Home » Flashcards » Windows 10 Configuration

Windows 10 Configuration

   Send article as PDF   

Which of the following are networking models that can be used with the Windows operating system? (select three)

Workgroup Standalone cllient-server

You are consulting a small startup company that needs to know what kind of windows computer network model they should implement.
The company will start small with only twelve employees, but plans to double or triple in size within twelve months.
The company’s founders want to make sure they are prepared for growth.
Which networking model should they implement?

client-server

You are configuring a small workgroup. You open system properties that will be in the workgroup. Click the system properties options you can use to configure each computers workgroup association. (Select two, each selection is a complete solution.)

Network ID Change

You are a contract support specialist managing the computers in a small office. You see that all the computers are using local user accounts.
Which of the following network models could this office be using? (select two)

Workgroup Stand- alone

You have several personal mobile devices that you use on a daily basis. You want to be able to authenticate to each device with the same user account so you can share your personal data and apps regardless of which mobile device you use. Which type of user account must you create?

Online user account

Your user account is ADuser. You want to login to the Corpwest domain from a computer you haven’t used before.
You are at the login screen, and just below the username and password fields, you see that this computer will try to login to the Corpsouth domain by default.
Which can you enter in the user name field to change the domain the computer will log onto?

corpwest/ADuser

You are working on a computer running Windows 10. Two devices connected to the computer are not performing correctly. You suspect the devices are conflicting with each other because they may be using the same system resources. What should you do to identify the problem? (Select two. Each answer is a possible solution.)

Open Device Manager and view the Resources tab. Run System Information (msinfo32).

You are working on a computer running Windows 10. You have several standard users needing permission to install devices on this computer because Windows 7 does not include the necessary drivers for the devices. What should you do? (Select two. Both answers are complete solutions.)

Enable Allow non-administrators to install drivers for these device setup classes in Group Policy. Run pnputil -i -a to add the drivers to the driver store

Which command would you enter at the command prompt to list all third party drivers on a Windows system?

Run pnputil -e

You recently installed a device that you only need temporarily. After several days of using the device, you remove it from the computer, and now you would like to remove the device driver as well. What should you do? (Select two. Both answers are complete solutions.)

At the command prompt, run pnputil -d. In Device Manager, uninstall the device.

You create the D:\drivers folder on the computer for third party drivers and copy drivers for special devices to that folder. You want non-administrative users to be able to install devices on the computer without needing administrative privileges and without being prompted for the driver, but only for those devices whose driver is located in the D:\drivers folder. What should you do?

add the driver folder to the DevicePath registry key

You are only a standard user on a computer that you use at work. (You are not an administrator.) You connect your Mp3 player to the computer, but the computer is not able to play files from the device. You need to get information from the device to identify the problem. What should you do?

In Control Panel, click devices and Printers.

You would like to update the video driver that is used on the computer. click the hardware category type in Device Manager where you would make this change.

Display-Adapters

You need to install an updated driver for a hardware device on the computer. You need a driver file which has been tested by Microsoft and comes from a legitimate source. What should you do?

Install an updated driver with a digital signature

You need to find out if there are any device drivers on your system without Digital signatures. Which of the following should you use?

sigverif.exe

After completing a clean install of Windows 10, you realized the computer is unable to connect to the network. You decide to open device manager to identify the problem. Based on the included screenshot of device manager what action should you take to resolve the issue?

right click the realtek RTL8 Fast ethernet controller and click Update Driver Software.

You try to listen to Audio CDs, but no audio is coming from the speakers. After checking the speaker cables, the volume level, and the mute feature, you check Device Manager and see the dialog shown in the image. What should you do?

In Device Manager, enable the Soundmax Integrated Digital HD Audio Driver device.

After upgrading a Video driver on a Windows system, the Screen becomes unresponsive. You need to get the system working properly with the least amount of effort and time. Which of the following options can you use to get your Windows system back to a stable state (select two)

Reboot the computer with the Windows Installation disk and select Repair your computer to launch the system restore utility Reboot the computer into safe mode and use device manager to roll back the driver.

You are working on a computer running Windows 7. Your audio card is working, but you learn about an updated driver that adds some new features to the device. You download and install the new driver. After you restart and log on to Windows 7, you can no longer play audio files. Using a minimum of administrative tasks, you need to find a solution to be able to play audio. What should you do

In Device Manager, roll back the driver.

You have a Windows computer that is shared by multiple users. The default printer on your computer is a Sharp AL-2040. When you send a print job to the default printer, nothing happens. Other users who also use the same printer are not experiencing any problems. What should you do?

In Devices and Printers, right-click the Sharp AL-2040 icon and select Troubleshoot.

You install a new internal sound card in the computer. After rebooting, you install the driver, but the device doesn’t appear to be working. You need to view information for the device and perform troubleshooting steps. What should you do?

Open Device Manager to view the status of the sound card.

While working in device Manager, You notice the display shown in the exhibit. What does the icon next to theUSB mass storage indicate?

the driver for the device is unavailable.

You need to set the refresh rate for your monitor. Click the option in the screen resolution window you would use to do this

Advanced Settings

you plan to use a newly installed windows system with an LCD monitor. You want to ensure that the text displayed on the screen is as clear, sharp, and easy to read as possilble. Which option in the display window should you use to do this

Adjust Clear Type text

You need to view a list of all valid display modes that are compatible with the video card installed on your Windows System. Click the options you would use in the display screen to do this (select two)

Adjust Resolution Change Display Settings

Your LCD monitor has a native resolution of 1440×900 at 64 hz. etc…….
Which scree resolution should you use with this system?

1440×900

You’ve just connected your windows system to a large CRT monitor. The monitor supports screen refresh rates up to 75Hz and a resolution of up to 1280×1024. etc………
Which screen resolution and refresh rate would be best to use with this system? (Choose two options. Each is part of the full solution)

75 Hz 1280 x 1024

Which screen saver option can be used to increase security by requiring the user to enter a password to access the desktop after the screen saver has been activated?

On resume, display logon screen

Which visual effects option disables all visual effects when it’s selected?

Adjust for best performance

Match the file system component on the left with the appropriate description on the right.

A logical division of a storage space on a storage device; Partition A single storage area within a file system that can encompass a single partition or span multiple partitions; Volume A function used to sort and manually organize data; Folder The most basic component of a file system, which is used to organize raw bits of storage data on a device; File

Which of the following is the process of preparing a partition to store data.

Formatting

Match the property on the left with the correct file system type on the right.

NTFS AMOUNT OF FILES; Over 4 billion FAT32 Maximum file size; 4 gigabytes NTFS Maximum file size; 16 Terabytes NTFS Maximum Volume size; 256 Terabytes FAT32 Maximum volume size; 2 Terabytes

Which of the following is a partition format that was created as a replacement for the legacy MBR partition format?

GUID PARTITION TABLE (GPT)

Which of the following is a fact you need to be aware of when implementing GPT partitioning?

Windows can only boot from a GPT partition on UEFI-based computers running 64 bit versions of windows

You have two computers that run Windows

One computer has two hard disks. The second disk is a dynamic disk formatted with FAT32.

You remove the second hard disk from this system and install it into the other system.

After adding the disk, Disk Management reports it as foreign and you are unable to access data on the disk.

What should you do?

Import the disk

Your Windows system has an extra disk that has three primary partitions and an extended partition with two logical drives. All volumes are formatted with FAT32.

You want to convert the partitions to simple volumes, preferably without losing any data.

What should you do?

Upgrade the disk to a dynamic disk.

You have a computer that runs Windows .

The computer has a single hard disk with a single volume that takes up the entire hard disk.

You need to create a new volume named ‘Video’ for storing digital video files that are used as you create music videos. You want the new volume to optimize performance; fault tolerance is not needed.

What should you do?

Add two hard disks. Convert both disks to dynamic. Create a new striped volume using both disks.

You have a computer that runs Windows.

The second hard disk in the computer has been assigned D: as the drive letter. The volume is formatted with NTFS.

You decide that you would like to modify the D: volume to make it a RAID-0 volume.

You want to convert the volume to a RAID-0 volume using the least amount of effort and expense as possible.

What should you do?

Delete the existing volume. create a new striped volume. Restore data to the volume from a backup

You have a Windows computer with a new hard drive.

You want to create and format volumes on the hard drive.

What should you do

Run ‘Diskpart’ from the command prompt

You have a Windows system with a single hard drive.

You want to add fault tolerance to the existing hard drive.

You install a new hard drive in the computer.

What should you do?

Run DiskPart and use the Add command

You have a computer that runs Windows.

The computer has a single hard disk with a single partition. Windows is installed on this partition.

You decide that you would like to modify the existing volume to make it a RAID-1 volume to add fault tolerance to the volume. You add a new hard disk to the computer.

You want to convert the volume to a RAID-1 volume using the least amount of effort possible.

What should you do?

Add a mirror to the existing Volume.

You installed a new hard disk in your computer and need to prepare it to be formatted with a file system. There are four steps you must complete on the new disk in order to do this. Using the list below, move the necessary steps from the left and arrange them in the order they must be completed on the right.

Initialize it Partition it as MBR or GPT Create at least one volume assign a drive letter to the new volume

You have a Windows computer shared by multiple users. The computer has a single hard disk with a single partition. You want to make sure that each user can only save up to 4 GB of files on the existing hard disk. Files stored to USB devices should not count towards the limit. What should you do?

Configure disk quotas.

You have a Windowsl computer that is used by three users. Each user has a folder for storing personal data. Chat copies a file from a CD-RW to his folder and receives the message Insufficient disk space. He finds that he cannot even add data to an existing file and save it. Other users of the computer do not have the same problems. You see that the volume has over 20 GB of free disk space. You need to let Chad create and edit files. What should you do?

