windows?
– Basic disk
– Virtual Disk
– Dynamic Disk
– Smart Disk

Basic disk

Most of the partition attributes are stored in a data table that is part of the MBR or GPT specification. What is this table is commonly called?
– sector table
– partition table
– division table
– boot table

partition table

On dynamic disks, the term partition is not used to define the space where a file system is installed. What term is used?
– volumes
– tracks
– sectors
– mirrors

volumes

What is a mirrored volume also known as?
– RAID -1
– RAID 0
– RAID 1
– RAID 5

RAID 1

Which of the following storage space types can only be created with three or more physical disks?
– Three-way mirror
– Two-way mirror
– Parity
– Simple

Parity

Until a new disk is initialized, what is its status reported as?
– Unknown
– Ready
– Connected
– Active

Unknown

Local user accounts are stored in the SAM database.
T or F

True

Because the initial user account created during installation is a member of the Administrators group, it has all of the characteristics of the Administrator account.
T or F

False

A roaming profile is located on a network server.
T or F

True

After you set a PIN for a domain account on your laptop, that PIN can be used only on your laptop.
T or F

True

In a domain-based network, each server authenticates users by using the SAM database.
T or F

False

Each user account is assigned a(n) _______________ to ensure that security is kept intact if the account is renamed.

SID

The _____________ group becomes a member of the Administrators local group when a Windows 10 computer joins a domain.

Domain Admins

How do you reset the password for a Microsoft account?

– Use a password reset disk.

– The user needs to reset the password on the Microsoft website for Microsoft accounts.

– A local administrator can reset the password in the User Accounts applet in Control Panel

-A local administrator can reset the password in ACCOUNTS settings.

– A local administrator can reset the password by using the Local Users and Groups MMC snap-in.

The user needs to reset the password on the Microsoft website for Microsoft accounts.

Which sign-in method requires users to press Ctrl+Alt+Delete before signing in?
– fast user switching
– Secure sign-in
– Assigned access
– automatic sign-in

Secure sign-in

Which sign-in method allows multiple users to have applications running on the computer at the same time?

– Fast user switching
– Secure sign-in
– Fast use switching
– Automatic sign-in

– Fast user switching

Standard users are members of which built-in local group?
– Administrator
– Guests
– Users
– Remote Desktop Users

Users

Which user management tool is required to assign a logon script to a user?
– Local Users and Groups MMC snap-in
– User accounts in Control Panel
– Advanced User Accounts applet
– Advanced Users and Groups MMC snap-in

Local Users and Groups MMC snap-in

Which file in a profile contains user-specific registry settings?
– AppData
– NTUSER.DAT
– NTUSER.MAN
– SYSTEM.DAT
– Local Settings

– NTUSER.DAT

Which profile is copied to create a profile for new user accounts?
– Default User
– Public
– Blank
– Default
– New

Default

Which profile is merged into each user profile when the user is signed in?
– Default User
– Black
– Public
– Default
– New

Public

Which authentication method can use a fingerprint scanner to authenticate users?
– Smart card
– Windows Hello
– Microsof account
– Microsoft Passport
– Domain Account

Windows Hello

Which characters are not allowed in user account names? (Select all that apply.)
\
1
$
*
!

* \

Which characteristics apply to the Administrator account? (Choose all that apply.)
– It has a blank password by default.
– It cannot be renamed.
– It is visible on the sign-in screen.
– It cannot be deleted.
– It can be locked out.

– It has a blank password by default. – It cannot be deleted.

Which characteristics apply to the Guest account? (Choose all that apply.)
– It has a blank password by default.
– It cannot be deleted.
– It cannot be renamed.
– It is disabled by default.
– It can be locked out.

– It has a blank password by default. – It cannot be deleted. – It is disabled by default. – It can be locked out.

