01.Assesment Test Flashcards

1
Q
  1. What filename extension is applied by default to custom consoles that are created for the MMC?

A. .mmc
B. .msc
C. .con
D. .mcn

A

B. .msc

  1. B. When you create a custom console for the MMC, the .msc filename extension is automatically applied. See Chapter 3 for more information.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. You want to create roaming profiles for users in the Sales department. They frequently log on at computers in a central area. The profiles should be configured as mandatory and roaming profiles. Which users are able to manage mandatory profiles on Windows 10 computers?

A. The user who uses the profile
B. Server operators
C. Power users
D. Administrators

A

D. Administrators

  1. D. Only members of the Administrators group can manage mandatory profiles. See Chapter 8 for more information.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. Your employees use both desktops and tablets to access the company network. Your tablet users use a 4G mobile broadband Wi-Fi connection. You need to monitor how much data your users are using for this connection. How do you accomplish this?

A. Configure the broadband connection as a metered network.
B. Turn on network resource monitoring.
C. Enable Performance Monitor.
D. Enable tablet metering in the tablets’ settings.

A

A. Configure the broadband connection as a metered network

  1. A. Administrators have the ability to limit and monitor network usage by configuring the network as a metered network. Network metering allows network downloading to be watched or metered and then administrators can charge users or departments for the network usage. See Chapter 6 for more information.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. If you wanted to require that a user enter an Administrator password to perform administrative tasks, what type of user account should you create for the user?

A. Administrator user account
B. Standard user account
C. Power user account
D. Authenticated user account

A

B. Standard user account

  1. B. You would create a standard user account for the user. Standard users must provide the credentials of an administrator account when prompted by User Account Control (UAC) in order to perform administrative tasks. See Chapter 8 for more information.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. You have installed a clean installation of Windows 10 on your computer. You want to create an image of the new installation to use as a basis for remote installs. What Windows 10 utility should you use to accomplish this?

A. WDS
B. Windows SIM
C. ImageX
D. Sysprep

A

C. ImageX

  1. C. You can use the ImageX utility to create an image of a Windows 10 installation. After the image has been created, you can prepare the image with a utility such as the System Preparation Tool (Sysprep). The image can then be used for remote installations of Windows 10. See Chapter 2 for more information.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. Which of the following statements is true regarding the built-in Administrator account in Windows 10?
    (Choose all that apply.)

A. The built-in Administrator account does not exist in Windows 10.
B. The built-in Administrator account is disabled by default in Windows 10.
C. The built-in Administrator account has no permissions in Windows 10.
D. The built-in Administrator account is not a member of the Administrators group in Windows 10.

A

B. The built-in Administrator account is disabled by default in Windows 10.

  1. B. The built-in Administrator account is disabled by default in Windows 10. However, it can be enabled through Local Users and Groups or by modifying the Accounts: Administrator Account Status GPO setting. See Chapter 8 for more information.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. You have a user with limited vision. Which accessibility utility is used to read aloud screen text, such as the text in dialog boxes, menus, and buttons?

A. Read-Aloud
B. Orator
C. Dialog Manager
D. Narrator

A

D. Narrator

  1. D. The Narrator utility uses a sound output device to read onscreen text. See Chapter 5 for more information.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. You have just purchased a new computer that has Windows 10 preinstalled. You want to migrate existing users from a previous computer that was running Windows XP Professional. Which two files would you use to manage this process through the User State Migration Tool?

A. usmt.exe
B. ScanState.exe
C. LoadState.exe
D. Windows7Migrate.exe

A

B. ScanState.exe
C. LoadState.exe

  1. B, C. Windows 10 ships with a utility called the User State Migration Tool (USMT) that is used by administrators to migrate users from one computer to another via a command-line utility. The USMT consists of two executable files: ScanState.exe and LoadState.exe. See Chapter 2 for more information.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. You are the IT director for large company that has decided to move to the cloud. The company wants to use Azure Active Directory and Microsoft Intune. The company has been looking into this because users have been using multiple devices to get their job done. When your users get added to Intune and get licensed, how many devices can each user add by default?

A. Three
B. Four
C. Five
D. None. Device administrators are the only persons who can add devices to Intune.

A

C. Five

  1. C. By default, licensed users can add up to five devices to their accounts. Device administrators have the ability to add devices to Intune, but users do have the ability to enroll up to five devices on their own. See Chapter 6 for more information.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. You are the network administrator for your company. Recently, one of your users in the Accounting department has reported that they were unsure whether a banking website was legitimate or not. You want to configure a utility that will verify whether a website is known to be fraudulent. Which utility should you configure?