Increase the quota limit.

You want to enable a soft quota on the E: volume in your Windows system.
You have configured a 40 GB user quota on the volume with a warning at 30 GB. However, the quota configuration isn’t working.
Click on the option you must use to enable the soft quota for the E: volume

-Log event when a user exceeds their quota limit.

You have a Windows system with a single hard disk.
You notice that the disk defragmentation schedule has been turned off on you computer. The disk is badly fragmented.
You want to run disk defragmentation manually.
What should you do?

Run Defrag.

You want to modify the disk defragmentation schedule on your Windows 7 system to run twice a week on Wednesdays at 11pm.
What should you do?

In Task Scheduler, modify the default task to run on Wednesdays and Saturdays

You need to free up disk space on your Windows system and would like to delete all but the most recent restore point.
What should you do?

-Run Cleanmgr as an administrator, the use the "More Options" tab to clean up the restore points. -In Disk Cleanup, select "Clean up system files", the use the "More Options" tab to clean up the restore points.

You windows system has single hard drive installed. The C: volume encompasses the entire hard disk drive.
You suspect that there may be problems with hard drive. You need to run the chkdsk command at the command prompt to scan the disk for bad sectors (or any other errors) and automatically fix any that are found.
What command should you use to do this?

chkdsk C:/r

You manage a Windows system that is shared between multiple users.
You have enable quotas for the E: volume in the system and have established a user quota of 40 GB with a warning level of 30GB.
However, after several weeks in service, you notice that users are able to consume disk space beyond the 40GB limit you set.
Click on the option in the Quota Settings screen for the E: volume that you can use to fix this problem.

Deny disk space to users exceeding quota limit.

Your job requires a considerable amount of travel. While working in your office you use a windows desktop system.
While on the road you use a Windows RT Tablet device. While traveling you frequently need to access files stored on the desktop system from your tablet device. Which windows service can you implement to use your tablet to access files stored on the desktop?

OneDrive

When you initially installed your windows system……
Click the tab that contains the option to increase your OneDrive storage capacity.

Account

You want to enable OneDrive to automatically sync files stored in your documents and pictures folder. In the oneDrive dialogue settings box below, click the tab that contains the option to select the Documents and Pictures folder to automatically sync with your OneDrive.

Auto Save

When you initially installed your windows system……Click the tab that contains the options to change the folders that are synced with your OneDrive account

Account

From your OneDrive online account you should be able to remotely access any file or folder that has the OneDrive app installed….. Click the OneDrive feature that you must enable so you can remotely access the files and folder on the computer from OneDrive online.

Let me use OneDrive to fetch any of my files on this PC

You place a new disc in an optical drive then double-click the drive in the operating system’s file browser interface. An error message appears stating that the drive is not accessible. What should you do

Wait. Then try again

You have just finished upgrading the power supply in your desktop computer. Now the hard disk will not work. What should you do first?

Make sure that the hard disk is connected to the power supply.

When you try to read a particular DVD-R disc that was burned in a different computer, you receive an error message. Other DVD discs work fine. Which of the following is the most likely problem?

The disc is dirty or scratched

You have just finished installing a new SATA hard disk in your computer. Now your SATA DVD drive won’t work. What should you do first?

Make sure that the DVD SATA cable is connected. Make sure that the DVD power cable is connected. Explanation The first thing to check would be the simple and obvious things. Make sure that the cable connecting the DVD drive is secure. It is possible that during the installation of the hard disk that the cable might have come loose. All of the other choices would involve significantly more work. Master and Slave settings are not used on SATA devices. Moving the DVD drive to another system might make it start working, but you should verify the current configuration before trying that. Replacing the DVD drive should only be done after you verify that it is not working correctly.

Due to a blackout, power is no longer coming from the wall outlet and your computer is now off. You do not have a UPS and you need to remove a disc out of the DVD drive. What is the easiest method for retrieving the disc?

Insert a straightened paper clip into the hole on the front of the drive

You want to create a RAID 10 array using four newly-installed SATA disks. When you go to Disk Management, the option to create the RAID 10 array is not available. What should you do

install a dedicated raid controller

You have physically installed a new hard disk drive in your computer and configured the disk in the BIOS using the CMOS setup program. You try to access the hard disk drive in Windows Explorer, but the drive is not displayed. Which utility will you most likely use to solve the problem?

Disk Management

You have a computer where a removable disk drive has been formatted with NTFS. You want the drive to use FAT32 to be compatible with more OSes. The drive is currently configured using drive letter D:. What should you do?

Back up the data on the D: drive. Reformat the D: drive using FAT32. Restore the data.

Which of the following utilities would you use to correct cross-linked clusters within the file system on a windows Workstation?

chkdsk

Lately you hear a clicking noise when reading or writing data from the hard disk. What is the most likely cause of the clicking?

Failing hard drive

A user reports that they are unable to access their Firewire drive after moving the PC from beneath the desk to the top of the desk. What is the most likely cause of this problem?

The Firewire cable is loose.

After installing a new SSD drive in your system, you determine that TRIM functionality has not been enabled on the drive by the Windows operating system. You need to manually turn TRIM on. Given that the volume on the drive has been assigned to drive letter of E:, which command should you use at the command prompt to do this?

fsutil behaviour set DisableDeleteNotify 0

You have installed a new Hard disk drive in your computer, configured the disk in the BIOS, and partitioned the disk. You try to access the hard disk drive in Windows explorer but receive an error message. Which Utility should you use to solve the problem?

format

You have a hard disk drive that has a single primary partition and has been assigned D: as the drive letter. Which tool would you use to configure the drive to use the FAT32 file system?

format

Which of the following is the best way to maintain the performance of the solid state drive? (SSD)?

Keep the driver below 90% capacity.

You have a small network with three subnets as shown in the graphic. Addresses for each router interface are also indicated. You need to connect Wrk_1 to SubnetA and Wrk5_C to SubnetC. Which IP addresses should you use? (Select 2)

• Wrk1_A = 192.168.111.32
• Wrk1_A = 192.168.111.62
• Wrk1_A = 192.168.111.65
• Wrk5_C = 10.155.64.97
• Wrk5_C = 10.155.64.111
• Wrk5_C = 10.155.64.114

Wrk1_A = 192.168.111.62 Wrk5_C = 10.155.64.97

You manage the small network that is connected to the Internet as shown in the graphic.

You add Host A to the network. All hosts use manually-assigned TCP/IP values. The subnet where host A resides uses a 28-bit subnet mask. Which TCP configuration values should you choose for Host A?
Possible choices:
66.11.177.12 10.0.0.97 255.255.255.192
66.11.177.13 10.0.0.110 255.255.255.224
10.0.0.204 10.0.0.111 255.255.255.240
10.0.0.205 255.255.255.248

• IP Address: 10.0.0.97 • Subnet Mask: 255.255.255.240 • Default Gateway: 10.0.0.110

Your Windows system has an IP address of 172.17.8.3 assigned to it with a subnet mask of 255.255.0.0. What is the IP address of your network segment?

172.17.0.0

Your Windows workstation has an IP address of 192.168.1.25 assigned with a subnet mask of 255.255.255.0. It also has a DNS server address of and a default gateway router address of 192.168.1.254
Where will the packets be sent next?

To the default gateway router

Your Windows workstation has an IP address of 192.168.`.35 assigned with a subnet mask of 255.255.255.0. It also has a DNS server address of 192.168.1.1 and a default gateway router address of 192.168.1.254 assigned. Your workstation is a member of the westsim.com domain. The domain controller’s address is 192.168.1.3
Your workstation needs to connect to a web server using the HTTP protocol. The web server has an IP address pf 192.168.1.2 and a subnet mask of 255.255.255.0
Where will the packets be sent next?

Directly to the web server

Your Class C network currently has IP addresses 192.168.1.1 through 192.168.1.254 statically assigned to various workstations and servers using the default Class C subnet mask 255.255.255.0
A new employee has been hired and you need to provision her with a Windows workstation.
Which IP address could you assign to this system?

No addresses are available for this system on this network

You are implementing a Network Address Translation Router on your network to translate private IP addresses into a single registered IP address allowing Internet Access.
Which private IP address ranges could you use to implement on your internal network with this router?

10.0.0.1 – 10.0.100.254,1 172.17.8,1 – 172.17.9.254

Consider the ip with CIDR 17/17.8.5/22

255.255.252.0

Which block of addresses is defined for use with Automatic Private IP Addressing (APIPA)

169.254.0.0/16

You’ve decided to use a subnet mask of 255.255.192.0 with your 172.17.0.0 network to create four separate subnets.
the network ID for one of the subnets is 172.17.0.0. You are installing the first host (a server) on this subnet and want to assign the lowest numbered IP address possible to this system

Assign the system an IP address of 172.17.0.1

You’ve decided to use a subnet mask of 255.255.192.0 with your 172.17.0.0 network to create four separate subnets.
The network ID for one of the subnets in 172.17.128.0. You are installing DNS/DHCP server on this subnet and want to assign the highest numbered IP address possible to this system

Assign the system an IP address of 172.17.191.254

You recently set up a DHCP server and need to configure your computer to start using it.

Obtain the IP address automatically

Which of the following best describes the role of a DHCP server? (select two)

delivers DNS server addresses and other configuration info to hosts automates the process of assigning IP addresses, subnet masks, and default gateways addresses to network hosts.