Local user accounts are stored in SAM database.
T or F

True

Because user names are case sensitive, you can use capitalization to ensure that they are unique.
T or F

False

Which security feature in Windows 10 prevents malware by limiting user privilege levels?
– Windows Defender
– User Account Control (UAC)
– Microsoft Security Essentials
– Service SIDs

User Account Control (UAC)

Which password policy setting should you use to prevent users from reusing their passwords too quickly?
– Maximum password age
– Minimum password age
– Minimum password length
– Password must meet complexity requirements
– Store password using reversible encryption

Minimum password age

Which account lockout policy setting is used to configure the time frame in which incorrect logon attempts must be conducted before an account is locked out?
– Account lockout threshold
– Account lockout duration
– Reset account lockout counter after
– Reset account lockout counter after
– Account lockout release period

Reset account lockout counter after

Which type of AppLocker rule condition can uniquely identify any file regardless of its location?
– Hash
– Network zone
– Path
– Publisher

Hash

How would you create AppLocker rules if you wanted to avoid updating the rules when most software is already installed?
– Manually create rules for each application
– Automatically generate rules
– Create default rules
– Download rule templates

Create default rules

To which event log are audit events written?
– Application
– Security
– System
– Audit
– Advanced Audit

Security

What are you disabling when you configure UAC to not dim the desktop?
– user-initiated prompts
– secure desktop
– Admin Approval Mode
– file and register virtualization

secure desktop

Which type of encryption is the fastest, strongest, and best suited to encrypting large amounts of information?
– 128 bit
– Symmetric
– Asymetric
– Hash
– Public key

Symmetric

Which of the following is not true about BitLocker Drive Encryption?
– Data is still encrypted when BitLocker Drive Encryption is disabled.

– You must use a USB drive to store the startup PIN.

– BitLocker Drive Encryption requires at leas two disk partitions.

– BitLocker Drive Encryption is designed to be used with a TPM.

– Two encryption keys are sued to protect data.

-You must use a USB drive to store the startup PIN.

Which servicing branch for Windows Update should be used for computers where changes cannot be tolerated?
– Windows Insider Preview Branch
– Current Branch
– Long Term Servicing Branch
– Current Branch for Business
– Stable Service Branch

Long Term Servicing Branch

What is the name of the Group Policy setting that configures Windows Update for Business?
– Defer Upgrades and Updates
– Windows Update for Business
– Windows Update Delay
– Enterprise Windows Update
– Windows Update Deployment

– Defer Upgrades and Updates

Which of the following passwords meet complexity requirements? (Choose all that apply.)
– passw0rd$
– ##$$ @@
– a1batr0$$
– ake1vyue
– A%5j

– passw0rd$ – a1batr0$$ – A%5j

Which utilities can be used to compare the settings in a security template against a computer configuration? (Choose all that apply.)
– Secedit
– Windows Defender
– Security Templates snap-ins
– Security Configuration and Analysis tool
– Group Policy Object Editor

Security Configuration and Analysis tool Secedit

How can you recover EFS-encrypted files if the user profile holding the digital certificate is accidentally deleted? (Choose all that apply.)
– Restore the file from backup.
– Restore the user certificate from a backup copy.
– Another user that has access to open the file can decrypt it.
– Decrypt the file by using the EFS recovery snap-in.
– Decrypt the file by using the recovery certificate.

– Restore the user certificate from a backup copy. – Another user that has access to open the file can decrypt it. – Decrypt the file by using the recovery certificate.

The _____ local policy controls the tasks users are allowed to perform.

user

An ____ is used to describe the structure of an application and trigger UAC when required.

application manifest

To prevent malware installation, you should configure Windows Defender to perform _____.

real-time scanning

Evaluating DLL files for software restrictions has a minimal impact on performance because of caching.
T or F

False

To encrypt a file by using EFS, the file must be stored on an NTFS-formatted partition.
T or F

True

BitLocker Drive Encryption is user aware and can be used to protect individual files on a shared computer.
T or F

False

The Account Policies in the Local Security Policy can be used to control domain accounts.
T or F

False

The most common use for AppLocker is malware prevention.
T or F

True

NTFS permissions can be easily circumvented when you have physical access to a computer.
T or F

True

Which advanced audit policy setting tracks when tasks are performed that require a user rights assignment, such as changing the system time?
– privilege use
– object access
– account management
– process tracking

privilege use

Newer Windows applications use which of the following to describe the structure of an application?
– log
– record
– manifest
– hash

manifest

Applications that are not designed for Windows 10 and that require administrative privileges do not properly request elevated privileges, generating an error. You can eliminate this error by using which of the following?
– Administrative Privileges Toolkit
– Application Compatibility Toolkit
– Privat Toolkit
– Secure Toolklit

Application Compatibility Toolkit

Which of the following is considered one of the biggest sources of malware (malicious software)?
– the Internet
– a cloud library
– a hard disk
– a router