A. Pop-up Blocker
B. RSS Reader
C. Phishing Filter
D. Add-on Manager

A

C. Phishing Filter

  1. C. Internet Explorer 11 ships with Phishing Filter, which can help verify whether a website is known to be fraudulent or not. Phishing Filter helps to prevent malicious websites from masquerading as a legitimate site in order to obtain your personal or financial information. See Chapter 7 for more information.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. You have a user, Jan, who suspects that her Windows 10 computer has been infected with spyware. You remove the spyware from her computer and want to prevent spyware from infecting it in the future. Which of the following Windows 10 utilities should you configure?

A. Windows Defender
B. Phishing Filter
C. Pop-up Blocker
D. Windows OneCare

A

A. Windows Defender

  1. A. Windows Defender is an antispyware program included with Windows 10. It offers real- time protection from spyware and other unwanted software. You can also configure Windows Defender to scan for spyware on a regular basis. See Chapter 7 for more information.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. You are configuring power settings on your laptop. You configure the laptop to enter sleep mode after a specified period of inactivity. Which of the following will occur when the computer enters sleep mode?

A. The computer will be shut down gracefully.
B. Data will be saved to the hard disk.
C. The monitor and hard disk will be turned off, but the computer will remain in a fully active state.
D. The user session will not be available when you resume activity on the computer.

A

B. Data will be saved to the hard disk.

  1. B. Sleep mode is a combination of standby mode and hibernation mode. When sleep mode is configured, the user’s session is quickly accessible on wakeup, but the data is saved to the hard disk. Sleep mode is the preferred power-saving mode in Windows 10. See Chapter 5 for more information.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. You are using Internet Explorer to access several RSS feeds that you subscribe to. One of the feeds stores only the 10 most recent updates. You want to ensure that the last 100 updates are stored. What should you do?

A. Configure the RSS feed to automatically download attached files.
B. Modify the schedule so that the RSS feed is updated more than once a day.
C. Turn on feed reading view in IE.
D. Modify the archive setting so that the last 100 items are stored.

A

D. Modify the archive setting so that the last 100 items are stored.

  1. D. Internet Explorer 11 provides the ability to read and subscribe to RSS feeds. You can configure several options for RSS feeds, such as how often the feed is checked for updates, whether attachments are automatically downloaded, and how many updates are stored for the feed. See Chapter 7 for more information.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. What is the CIDR equivalent for 255.255.255.224?

A. /24
B. /25
C. /26
D. /27

A

D. /27

  1. D. A subnet mask of 255.255.255.224 equals a CIDR of /27. CIDR is the number of on bits. See Chapter 9 for more information.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. You are configuring a new Windows 10 computer for a new employee. You configure the new user with a standard user account. Which of the following functions will the new employee be allowed to perform? (Choose all that apply.)

A. Install a printer.
B. Install network drivers.
C. Configure WPA keys.
D. Modify the Desktop settings.

A

A. Install a printer.
C. Configure WPA keys.
D. Modify the Desktop settings.

  1. A, C, D. Standard users are allowed to perform a variety of tasks, such as install printers, configure wireless keys, and modify their Desktop settings. See Chapter 8 for more information.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. You are the network administrator for Stellacon. Your network consists of 200 Windows 10 computers, and you want to assign static IP addresses rather than use a DHCP server. You want to configure the computers to reside on the 192.168.10.0 network. What subnet maskshould you use with this network address?

A. 255.0.0.0
B. 255.255.0.0
C. 255.255.255.0
D. 255.255.255.255

A

C. 255.255.255.0

  1. C. You should use the subnet mask 255.255.255.0 on your network in this scenario. The IP network address 192.168.10.0 is a Class C address. Class C addresses, by default, use the subnet mask 255.255.255.0. The network portion of the address is 192.168.10, and the host portion of the address can be 1 to 254. See Chapter 9 for more information.
17
Q
  1. You are using a laptop running Windows 10 Home. You want to synchronize files between your laptop and a network folder. Which of the following actions must you perform first in order to enable synchronization to occur between your laptop and the network folder?

A. Upgrade your laptop to Windows 10 Enterprise.
B. Enable one-way synchronization between the laptop and the network folder.
C. Enable two-way synchronization between the laptop and the network folder.
D. Configure the files on your laptop as read-only.