Match each netstat command option on the right with the appropriate function on the left

-a Displays all connection and listening ports -n Displays addresses and port numbers in numerical form. -b displays the executable that created each connection or listening port -e Displays Ethernet statistics -o Displays the owning process Id associated with each connection -r Displayed the routing table -p Shows connections for a specific protocol -s Displays per-protocol staticsics

Match the tool or command on the left with it’s appropriate description on the right.

tracert ipconfig Network and Sharing Center Event Viewer NSLookup ping Windows Network Diagnostic netsh

Which data transmission rate is defined by the IEEE 802.11b wireless standard?

11 Mbps

You are designing a wireless network for a client. Your client needs the network to support a data rate of at least 54Mbps. Which 802.11 standard will work best in this situation? select two

802.11n 802.11a

Which of the following are frequencies defined by 802.11 committees for wireless networking. select two

2.4GHz 5.57GHz

Your organization uses an 802.11b wireless network. Recently other tenents installed the following equipment in your building…. which system is most likely to blame?

The wireless tv system

How many total channels are available for 802.11a wireless networks?

23

You want to implement 802.1x authentication on your wireless network. Which of the following will be required>

RADIUS

You want to connect your client computer to a wireless access point connected to your wired network air work. The network Admin tells you that the access point is configured to use WPA2 personal with the strongest encryption method possible. SSID broadcast is ruined off. Which of the following must you configure manually on the client. select three

SSID AES Preshared Key

Which of the following offers the weakest form of encryption for an 802.11 wireless network?

WEP

Which of the following wireless network protection methods prevents the broadcasting of the wireless network name?

SSID broadcast

Which of the following measures will make your wireless network invisible to the casual attacker performing war driving?

Disable SSID broadcast

Which of the following features are supplied by WPA2 on a wireless network?

Encryption

You have installed a New Windows System, and you have not changed the default configuration of the Windows firewall. How will the Windows Firewall handle inbound traffic that was initiated from an external server that a hacker is using to spread a worm?

All such traffic is blocked by default.

You have installed a new Windows System, and you have not change the default Configuration of the Windows Firewall.
How will the Windows Firewall handle inbound responses to requests sent from the local system

all such traffic is allowed by default.

which of the following predefined exceptions in Windows Firewall allows user to view and control remote desktops?

Remote Assistance

Drag the Windows Firewall tool on the left to it’s appropriate description on the right.

Windows Firewall with Advanced Security Windows Firewall interface in Control panel Network Location Awareness Windows Firewall with Advanced Security Settings network location awareness

You need to change how Windows provides notification when Firewall blocks a new program. Click the link that you would choose to make this change.

Your Windows system has an application installed that you no longer need? What should you do?

Locate the application in programs and features in Control Panel and click Uninstall

Several weeks ago, you installed a desktop application on your Windows system using the default parameters suggested by the application installer. However, after using the application for a time, you realize that you need an optional application feature that wasn’t included in the default installation. You have opened Control Panel on your Windows system, accessed Programs and Features, and selected the application. What should you do?

click change

Several weeks ago, you installed a desktop application on your Windows system. Yesterday, you installed another desktop application on your system that has developed in-house by your organization’s application development team. After doing so, you notice that the first application behaves erratically and frequently locks up. You have opened Control Panel on your Windows system, accessed Programs and Features, and selected the application. What should you do?

click Repair

Installed desktop applications on a Windows system that are displayed in Programs and Features typically have associated entries in which Registry key?

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall

You are about to install a new desktop application on a Windows system. What should you do before you start the installation? (Choose three.)

set a restore point verify that the application is compatible with the version of Windows you are using scan the installer for malware.

Enter the name of the tool that generates an alert when a task or operation requires Administrative priveledges.

UAC

Which of the following tasks do standard user account not have rights to perform (select three)

Turn off Firewalls Install new drivers and other software for all users configure security policies

You are considering implementing an application virtualization server in your network using an app-V server. You need to convince key decision makers……(select two)

You can configure published applications to be cached and executed locally on each Ap-V client system YOu can implement a second Ap-V server for fault tolerance

Which of the following is a method for implementing Ap-V

The application is cached on the local client system from the application server and run locally on the client.

You need to provide load balancing and fault tolerance with your Ap-V deployment. Which of the following tasks are required to accomplish this?

Set up and configure multiple Ap-V servers

You are configuring a published application on an Ap-V server….

shortcuts

You’ve been using the Windows store App and now need to exit out of it. What should you do?

click the close button in the app window

Yuu need to configure content based restrictions for apps available to child users….

Family and other Users

What steps must you take to uninstall an app you installed from the windows store?

right click the app tile and click uninstall

Turn off the store application policy

Store

You have an app installed on your windows system that has not been pinned to your start menu. How can you locate the app (select two)

Search for the app by typing it’s name in the search field on the taskbar click the start tile and then click all apps and scroll through the list of apps.

You have an app you installed from the windows store that you use very frequently….

right click the apps tile and click more > pin to task bar click and drag the apps tile from the start menu to the task bar

during the process of developing and digitally signing the app an .appx file and root certificate were created….
What must you do before you can install the app on users workstations?

install the root certificate into each workstations trusted Root Certification Authorities store.

You need to enable sideloading on a Windows 10 system. click the option in the settings app that you would use to do this.

For Developers

You need to develop and then install a sideloaded app on the windows 10 professional systems within your organization. Which of the following are true regarding this process (select two)

the app may be digitally signed using a self signed certificate minted by Active Directory Certficate Services on a Windows Server Sideloading must be enabled on the windows 10 professional system using the settings app.

You plan to use a certificate purchased by Symantec to digitally sign the app prior to sideloading it on your windows system. Which of the following is true regarding this process?

You do not need to manually import the certificate used to digitally sign the app on each system.

You recently developed a productivity app for you windows 10 system and now need to sideload it on the windows 10 professional systems in your organization. What power shell cmdlet can be used to do this?

Add-AppxPackage

You are in the process of deploying Azure remote app…..you need to ensure users can run .rdp files that are signed with a valid certificate on their devices.

Allow RDP files from valid publishers and users default .rdp settings

You need to ensure users cannot run .rdp files that have not been digitally signed or that have been signed using a self signed certificate.

allow rdp files from unknown publishers

which device types are supported by Azure remote app (select two)

windows 10 desktop and windows 7 notebooks ipad and android tablets

You are using the office 365 admin center to deploy ….you need to assign each user a license to use office. Click on the options in …

Dashboard Users

YOu want to limit users to just the office 2016 version of the product

Service Settings

Your Windows system is a member of a domain. To increase security as users log onto the computer, you need to implement the strongest form of multi-factor authentication. What should you do?

Require a password, biometrics scan, and a token device.

Your Windows system has device which are Personal Identify Verification (PIV) compliant. You want to implement a form of authentication which takes advantage of PIV. What shoud you do?

Use smart card authentication.

Your Windows system has devices which are Personal Identity Verification (PIV) compliant. You want to implement a form of authentication which takes advantage of PIV. What should you do?

Use smart card authentication

The process of submitting and checking credentials to validate or prove user identity. Authentication is used in access control to allow only specific individuals access to a building or computer system.

Authentication

drag the authentication feature on the left to the appropriate description on the right.

cetificate – digital document that identifies user or computer. biometric – Human trait kerberos V5 default authentication method for windows secure channel – uses SSL and TLL for authentication smart card – physical object

what is the name of the process of granting or denying access to a resource based on identity?

authorization

which of the following is a restriction or setting applied to a user or computer

policy

You have a team of desktop support specialist….which built in Windows group should they be assigned to?

network configuration operators

each user profile has it’s own registry database file that holds all user specific registry settings

Ntuser.dat

You manage a Windows notebook system that is shared by members of the Sales team.
Sales team members use standard user accounts to log on to the computer. You want to allow users to change the system time zone. You need to grant them this ability while limiting their ability to perform unrelated tasks.
What should you do?

-Configure user rights for the Sales group in the local security policy.

You need to use the runas command to run the zip.exe executable on your Windows system as the Admin user on your system, which is member of the Administrators group.
Which option should you use with the runas command to do this?

/user:Admin

Click the policies you would use in the local Group Policy organizer that you would use to enforce this (select two)

enforce password history minimum password age.

quizlet which of the following terms is a collection of a user’s personal settings and data files

User Profile

which type of user profile lets you save user specific profile data to a central location for simplified administration?

roaming profile

you need to reconfigure a windows 10 system to give the Dnelson user rights to the following:
connect to shared resources on the computer

access this computer from the network allow log on through remote desktop services

which of the following are true concerning the password must meet complexity requirements

Dictionary words are not allowed in password passwords must be at least 6 character long Users must create a password that uses three of the four types of special characters.

which of the following passwords would Ahammer be allowed to use

0badBeef! Plymcud65#1

You need to use the runas command to run the coolap.exe executable on your Windows system as the Admin user on your system, which is member of the Administrators group.
Which option should you use with the runas command to do this?

/user:Admin

Match the credential guard component on the left with its function on the right

kerberos tickets – grants users access to local domain resources Local security authority – stores user authentication information virtual secure mode – tags running processes as belonging to a virtual machine. Hyper V – provides virtualization functionality on a Windows system.

you need to enable credential guard on a Windows 10 Enterprise system. Which windows features need to be enabled to do this? (select two)

HyperV – Hypervisor Isolated User Mode

for the D:|Reports|Finances.xls file, you explicitly

use the robocopy command to copy the file to the C:|Reports2folder.