– the Internet

What type of software is silently installed on your computer, monitors your behavior, and performs actions based on your behavior?
– Worm
– Adware
– Spyware
– Virus

– Worm

H.W.-1
Your computer is configured to obtain an IPv4 address and DNS server address automatically. What utility will help you to find the IPv4 address of your computer? (Choose all that apply.)
– nslookup
– ipconfig
– tracert
– netsh

– ipconfig a command-line utility that can be used to display and manage IP address settings for network interfaces on a computer. – netsh a command-line utility that can be used to display, change, addend delete network configuration settings on a computer, including basic and advanced settings

H.W-2
Your computer is configured to obtain an IPv4 address and DNS server address automatically. You are concerned that the IPv4 routing table is incorrect. What utility will display the IPv4 routing table? (Choose all that apply.)
-route
-netstat
-nslookup
-netsh

-route a command-line utility that can be used to display and manage the routing table. -netstat a command-line utility that can be used to display protocol statistics and current TCP/IP network connections. -netsh a command-line utility that can be used to display, change, addend delete network configuration settings on a computer, including basic and advanced settings

H.W. -3
Which components are part of a Windows 10 network connection? (Choose all that apply.)
-clients
-services
-protocol-
-network drivers
-cabling

-clients a client allows you to communicate with a particular service running on a remote computer -services an application that provides functionality to remote clients over the network -protocols a standard set of rules that defines how different components of a system operate together -network drivers the software responsible for enabling communication between Windows 10 and the network device in your computer

H.W. -4
For a Class C IPv4 address what is the correct default subnet mask value, specified as either a dotted decimal address or a CIDR value? (Choose all that apply.)
– /24
– 255.0,0,0
– 255.255.255.0
– C::/24
– 255.255.256.0

– /24 is a Class C default subnet mask value (in CIDR) notation, CIDR is classless interdomain routing notation – 255.255.255.0 is a Class C default subnet mask value pg. 260

H.W.-5
Which IPv4 configuration options must be configured properly to communicate with websites on the Internet? (Choose all that apply.)
– IP address
– Subnet mask
– Default gateway
– DNS
– WINS

– IP address is the unique address used by computers on an IPv4 or IPv6 network. An IPv4 address is commonly displayed in dotted decimal notation 10.10.0.50 – Subnet mask is a number that defines which part of an IP address is the network ID and which is the host ID – Default gateway a router on the local network that is used to deliver packets to remote networks – DNS Domain Network Server is a system for converting computer host names to IP addresses

H.W. -6
Which of the following IP addresses can be used by a host on the global Internet? (Choose all that apply.)
– 192.168.0.55
– 172.32.0.1
– 169.254.99.208
– 38.15.222.299
– 99.99.99.99

– 172.32.0.1 – 38.15.222.299 – 99.99.99.99 pg-268-269

H.W.- 7
Which method can be used to assign IPv4 configuration settings when a DHCP server is not available? (Choose all that apply.)
– Static configuration
– Alternate IP configuration
– DNS
– WINS
– APIPA

– Static configuration is manually entering IP configuration – APIPA stands for automatic private IP addressing and are the 169.254.0.0/16 network and are designed as a solution for very small networks with no Internet connectivity. Computers are on the local network. page 262

H.W.-8
Which IPv4 address below has the same network ID as 10.16.112.45 given the subnet mask 255.255.0.0? (Choose all that apply.)
– 10.16.160.45
– 10.16.122.2
– 10.16.185.45
– 192.168.172.46
– 10.18.114.3

– 10.16.160.45 – 10.16.122.2 – 10.16.185.45 – 10.18.114.3

H.W.-9
Which of these addresses represents a valid loopback address? (Choose all that apply.)
– ::1
– 127.0.0.1
– 127::1/32
– ::/0
– FF::1

– 127.0.0.1 first octet 127 identifies loopback address in IPv4 – ::1 in IPv6 loopback address is 0:0:0:0:0:0:0:1

H.W.-9
Which utilities can be used to perform advanced firewall configuration? (Choose all that apply.)
– Netsh
– Group Policy
– Windows Firewall and Advanced Security
– Windows PowerShell
– Windows Firewall Control Panel applet

– Netsh – Group Policy – Windows Firewall and Advanced Security – Windows PowerShell