Which DAC component is used to tag scanned files

Resource properties

Which DAC component is used to scan files for specific information such as a text string or a regular expression.

classification rules

which DAC component specifies conditions that must be matched for permission assignments to be made?

central access rules

PerformanceReviews.docx. A user named Dcoughanor has the following permission assignments to this file.
NATFS- modify, read and execute, read, and write
DAC – read
what is Dcoughanors effective access to this file?

read

YOu are sharing a photo in your onedrive account with a freind. you want the friend to be able to edit the photo

anyone with this link can view this item

You need to make sure the users group only has the list folder contents and Read permissions on the testout folder. Click on the tab that will allow you to verify the permissions users have to this folder

Security

you are preparing to share a project folder with your team, You are all on the same network domain . Which sharing options must you select to make sure the team can see the project folder? (select two)

turn on network discovery turn on file and printer sharing

While working from home you prepared a project folder to share with your team at work. When you got into the office……

Domain

YOu have a folder on your windows desktop system…
the team is doing some competitive analysis…..

Grant everyone the full control share permission, but configure NTFS permissions to be more restrictive.

which of the following must be done in order for your team members to see the shared folders on the network? (select all that apply)

turn on the network discovery in the domain Network profile on your computer. turn on file and printer sharing in the domain network on your computer turn on file and printer sharing in the domain network on your team members computer.

Your company has several office locations you travel to frequently. You want to configure your laptop to easily switch the default printer as you move from one location to another.

enable the Let windows manage my default printer option

Your windows system hosts the shared printer displayed in the sample image…. click the tab you would use in the printer properties box to reduce load…

sharing

you have been asked to install windows 10 on several computers that do not have optical drives. What should you do? select three

use the bootsec command to make the flash drive bootable use a usb flash drive w/ at least 4GB storage space Copy the product DVD to a usb flash drive and boot from the drive

you want to prepare a usb flash drive that you can use as a windows 10 installation source

click custom install windows only (advanced)

clean installation SATA

drive options advanced

load driver

which of the following are true concerning the activation status of the copy of Windows 10 installed on this system

the systems hardware ID has changed the activation status of windows has not changed.

The network board quit working recently. so you made the following changes to the system harware:

The activation status of windows has not changed The systems hardware ID has changed

Recently several capicitors on they system motherboard began leaking so you replaced it with a newer motherboard and a faster CPU. The system still uses the original hard disk and optical drive

The systems harware ID has changed Windows must be reactivated

You have confiugered a Windows Server in your network to provide activation for Windows workstations using the key management service

The Windows client system will attempt to renew every 7 days. KMS activations are good for 180 days.

You have confiugered a Windows Server in your network to provide activation fo you Windows worksatiions us Active Directory.

The windows client systems will remain activated as long as they remain members of the domain. The windows client systems and the windows server must all be members of the same domain.

One of the users installs a new internet explorer add on that interferes with the browsing functionality of other users on the system, but the add on is necessary for business purposes. What should you do?

Instruct the other users to log on and disable the add on.

Click on the option in Settings you would use to configure options such as…
letting apps use your advertising ID
letting apps user your camera
your microphone
turning on the smart screen filter

Privacy

Click on the option in settings you would use to configure accomodations for users with impaired vision or hearing

Ease of Access

Click on the option in settings you would use to customize the appearance and behavior of the start menu

personalization

Fill in the blank with the name of the personal assistant feature that is available with Windows 10

Cortana

You want to change how the long date is displayed from the english format to the british format. click on the option in the control panel you would use to make this change

Clock, language, and region

You must prevent internet explorer on your windows system from leaving a trail of your browser session. What should you do?

open an InPrivate Browsing session

Which internet explorer security feature restricts the browsing session information that can be tracked by external third-party websites and applications

tracking protection

Has the highest level of security settings and identifies potentially malicious sites. Only add sites to this zone if it is necessary. Its default security level settings is set High and its default protected mode settings is enabled

Restricted Sites

You access the Widgetproject share on a server at your organizations headquarters over a WAN Link using the following UNC path \\FS3\WidgetProject. Click the zone this sire belongs to by default in Internet Options

Local Intranet

• You need to work on several key projects over the weekend on your Windows Vista desktop system at home. However, one of the applications you need to complete your work only runs on Windows 8.x. You decide to create a Windows To Go drive so you can take your computer environment home from work. You have a PNY 32GB 2.0 flash drive that you want to use for the Windows To Go drive. Will this configuration work?

yes, but performance will be impacted because it’s not a USB 3.0 device.

You’ve booted your home PC from a Windows To Go drive you created at work from your Windows 8 desktop system. Which of the following are true of you PC while the Windows To Go environment is running?

The Windows store is disabled by default – the Windows recovery environment isn’t available

You have a windows certified external USB drive that you want to use for the Windows to Go drive. Which feature should you use to protect the data on this device.

bitlocker

You need to create a windows to go drive from the command line. Move the command line tools you would need to use to complete this task to the right.

diskpart dism bcdboot

You need to be able to create Windows to Go drives for your organization. Which edition of windows 10 can you use to do this?

Windows 10 Enterprise.

Which of the following features are also available on the Windows to go drive (select three)

bitlocker management tools group policies

you have a windows 7 system that you would like to uprade to windows 10. How can you make sure that everything in your current system is compatible with Windows 10

Run windows 10 upgrade assistant

after installing the latest windows 7 update, which of the following are recommended steps you should perform to prepare for the upgrade? ( select all that apply)

gather installation discs and product keys for applications that you want to keep. create a system image back up your data

YOu are running the windows 10 upgradde process and have reached the point in the process shown below. You are very concerned about keeping your personal data private. Which option should you click?

Customize settings

YOu have been running windows 10 on your system for 6 months. You need to know which version of windows 10 it is running so you open a command prompt and enter winver command. The about windows dialogue contains the information below. What does this information tell you?

This is the original version of Windows 10 and it has not been recieving updates.

YOu have been running windows 10 on your system for 6 months. You need to know which version of windows 10 it is running so you open the settings app and click system. On the about tab the information shown below is displayed. What does this information tell you?

This is not the original version of windows and it has been receiving updates.

You are helping a user who has been running windows 10 for over a year. You notice that some features don’t look the same as they do on your window system. For example the tiitle bars on windows are plain white and the start menu is not as polished. How do you know this computer has not been receiving updates.

There is no entry for a windows 10 version number There is no entry for an os build number

YOu have a workstation running a Windows 10 home that you would like to upgrade to the windows 10 pro edition. How can you perform this upgrade with the least amount of effort and cost while maintaining applications, drivers, and user profile data

Run the windows 10 anytime upgrade.

YOu have a 64 bit computer that runs windows 7 Professional. You would like to upgrade the comuter to Windows 10 pro.

Yes this system meets the requirement for upgrading to windows pro

YOu need to upgrade a notebook system running 64 bit windows 7 home premium edition to 64 bit windows 10 enterprise.

Windows 7 home premium cannot be upgraded to Windows 10 enterprise.

YOu have two computers. Computer A is runnign windows 7, computer B is runnign windows 10. You need to migrate all user profiles and data from computer A to computer B.
Which command options must you include to ensure the user accounts on the destination computer are created and enabled during the migration?

On computer B run loadstate with the \lae \lac options.

You have two computers. Computer A is running windows 8.1 and computer B is running Windows 10. You are using USMT to migrate the user profiles and the default date files from computer A to computer B. The user works with graphics so you must also include .jpg. Which actions must you take to specify that the migration includes al .jpg files?

Create a custom XML file and then use <include> statements to specify

You need to migrate specific application settings from Computer A to computer B by using USMT. What should you do? select two.

run scanstate with the / genconfig option edit the config.xml file

YOu have a computer that runs windows xp professional. You want to upgrade your computer to windows 7 professional. You want to customize the migration of application, user profile, and user data. what should you do? (select two)

run scanstate with the / genconfig option edit the config.xml file

YOu have a computer that runs windows 7. YOu want to perform a clean installation of windows 10 and maintain as much fo the application settigns, user profile, and user data as possible. Which steps should you perform to complete the migration with the least amount of effort possible?

run scanstate in windows 7. Perform a custom (advanced) installation of Windows 10 to the existing hard drive. Boot into windows 10 and re-install all applications. run loadstate.

Drag each scanstate command-line option on the left to the description of it’s function on the right.

Allow overwriting of existing data: /o specify users to omit from migration: /ue specify users to be migrated : /ui generate a space estimate: /p /nocompress

Drage each loadstate command-line option on the left to the description of it’s function on the right.

specify users to be migrated : /ui enable user acccounts: /lae specify users to omit from migration: /ue create user accounts: /lac

You have two computers. WS1 is running windows 7 and ws2 is running windows 10. You need to migrate all user profiles and data files from ws1 to ws2. You need to ensure that user accounts created on the destination computer are created and enabled during the migration. What should you do?

on WS2 run loadstate with the /lae and /lac options

Which in tune portal should you use to performe a remote wipe?

admin portal

An end user in your organization has been issued a windows 10 notebook to use while traveling…..
to enforce security settings you decide to manage the notebook with your cloud based in tune account. …. however the user has already taken the notebook home.

instruct the user to enroll the notebook using the company portal

One of your sales representatives left his notebook at a customer site. The device contains sensitive information and you want to change the password to prevent the data from being compromised. Which intune portal should you use to remotely change the password?

Admin Portal

You need to apply those security policies to the end user’s devices. What should you do?

create user acccount for each user who has a managed mobile device. enroll the devices with the intune service.

drag the deployment configuration tasks on the left in the proper place and order in which they should be completed on the right.

sign up for an intune account. create intune user accounts. define the intune policies enroll mobile devices.

What task must you perform before you can complete mobile device enrollments

set intune as your mobile device management authority.

you have a windows notebook system that is a member of a domain. You would like to protect the data on your notebook to meet the following requirements.

implement bitlocker with a TPM

you want to prevent access to any file on the hard drive even if the hard drive is moved on to another computer.
Which feature should you implement

bitlocker

you have a new notebook that you want to install windows on: You would like to use bitlocker on the notebook to protect the volume used for the operating system and all of the data.

configure bitlocker to use a startup key on a usb drive

you are getting ready to install windows on a new laptop. You would like to configure the laptop to use bitlocker. How can you configure the laptop to startup without requiring a pin or a USB device?

enable the TPM Create two partitions on the hard disk. Put boot files on the first partition and operating system files and data on the second partition.

You have two windows systems named computer 1 and computer 2. Both computers are configure with bitlocker. Both computers have a TPM installed. Because of a hardware failure computer 1 will not boot. Which action can you take to access the data stored on computer 1 ASAp?

Move the harddisk from computer 1 to computer 2. Use the recovery key from computer 1 to gain access to the encrypted volume.

which of the following options would you use to reconfigure bitlocker so the system will start?

recovery key.

You want to use bitlocker on a laptop that belongs to a domain……
How can you implement a solution that meets the stated requirements?

Configure Group policy to store recovery keys in the Active Directory Implement bitlocker with a tpm

You have lost the USB device containing the startup key. You also find that you are unable to locate the recovery key. what can you do to be able to boot the computer?

reformat the hard drive and re-install windows.

You need to use command line tools to prepare the default drive on a windows system for use by BitLocker. the new system partition should be 500 mb in size and should not be assigned a drive letter.

bdehdcfg -target default -size500

drag the description on the left to it’s manage bde.exe command option on the right.

-lock prevents access to bitlocker data -WipeFreeSpace removes unused data fragments from the free space on the drive. -ForceRecovery enables bitlocker recovery mode. -status displays bitlocker info for all drives on the computer -on encrypts the drive and enables bitlocker -unlock enables access to bitlocker protected data with a recovery password or a recovery key.

Which of the following modes is the recommended option and provides the highest level of security?

TPM with Pin and startup key.

drag the bitlocker security component on the left to it’s description on the right.

startup key- the only options for system without a TPM chip recovery key- Provides access to encrypted volumes if there are problems related to bitlocker as the computer boots data recovery agent- a user account that can recover encrypted data from bitlocker protected drives when the password or keys are lost. PIN- a copy of this is saved in the TPM startup key – Must be present on a USB flash device during the system startup. recovery key – Without this, the system can boot only to recovery mode and the data on the disk cannot be accesed.

You want to save some files on a USB thumb drive and protect the drive using BitLocker to Go. You want to be able to read these files on a computer that is running Windows XP professional. You need to implement a solution with the least amount of effort as possible. What should you do? (select two)

Format the drive using FAT32 Include the BitLockerToGo.exe file on the USB drive.

You have configured the USB thumbdrive with BitLocker To Go that has been formatted with Fat32. You use a password to protect the drive.
You want to be able to read and write files to the drive from a computer that is running Windows XP Professional.

UPgrade the Windows XP computer to Windows 7 Ultimate or Enterprise or later.

The hard drive in your Windows system has been protected using BitLocker. You need to update the BIOS on the computer. Which command should you use before doing this?

manage – bde-pause

How do you configure your windows system to require BitLocker To Go for write access to removable storage devices?

configure the local group policy

YOu have been given a USB drive that has been encrypted with BitLocker to Go. Which of the following options is required before you can access the data from this drive on a Windows 10 Computer? (select two)

the correct password a smart card.

Your organization is formulating a Bring Your Own Device (BYOD) Security policy for mobile devices

YOu cannot use domain based group policies to enforce security settings on mobile devices

Your organization is formulating a Bring Your Own Device (BYOD) Security policy for mobile devices running Windows RT

Windows RT will refuse to run apps not digitally signed by microsoft. aps will only run on windows rt if you leave user account control enabled

Your organization is formulating a Bring Your Own Device (BYOD) Security policy for mobile devices running Windows RT. You want to ensure that the storage devices in all Windows RT mobile devices are encrypted to prevent them from being removed and read in a different system.

To enable device encryption you must sign in to windows RT using a microsoft account. Windows RT devices rely on the Trusted Platform Module in the system firmware for drive encryption

You want to manually back up the key used for drive encryption on your windows RT tablet. Click the control panel item you would use to do this?

Manage BitLocker

Click the category in the setting app you would use to deny apps permission to use location data.

Privacy

Your organizations security policy specifies that any mobile device that connects to your internal network (regardless of ownership) must have remote wipe enabled. If the device is lost or stolen then it must be wiped to remove any sensitive data from it.

sign up for a Windows InTune account to manage the tablets.

hardware and windows startup components are clean

the kernel is not infected with a rootkit

antil malware is launched.

boot drivers are clean

What windows feature can you use to protect your network from malware threats that might be on your users mobile devices.

Device Health Attestation

How can you identify what is keeping the computer from entering sleep mode?

at command prompt run powercfg /energy

YOu need to migrate the setting to other laptops running the same version of windows. Before you migrate the plan, you need to validate the plan.

at a command prompt run power cfg/ export at a command prompt run power cfg / energy

You need to configure the following power options on your notebook system when running on battery power.

configure the advanced settings of any power plan

Which power plan will enable your windows notebook system to save as much battery power as possible?

Power saver power plan

YOu want to be able to stop working on your windows notebook system. save battery power, and resume work as quickly as possible. You also want to protect yourself from data loss should the battery fail.

enable hybrid sleep

YOu are on an airplane… you have several open windows with critical data.

put the notebook into hibernation

Click the Power plan you would use to provide full CPU power

High Performance

You would like your windows laptop to sleep when the batterly level becomes critically low.

battery

You need to implement a wireless solution to allow windows notebook systems to send audio and video streams to projectors so employees can give presentations.
Which mobile wireless technologies can you use to do this?

Miracast Wi-fi direct

YOu need to connect a windows tablet device to a mobile broadband 4g network. You’ve signed up for a service with a provider. what should you do next?

let windows retrieve and install the appropriate app from the windows store. install a 4g data modem.

which mobile wireless technology can leverage the existing 802.11n wireless network adapters already installed in your notebook systems?

wi-Fi Direct

You are evaluating wi-fi direct for establishing wireless communications between windows notebooks and mobile devices. such as phones and tablets. Which of the following statements are true regarding wi-fi direct?

It uses the 802.11n wireless standard It uses WPA2 security

which action must you take to see the tablet device from the desktop?

Update the wireless network adapter driver on the desktop system to one that is compatible with wi-fi direct.

You have a new set of wireless headphones that you need to set up …. Which technologies make this possible?

NFC Tap and DO

You need to customize which utilities and programs are processed at startup for the computer.

What should you do?

Run Msconfig

After running the Backup and Restore console, you notice that backups are not created for open files.

To troubleshoot the issue, you want to confirm that the Volume Shadow Copy Service (VSS) is started and is configured to start automatically when the computer boots.

What tool can you use to make sure VSS is installed automatically?

Services

After connecting to your company’s network, you are able to access all of your personal files.

Later in the day, you are having problems accessing the same files, as well as other files on the network.

What should you do?

Run Windows Network Diagnostics

You’ve opened the advanced system properties dialogue on the system. Click on the option you would use to reconfigure the default boot Operating system.

Startup and recovery – settings.

… troubleshooting a desktop application….causing frequent system crashes.
You need to reconfigure the system to do two things when a system failure occurs.
* It should not automatically reboot
* It should write a complete memory dump to C:\.Memory.DMP What should you do? select two

Go to Control panel \system\Advanced system settings On the advanced tab click settings under startup and recovery

You need to customize which utilities and programs are processed at startup for the computer.

What should you do?

Run Msconfig

You need to use the Windows Memory Diagnostic Tool to test the integrity of a Windows desktop Ram. Click on the option you would use to launch this utility from the control panel.

Administrative tools

drag the powershell feature or function on the left to the appropriate description on the right.

Providers – These let you access data stores, such as the registry and certificate store in a way similar to accessing the file system Command Line Interface – This is text based and uses a simple command syntax Piping – You can use this to reirect the outup of one PowerShell cmdlet to the input of another. Script files – These contain one or more PowerShell cmdlets cmdlets – These are executed at a PowerShell prompt to Perform system management tasks.

The PowerShell command line interface uses simple command construction. What is the typical form of a powershell command?

verb – noun- adverb

You are troubleshooting a problem that keeps occurring. When the problem happens, there are several Warning and error events logged to the Application log in Event Viewer.

You create a custom View that shows only Warning and Error events. During troubleshooting, you filter the Custom View to show only the Error messages.

You would like to create a new custom View using the current filter settings.

What should you do

Save the filter to a custom view.

You are troubleshooting a problem that keeps occurring. When the problem happens, there are several Warning and Error events logged to the Application and System logs in Event Viewer.

You would like to be able to see only the Warning and Error events from both logs displayed at the same time. You want to save this configuration so that you can check back each day to see any new errors.

What should you do?

On the Application log, filter the log to show only Warning and Error events. Save the filter to a Custom View, adding the System log as an additional filter.

You have two computers that run Windows 7: computer1 and Computer2.

Over the next few days, you want to monitor Computer1. You would like to automatically save the contents of the Application and System logs on Computer 1 to Computer2. You will then use Event Viewer on Computer2 to view the contents of the logs generated on Computer1.

What should you do?

On both computers, enable and configure Event Subscriptions. Configure Computer1 as a source, and Computer2 as a collector.

You manage three Windows computers that are part of a workgroup.

You would like to configure event subscriptions so that you can view all events from those computers on your laptop (which also runs Windows 7).