H.W.-10
A computer has the IPv4 address 192.168.0.23 and a subnet mask of 255.255.255.0. Which of these addresses represents a possible default gateway address? (Choose all that apply.)
– 192.168.0.254
– 193.168.0.1
– 0.0.0.1
– 127.0.0.1
– 192.168.0.1

– 192.168.0.254 – 192.168.0.1

H.W. -12
Which location type would be most appropriate to select when using your laptop computer to access the Internet by using a wireless hotspot at a tradeshow?
– Public network
– Untrusted network
– Domain network
– Private netowrk
– Public Network
– Trusted Network

– Public network

H.W. -13
_________provides you with a way to control how your computer views other computers on the network and advertises its presence on the network.
– Network Discovery
– Windows Firewall
– SMB
– IPv6
– Network location

– Network Discovery

H.W. -14
Which protocol is used by the Client for Microsoft Networks and File and Printer Sharing for Microsoft Networks to communicate with each other and share files?
– FTP
– IPv4
– IPV6
– HTTP
– SMB

– SMB

H.W.- 15
Which of these addresses represents a valid IPv6 link-local address?
– FE80::2cab:2a76:3f57:8499
– 169.254.12.1
– ::1
– 2001:0:4137:9e74:2cab:2a76:3f57:8499
– FF::1:2

– FE80::2cab:2a76:3f57:8499

H.W. -16
A user has been given Full Control permission to a shared folder. The user has been given Modify permission at the NTFS level to that folder and its contents. What is that user’s effective permissions to that folder when they access it through the shared folder from another computer?
– Modify
– Full Control
– Read
– No access

– Modify

H.W.- 17
Which IPv4 address below has the same network ID as 192.168.112.45 given the subnet mask 255.255.255.0?
– 10.0.0.45
– 192.168.113.46
– 192.168.112.257
– 172.16.112.45
– 192.168.112.5

– 192.168.112.5

H.W.-18
Which sharing method should you use if you want to configure share and NTFS permissions for a user in a single process?
– Public folder sharing
– Share with
– advanced sharing
– Create A Shared Folder Wizard

– Share with

H.W. -19
Which sharing method does not allow you to pick the folder that is being shared?
– simple sharing
– advanced sharing
– Create A Shared Folder Wizard
– Public folder sharing

– Public folder sharing

H.W.- 20
What is the most accurate way to view all of the shares on your system?
– Browse your computer on the network
– Use the Show me all the shared network folders on this computer link
– Use the Show me all the files and folders I am sharing link
– View the shares in Computer Management
– View the shares in Network and Sharing Center

– View the shares in Computer Management

H.W. – 21
The Internet connection technology that requires a mobile broadband device and a data plan that activates this feature is known as a _______ connection.
– WWAN
– dial-up
– DSL
– cable modem
– 802.11n

– WWAN

H.W.- 22
Which Internet connection type is most likely to require the use of PPPoE?
– cable
– DSL
– dial-up
– wireless hot spot

– DSL

H.W. -23
A user has been complaining that their wireless connection has been connecting and disconnecting too frequently. What command could you use to generate a detailed HTML-based report for analysis of the wireless connection on their computer in the past?
– netsh wlan show wlanreport
– netcfg wlan show report
– netsh int ip report
– netcfg -d

– netsh wlan show wlanreport

H.W.-24
Which of these addresses represents a valid IPv6 global unicast address?
– FE80::2cab:2a76:3f57:8499
– 169.254.12.1/64
– 2001:0:4137:9e74:2cab:2a76:3f57:8499
– 2001::1::FEA
– FF::1:2

– 2001:0:4137:9e74:2cab:2a76:3f57:8499

H.W. -25
To convert host names to IP addresses on the Internet, ____ is used.

DNS Domain Network Server

Share This
Flashcard

More flashcards like this

NCLEX 10000 Integumentary Disorders

When assessing a client with partial-thickness burns over 60% of the body, which finding should the nurse report immediately? a) ...

Read more

NCLEX 300-NEURO

A client with amyotrophic lateral sclerosis (ALS) tells the nurse, "Sometimes I feel so frustrated. I can’t do anything without ...

Read more

NASM Flashcards

Which of the following is the process of getting oxygen from the environment to the tissues of the body? Diffusion ...

Read more

Unfinished tasks keep piling up?

Let us complete them for you. Quickly and professionally.

Check Price

Successful message
sending