You need to configure the three source computers and one collector computer. The subscription will be a source initiated subscription.

What should you do? (Select two. Each choice is a required part of the solution.)

– On the collector computer, configure the subscription. – On all four computers, run ‘winrm qc -q’. On the collector computer, run ‘wecutil qc /q’.

You are troubleshooting a problem that keeps occurring. When the problem happens, there are several Warning and Error events logged to the Application log in Event Viewer.

While troubleshooting the problem, you create a filter for the log that shows only the Warning and Error messages.

You would like to save all messages in the application log (including Informational messages) so you can copy them to another computer and examine them there.

What should you do?

Clear the filter, then save the log.

You are troubleshooting a problem that keeps occurring. When the problem happens, there are several Warning and Error events logged to the Application and System logs in Event Viewer, which you are using a Custom View to examine.

After several days, there are several events int he Custom View. You would like to clear the messages from the view sot hat you only see messages starting from right now. You need to make sure that any messages in the corresponding logs still exist.

What should you do?

Edit the Custom View properties and create a custom range for logged events, starting with today’s date.

You have configured event subscriptions with the default settings to forward events from these two computers to a third Windows 7 computer, Computer3.

You want to view the events from these two computers on Computer3.

What should you do?

In Event Viewer, open the ForwardedEvents log.

As part of the regular system maintenance, you are checking Performance Monitor statistics and event log events.

You notice that there are several error events listed with the same ID number and description that sounds as if the error is related to system hardware. you check your Performance Monitor logs but don’t notice anything unusual around the time that the events were generated.

You would like to get an e-mail every time the event is logged so you can check the system statistics at the moment.

What should you do?

Attach a task to the event

You mange three computers that run windows and an in-house custom application.

The application generates Event viewer events and logs those events to a custom log for the application.

You would like to send all events from the application to a fourth computer where you can save and view the logs.

What should you do?

Configure event subscriptions

You have a computer that runs Windows and a custom in-house application.

The application generates Event Viewer events and logs those events to the default Application and Security logs in the Event Viewer.

As you monitor the application, you’d like to be able to do the following:

* View all events related to the application from a single log.
* View only the events related to the application and no others.
* View the necessary events with minimal future configuration.
* Save the Event Viewer configuration so that you can easily export and import the solution to other servers that will be running the application.

What should you do?

Create a custom view.

You would like to configure Event subscriptions for that computer to forward events to a network server. You need to configure your computer as a source computer for a source initiated subscription.

Which of the following will be part of your configuration? (Select two.)

– Add the collector computer to the event log readers group – run winrm qc

You would like to configure Event subscriptions for that computer to forward events to a network server. You need to configure your computer as a source computer for a source initiated subscription.

Which of the following will be part of your configuration? (Select two.)

– Configure the local security policy to identify the FQDN of the collector computer. – Run ‘winrm qc -q’

On a periodic basis, the application writes or modifies several registry entries. You want to monitor these registry keys so that you can create a report that shows their corresponding settings over the next 5 days.

What should you do?

In Performance Monitor, configure a configuration data collector

You are concerned about the disk space use on the computer.

You would like to be notified by e-mail when the used disk space exceeds 85%.

What should you do?

Configure a performance counter alert.

You would like to generate a report that shows the status of hardware resources, processes, and system and configuration information on the computer. The report should include suggestions for ways to maximize performance and streamline system operation.

What should you do

In Performance Monitor, under data collector set run the System Diagnostics. from a command prompt, run perfmon /report

You would like to generate a report that shows the status of hardware resources, processes, and system and configuration information on the computer. The report should include suggestions for ways to maximize performance and streamline system operation.

What should you do

In Performance Monitor, run the System Diagnostics data collector set.

You need to monitor the processor utilization on your Windows computer.

You want to get an e-mail notification every time the processor utilization exceeds 90%.

You create a new Data collector Set in Performance Monitor.

What type of Data collector should you create?

Performance counter alert

You have just installed a custom application. The application generates Event Viewer events and logs those events to the default Application and the Security logs in Event Viewer.

You are concerned about system performance while running the application. You would like to be able to view the current statistics for processor, memory, and disk reads and writes. You only want to see these statistics and no others, and you want to be able to easily save the configuration so that the same statistics are shown each time.

What should you do?

Add objects and counters in Performance Monitor.

After running the system diagnostics data collection set, you want to view the results of the diagnostics and review any suggestions for improving performance. Click the folder that contains the diagnostic results.

System Diagnostics

The windows performance tool kit (WPT) in not included with the windows operating system. Which steps do you need to follow to install and run the WPT?

Install the Microsoft.net Framework 4.5 Download the Windows Assesment and Deployment kit (ADK)

Which of the following is an accurate description of the function of the Windows Performance Analyzer (WPA)?

Presents Trace content in the form of interactive graphs and summary tables.

You would like to generate a report that runs several basic tests of the operating system, Security Center, hard disk, services, and hardware devices and drivers. The report should include suggestions for how to improve system performance.

What should you do?

In Performance Monitor, run the System Diagnostics data collector set.

You want to see the amount of disk activity that is generated by an application.

What should you do?

Filter on the application in Resource Monitor.

You want to see memory statistics for a specific process. You need to view the working set, shareable, and private memory for the process.

What should you do?

Filter by the process in Resource Monitor.

While working with a new application, the application stops responding. You would like to analyze the application and its associated processes to identify which processes the application is waiting on.

What should you do?

In resource Monitor, analyze the wait chain for the process

ou suspect that a process on your windows computer is causing a large amount of network activity. You would like to view the network activity on your computer filtered by specific processes.

Select the link that you would choose to view this information.

Resource Monitor

You have an application that compresses videos used in your online business.

You want to make sure that the application continues to run in the background, even if you open other applications.

You need to adjust the amount of attention given to that application.

What should you do?

Use Task Manager to modify the process priority

You need to enable remote registry on your windows desktop system. Click the option in Task manager you would use to do this.

Services

A user calls to complain that her Windows system is running slowly. You launch task manager on her system and select the processes tab. The output shown in the exhibit is displayed. What should you do? (select two)

Install more RAM in the system Install a faster CPU in the system.

How do you increase the size of your paging file on your Windows system?

modify the advanced system settings

While managing the available memory for applications, you realize the paging file is set below the recommended size. You need to increase the paging file to the recommended size for normal circumstances.

What should you do?

Configure the paging file to 1.5 to two times the amount of physical RAM

The computer meets the minimum hardware requirements.

When running multiple applications, the computer is slow to respond. You need to improve performance, especially for the application that you are actively working in.

What should you do?

Enable ReadyBoost on a USB flash drive.

The client who uses the computer has called to complain that the windows interface is very slow. For example, after clicking on the Windows start button, the Start Menu slowly appears on the screen.

You want to improve performance without upgrading any hardware.

What should you do?

Set the visual effects for best performance.

You use an external USB hard drive to store data files. You often find yourself waiting as Windows writes data to the external drive. Although it is portable, you rarely remove the external drive from the computer.

You need to increase the access speed of the hard drive.

What should you do?

Configure the write caching drive policies for better performance

For several months, the computer acted like a sever in the workgroup. It was optimized to share files and folders to the other computers.

You no longer need the computer to act like a server. You want the computer to focus on applications which are found on typical workstations.

After installing the applications, you believe the computer is not reacting quickly enough while using the applications. You know the machine has enough video memory and physical memory to handle the applications.

What should you d

Edit the Processor Scheduling settings.

You have been having trouble with the laptop crashing. The support technician wants you to send him a memory dump that occurred when the computer crashed. You find that the computer did not create the memory dump file.

You need to configure the system to create a memory dump file when it crashes.

What should you do?

Place the paging file on the system drive.

When running multiple applications, the computer is slow to respond. To improve performance, you enable ReadyBoost on a USB flash drive.

You need to edit the ReadyBoost settings.

What should you do?

Use the ‘ReadyBoost’ tab in properties of the USB flash drive.

You connect an external USB hard drive to the laptop to access specific data files.

After editing the files, you need to disconnect the external USB hard drive. You do not want to lose your work on the data files.

With the least amount of effort, you want to remove the USB hard drive from the laptop.

What should you do?

Check the drive’s ‘Policies’ tab and ensure that the ‘Quick Removal’ option is selected, then remove the USB connector.

You want to enable data execution protection for all programs and services on your Windows System. Click the option you would use in System Properties to configure this

Performance – Settings…

You have two computers: comp1 and Comp2. both computers are members of a domain.

Windows Remote Management (WinRM) is enabled on both computers.

From comp2, you need to create an additional disk volume on comp1.

What should you do

On Comp2, run "winrs" and then run "diskpart"

You have two computers: comp1 and Comp2. Both computers are members of a domain.

You need to ensure that you can remotely execute commands on comp2 from comp1.

What should you do

On Comp2, run "winrm qc"

You have two computers: comp1 and Comp2.

You need to use the command-line to remotely manage comp1 from Comp2.

What should you do? (Select two. Each choice is a required part of the solution.)

– Authenticate Comp2 to Comp1. – On Comp1, run "winrm qc"

You are the Windows administrator for your company.

You would like to manage the computers remotely using the Windows Remote Shell.

You need to enable remote management on each computer.

What should you do?

Run "Winrm quickconfig".

You have a Windows computer that you would like to manage remotely.

The computer connects to the network behind a firewall that blocks all but the most common ports.

You need to use a remote management solution that does not require additional firewall ports opened.

What should you do

Windows Remote Shell

You need to interactively access the command prompt on a remote windows system named WS1 from your windows workstation. Which command should you use to do this.

psexec \\ WS1 cmd

You need to be able to remotely execute commands on a windows workstation named WS1. Which commands can be used to enable remote management on this system? (select two)

winrm quickconfig Enable-PSRemoting

You have a computer that runs Windows . You started using the computer three months ago.

Since that time, you have found that, from time to time, the system has had slowdowns and crashes.

You want to look at a report that shows important events for the server since it was installed. you’d like to see when software was installed, along with any hardware or application failures.

You want to view this information with as little effort as possible.

What should you do?

open Reliability monitor

You are viewing the System Stability chart in Reliability Monitor on a Windows system. Some sections of the graph are displayed with a dotted line. What does this indicate?

There is not enough data to calculate a Stability Index

What data on a Windows system in monitored to create the reliability and problem history chart in reliability monitor (select two)

software installs/uninstalls system memory failures

what status does the yellow triangle icon with an exclamation point represent?

A warning

In the Windows action center, notifications are provided for which of the following ( select two )

Windows Defender Network Firewall

What does the red circle with the x represent

Critical Event

Your company uses Remote Assistance to help diagnose user desktop issues. All computers are configured to allow Remote Assistance.

One day you receive a Remote Assistance acceptance from someone you don’t know from an invitation file you created several weeks ago. You need to prevent this from happening again.

What should you do?

– Require a password on invitation files. – Decrease the timeout in invitation files.

You are having problems with your windows system and have been instructed by a help desk techician to initiate a remote assistance session so she can troubleshoot the issue. Click the option in control panel you would use to do this.

Troubleshooting – find and fix problems.

You need to configure remote assistance on your windows system so that invitations can only be used from computers running windows vista or later. Click the option in the system dialogue properties box you would use to do this.

Advanced

the technician has taken control of your system to perform several checks. She has now asked you to take control back of the system. What should you do? ( select two. each answer is a possible solution)

Press Ctrl + C Press Esc.

You have a Windows computer that you would like to manage remotely.

You enable Remote Desktop on the computer.

While working from home, you find that your home firewall is blocking Remote Desktop, preventing a connection to the Windows 7 computer

What should you do?

Open port 3389 in the network firewall.

You would like to manage the computers remotely using a tool with a graphical user interface (GUI).

What should you do? (Select two. Each choice is a possible solution.)

– Establish a remote Desktop connection to each computer. – Open Computer Management and connect to each remote computer

You will connect to the computer using Remote Desktop.

With the least amount of effort, you need to copy files from your local hard drive to the hard drive of the remote computer.

What should you do?

In the Remote Desktop client properties, edit the local devices and resources options.

You have just enabled Remote Desktop on the computer so you can connect to it using a dial-up modem from home and run a few reports.

You need to optimize the performance of your Remote desktop session for your slow connection.

Select the Experience setting(s) that will optimize performance.

Persistent bitmap caching

While connecting to a computer using Remote Desktop, you need to prevent the desktop background on the remote computer from displaying on the local computer.

What should you do?

On the Experience tab of the Remote Desktop connection, clear the Desktop Background Option

You manage a custom application that is currently installed on the computers in the domain.

You receive a new version of the software. Installing the software on a client computer overwrites the existing installation such that both versions cannot be used at the same time on the same computer.

You decide to use Remote Desktop Services on a server in the domain to allow clients to run both the new and the old version of the software. Clients should be able to run each version using an icon on their desktops.

What should you do? (Select two. Each choice is a required part of the solution.)

– Install the new version of the application on the server. – Configure RemoteApp on the server.

You manage a Windows 7 computer that is a member of a workgroup.

The computer is shared by three users. Each user has a standard user account.

Mary is one of the three users of this computer. She wants to access the computer using a Remote Desktop connection.

You need to allow Remote Desktop access for Mary while granting her the least amount of privileges possible.

What should you do?

Make Mary’s user account a member of the Remote Desktop users group.

You have just read about a new security patch for Windows 7. You install the patch as a Windows Update, but after you reboot and log back on your computer is unstable.

What action should you take? (select two)

Use Windows Update in the Control Panel to uninstall the update. Use programs and features to remove the update.

Your computer is configured to download and automatically install important (critical) patches using Windows Update.

You notice that updates that Microsoft suggests, but does not mark as important, are not being downloaded.

You would like these other updates to download and install automatically with the least amount of effort.

What should you do?

Configure Windows Update to included recommended updates.

Windows Update is continually notifying you to install an update that you have determined that you should not install on your machine due to incompatibility reasons.

You want Windows Update to stop notifying you of this update.

What should you do?

Hide the update.

You need to manually check for updates form Windows Update.

What should you do? (Select two. Both answers are complete solutions.)

– Run ‘wuauclt.exe /detectnow’ – Click the ‘Check for updates’ button in Windows Update.

YOu want to choose how updates are delivered on your windows workstation. Click the options that will allow you to receive updates from Microsoft and from peers users in only your network. ( select two)

click Buttons: Off PC’s on my local network.

While manually configuring Windows update on your system, you notice that several settings are grayed out and unchangeable as shown in the image. What can you do to enable the settings so you can manually chang them.?

Use Group policy to modify the Windows Update setting

You need to determine if the computer has any administrative vulnerabilities.

What should you do?

Use Microsoft Baseline Security Analyzer (MBSA)

The computer is a member of a domain. windows Update settings are controlled through Group Policy.

You need to determine if a specific security update from Windows Update is installed on the computer.

What should you do?

Go to Programs and Features in the Control Panel

which group policy do you enable updates to be installed during shutdown without giving users the option to choose not to install the updates.

Do not display "Install updates and shut down" windows dialogue box.

You install a new art application on your computer. The application recommends that you install an updated video driver. You install the new driver.

You use the computer for several days, but notice that the display doesn’t seem to refresh properly. You want to sue your previous display adapter driver to correct the problem. You need to implement a solution that minimizes downtime.

What should you do?

Roll back the display adapter driver.

You install the drivers to connect your new PDA to the computer. Immediately following the device installation, you get a bluescreen error. You reboot the computer but it shows the same error before the boot process completes.

You need to start the computer using the least amount of effort.

What should you try first?

Reboot the system using Last Known Good Configuration from the Advanced Startup options.

YOu install a new application on your windows machine. During installation the computer reboots but hangs during startup. Pressing f8 has no effect. What should you try first to start the computer?

Boot from the installation disc and restore from a restore point.

You have recently made some changes to your system. Things seemed to run fine for several days.

Today, your computer has started to be unstable. Shortly after logging on, the system crashes and hangs.

Which of the following will most likely correct the problem in the least amount of time?

Boot into Safe Mode and restore to a restore point.

The computer has two hard drives, both formatted with NTFS. You have enabled System Restore on both disks.

You want to delete all restore points, but still be able to make new restore points for both drives.

What should you do?

Edit the System Protection settings in System Properties and delete the restore points.

You have a computer that runs Windows 7.

The computer has two hard drives, both formatted with NTFS. you have enabled System Restore on both disks.

You want to delete all restore points except for the last restore point.

What should you do?

Run Disk Cleanup

You have just added a new 300 GB hard drive to the computer. You create a single volume named ‘Data’ and format the volume using FAT32. The volume is assigned drive letter D:.

You copy several files to the new hard disk.

You would like the disk to be included in any restore points created on the computer.

What should you do first?

Run ‘convert.exe to change the drive to NTFS

As part of your regular system maintenance, you install the latest operating system updates.

After several days, you notice that the system locks up and reboots from time to time. You suspect that a recent update is causing the problem. You want to restore the computer to its previous state before the updates as quickly as possible.

What should you do?

Restore the system using a restore point.

The computer has two hard disks, one internal disk and one removable hard disk. You complete a full system backup and schedule regular backups of the system drive. All backups are saved to the removable hard disk. You also enable system protection on the system disk.

The disk holding the operating system fails. you replace the disk with a new one, and now need to get the system running again as quickly as possible. you boot the computer to the Windows installation disc.

What should you do?

Perform a system image recovery.

After several months of working fine, you are now having problems booting your machine. The system stalls immediately after the BIOS information screen. You need to get the system started as quickly as possible.

What should you do?

Use the Startup Repair tool

You take a regular file backup every Friday night, which also includes a system image backup. System Protection has been enabled for all drives on the system.

On Wednesday you receive a new version of a graphic editing application that you use regularly. You install the new application, but find that the application does not work properly. When you try to run the original application, you find that the upgrade has deleted it from your system. You also find that some of the graphics files you had been working on yesterday have been deleted.

You need to get things back to normal as quickly as possible.

What should you do? ( Select two. Each choice is a required part of the solution.)

– Use Previous Versions to restore the missing files. – Use system Restore to revert to a restore point before you installed the application.

Your system has two hard disks installed. Your applications are installed on the C: volume on the first hard disk. Because of the size of the audio files you produce, you keep them on a separate volume (D:) on the second hard disk.

You need to configure system protection on this system to maximize system protection. What should you do?

Increase the amount of disk space reserved for restore point on C:.

Match the Windows startup mode option on the left with the appropriate description on the right.

Enable Safe Mode: Loads only essential drivers and services. Disable driver signature enforcement: Allows unsigned drivers to be installed. Last Known Good Configuration: Not available in Windows 8.x. Disable early launch anti-malware protection: Disables scanning device drivers for malware. Enable debugging: Enables kernel troubleshooting and system analysis. Enable boot logging: Creates a file named Ntbtlog.txt

after you reboot your computer you realize you have to install your video editing application again

creating a manual restore point just before installing the soundcard.

The C: volume contains system settings and is formatted with NTFS. The D: volume is formatted with FAT32.

You want to create a system image backup with the D: volume as the destination.

What should you do?

Convert the D: drive to NTFS.

he computer has two volumes: C: and D:.

You want to schedule backup jobs of the C: volume to include all user files and a system image of the C: volume.

You want to configure the backup job and the schedule with a minimal amount of effort.

What should you do?

Use the Backup and Restore console.

YOu need to capture the current state of your windows system to a .vhd file, including the operating system, configuration settings, installed applications and user data. Click the option in file history in the control panel you would use to do this.

System Image backup.

The notebook has a single internal SATA hard disk drivel. The system partition is formatted with the NTFS File System and encompasses the entire drive.

save the system image to an external USb hard disk save the system image to a network share.

You are running out of free space on E, so you decide to increase the size of the storage space by adding an additional hard disk.

Change settings.

You are configuring file backups using file recovery in Control Panel on a windows system. Which information can be included in a backup. ( select two )

Files on user desktops Files in user documents libraries.

Until you have time to do this however, you need to delete the oldest backups.

manage space

YOu need to create a system image of a workstation. click the control panel category you would use to do this.

File History

You just finished installing a windows workstation that will be used by your organizations legal counsel. The files she stores in her user profile are extrememly important and must be backed up regularly.

File History

Although the system drive has plenty of disk space, you add an internal hard drive to increase storage for user files.

For the past several weeks you have created and changed many files stored on the new hard drive.

You want to revert a specific file to a previous version. however, after viewing the file properties, you notice that no previous versions are available.

You must ensure that you can revert files to previous versions on the new hard drive.

What should you do?

Enable System Protection for the new hard drive.

The computer has the following two volumes:

* The C: drive is the system drive with user profiles and individual user files
* The D: drive holds data files common to all users

You take the following actions:

* You create a system image backup that includes both the C: and D: drives.
* You schedule regular backups to back up all user libraries. The scheduled backup includes a system image.
* You use System Restore to take a snapshot.

You edit and save a file on the D: drive. You decide that you don’t like the changes and want to revert to a previous version of the file.

You go to the ‘Previous Versions’ tab of the file and see nothing listed.

To avoid this situation in the future, you must ensure that you can revert files on the D: drive to earlier versions of the file from the ‘Previous Versions’ tab.

What should you do? (Select two. Each answer is a possible solution.)

– Enable System Protection for the D: drive. – Modify the backup settings in Backup and Restore to include the D: drive.

The computer has the following two volumes:

* The C: drive is the system drive with user profiles and individual user files
* The D: drive holds data files common to all users

You take the following actions:

* You create a system image backup that includes both the C: and D: drives.
* You schedule regular backups to back up all user libraries. The scheduled backup includes a system image.
* You use System Restore to take a snapshot.

You edit and save a file on the D: drive. You decide that you don’t like the changes and want to revert to a previous version of the file.

You go to the ‘Previous Versions’ tab of the file and see nothing listed. You need to restore the previous version of the file.

What should you do?

Restore the file form the system image.

The computer is used by three different users. The computer has the following two volumes with default System Protection settings:

* C: ( System drive with user profiles and individual user files)
* E: (Data files common to all users)

Using the least effort possible, you need to protect the data on both volumes with restore points.

What should you do? (choose the answer which is most correct.)

Enable System Protection for the E: volume.

To protect your data form loss or corruption, you enable System Protection on all the drives in your computer. You also schedule regular backups of the system drive and all other drives using the Backup and Restore console.

After working with a file, you notice that you accidentally deleted most of the data. You need to restore the file to the point in time before you modified it.

What should you do? (Select two. Each answer is an independent solution.)

– Use the file properties to restore a previous version of the file. – Use Windows Explorer to browse the ‘Backup Set’ folder and then copy the file.

To protect your data from loss or corruption, you enable System Protection on all drives in your computer. You also schedule regular backups with the following settings:

* Back up all user libraries
* Back up all drives
* Include a system image

Today you notice that your user profile settings are corrupt.

You need to restore the user profile settings with the least amount of effort.

What should you do

Use the Backup and Restore console to restore the user profile form backup.

The computer has the following tow volumes:

* The C; drive is the system drive with user profiles and individual user files
* The D: drive holds data files common to all users

You take the following actions:

* You schedule regular backups to back up all user libraries. The scheduled backup includes the entire D: drive, as well as a system image.
* You use System Restore to take a snapshot.

After working with a file on the D; drive, you accidentally delete most of the data in the file. You need to recover the file as it existed before you made the changes.

You check the System Protection settings and find that system protection is not enabled for the D: drive.

Using the least amount of effort, you must restore the data in the file.

What should you do?

Use the ‘Previous Versions’ tab of the file properties to restore the file.

To protect your system and data, you use the Backup and Restore console to create a system image backup.

While working with a file, you accidentally delete some of the data. You need to restore the older version of the file, but you cannot find any previous versions of the file.

What should you do? (Select two. Each choice is a required part of the solution.)

– Attach the .vhd file created form the Backup and Restore console. – Use Windows Explorer to browse to and then copy the file.

The computer has two hard drives. The C: drive is the system drive, and the D: drive holds data files.

You perform a system image backup using the Backup and Restore console that includes both drives. Your computer takes regular restore point snapshots.

one day you find the D:\finances folder has been deleted. You check the previous versions for the drive, but find nothing listed.

You need to restore the folder and its contents as quickly as possible.

What should you do?

You need to reconfigure the size of the offline cache used by File History to 20% of the disk space on the E: volume.

Click the option you would use in File History in Control Panel to do this.

Select ‘Advanced settings’ to the left of your screen.

You’ve been working on a file named ProjectSchedule.docs in your Documents library. you realized this morning that you’ve made erroneous change that will require a great deal of work to correct.

You decide that the best option is to restore a previous version of this file. What should you do?

Access Control Panel, then select System and Security and click Restore your files with File History.

Currently, File History is configured to save copies of files every hour, which is the default setting. however, you’ve been assigned to work on a high-profile project and you would like File History to save copies of files every 15 minutes.

What should you do? (Select two. Each option is a part of the complete solution.)

In control Panel, select System and Security \ File History. Click Advanced settings, and then set Save copies of files to Every 15 minutes.

One of the users you support Vkumar has just turned of file history and selected the internal D:drive as the location to which his files will be copied. By default which directory will file history copy files from to save on the D: drive

C:\Users\Vkumar

One day while trying to start your Windows 10 system, you see the following error displayed: Could not read from the selected boot disk. Check boot path and disk hardware.

Boot into the recovery environment and run the bootrec/rebuildbcd command.

"which action can you take to get your system back up and running properly without losing your project files while minimizing the risk of infecting other systems on the network.

click troubleshoot "reset your pc." boot the system from a recovery drive.

The vendor of your accounting software recently released an update that you downloaded and installed.

Unfortunately, now your accounting software crashes when launched. You need to get your system running properly as quickly as possible without losing your accounting files.

What should you do? (Select two. Each choice is a required part of the solution.)

Boot the system from a recovery drive and select Troubleshoot \ Advanced Options \ System Restore. In Control Panel, select System and Security \ System \ System Protection \ System Restore.

You need to create a recovery drive for your Windows Professional system. To do this, you’ve procured a USB flash drive with the following characteristics:

-USB version: 20
-Capacity: 4GB

Can you create a recovery drive using this device?

No, the device must be 8GB or larger in size.

You want to use a USB flash drive as a system recovery drive. which of the following steps can you use launch the utility you must use to perform this task?

In the search box type create a recovery drive entry in the search results.

with some system failures you can still boot the system and log on and then perform tasks to recover the system using the backup.
Click the option you must use If you want to be able to recover from a system failure.

set up backup

Both of these options failed to recover your system. You want to avoid losing installed applications and data. You have again booted from the installation disk. Which of the following options should you try next?

Click repair your computer and go to advanced options and run the system image recovery option.

You want to use an optical disk as a system recovery drive. In the system and security category, click the control panel item you must use to create a system repair disc.

Backup and Restore

One day while trying to start your windows system, You see the following error displayed. Operating system not found. Which of the following options will most likely fix the problem?

boot into the recovery console and run the bootrec\fixmbr command on the boot volume.

Your Windows system has been infected with malware that has replaced the standard boot loader on the hard disk with its own malicious software.
What type of exploit is in use in this scenario?

Rootkit

you have a new system on which you want to enable secure boot to prevent rootkit malware infections.
Which of the following options is an additional system requirement to use secure boot?

The CPU must include virtualization extensions.

What is the first line of defense in protecting your system against applications like these from being downloaded or copied onto your system?

Use anti-Malware software that provides real time protection.

Windows defender is configured to regularly scan your system; howver, you also want to scan a removable storage device that you just connected to your windows system.
Click the scan option you should use to accomplish this.

custom

during the installation the installer warns you that the third party anti malware software on your windows system conflicts with windows defender. Which tool do you use to disable Windows Defender so you can proceed with the installation?

Local Group policy editor.

You need to view a list of infected files that Windows Defender has quarantined. Click the option in windows defender you would use to do this.

History

YOu want windows defender to automatically report malware infections to Microsoft. Click the option you must use to make that change

Settings

Drag the device guard component on the left to the appropriate description on the right

VSM Protected Code Integrity – Isolates Kernel Mode Code integrity to harden it against attack CCI – Ensures that only trusted code runs on the system starting with the boot loader and anything else that loads after it. Secure Boot – Ensures the boot binaries and EUFI firmware have both been digitally signed and have not been tampered with. VSM Protected Code Integrity – Isolates Hypervisor code integrity to harden it against an attack.

Scroll to Top