A

A. Upgrade your laptop to Windows 10 Enterprise.

  1. A. To enable synchronization of files between your laptop and a network folder, you must first upgrade your laptop to a version of Windows 10 that supports synchronization with network folders, such as Windows 10 Enterprise. Windows Sync Center also supports synchronization of files between computers and mobile devices. See Chapter 1 for more information.
18
Q
  1. You have a DNS server that contains corrupt information. You fix the problem with the DNS server, but one of your users is complaining that they are still unable to access Internet resources. You verify that everything works on another computer on the same subnet. Which command can you use to fix the problem?

A. ipconfig /flush
B. ipconfig /flushdns
C. ping /flush
D. DNS /flushdns

A

B. ipconfig /flushdns

  1. B. The ipconfig /flushdns command is used to purge the DNS Resolver cache. The ipconfig command displays a computer’s IP configuration. See Chapter 9 for more information.
19
Q
  1. Which of the following information can be configured on a VPN client so that it can access a VPN server? (Choose two.)

A. IP address
B. MAC address
C. Domain name
D. Connection address

A

A. IP address
C. Domain name

  1. A, C. When you configure a VPN connection, you must specify the IP address or host domain name of the computer to which you’ll connect. See Chapter 5 for more information.
20
Q
  1. Which of the following statements are true regarding the creation of a group in Windows 10?
    (Choose two.)

A. Only members of the Administrators group can create users on a Windows 10 computer.
B. Group names can be up to 64 characters.
C. Group names can contain spaces.
D. Group names can be the same as usernames but not the same as other group names on the computer.

A

A. Only members of the Administrators group can create users on a Windows 10 computer.
C. Group names can contain spaces.

  1. A, C. Only administrators can create new groups on a Windows 10 computer. names can contain up to 256 characters and can contain spaces. Group names must be unique to the computer, different from all the other usernames and group names that have been specified on that computer. See Chapter 8 for more information.
21
Q
  1. You need to expand the disk space on your Windows 10 computer. You are considering using spanned volumes. Which of the following statements are true concerning spanned volumes? (Choose all that apply.)

A. Spanned volumes can contain space from 2 to 32 physical drives.
B. Spanned volumes can contain space from 2 to 24 physical drives.
C. Spanned volumes can be formatted as FAT32 or NTFS partitions.
D. Spanned volumes can be formatted only as NTFS partitions.

A

A. Spanned volumes can contain space from 2 to 32 physical drives.
C. Spanned volumes can be formatted as FAT32 or NTFS partitions.

  1. A, C. You can create a spanned volume from free space that exists on a minimum of 2 to a maximum of 32 physical drives. When the spanned volume is initially created in Windows 10, it can be formatted with FAT32 or NTFS. If you extend a volume that already contains data, however, the partition must be NTFS. See Chapter 3 for more information.
22
Q
  1. You have just installed Hyper-V on a server called ServerA and you have set up five new VM servers. You want to run PowerShell commands for the five VM servers from ServerA. How do you do this?

A. Use the Invoke-Command cmdlet and specify the VMName parameter.
B. Use the WinRM command -PowerShell.
C. Use the PSCommands - enabled command.
D. Just run the PowerShell commands with the -Name parameter.

A

A. Use the Invoke-Command cmdlet and specify the VMName parameter.

  1. A. Administrators can use PowerShell Direct to run PowerShell commands on a VM from the Hyper-V host. To do this, you need to run the following command, Invoke-Command, and you need to specify which VM you’re connecting to (-VMName parameter). See Chapter 7 for more information.
23
Q
  1. Your home computer network is protected by a firewall. You have configured your Windows 10 home computer to use Windows Mail. After you configure your email accounts, you discover that you are unable to send email messages from Windows Mail. Your email provider uses POP3 and SMTP. What port should you open on the firewall?

A. 25
B. 110
C. 443
D. 995

A

A. 25

  1. A. Port 25 should be opened on the firewall. SMTP is used for outbound mail and uses port 25. POP3, which is used for receiving inbound mail, uses port 110. See Chapter 9 for more information.
24
Q
  1. You need Windows 10 to be the primary operating system on a dual-boot machine. Which file do you configure for this?

A. boot.ini
B. bcdedit
C. bcboot.ini
D. bcdboot

A

B. bcdedit

  1. B. You should configure the bcdedit utility to configure your boot order. See Chapter 1 for more information.
25
Q
  1. Which of the following versions of Windows 10 can be upgraded to Windows 10 Enterprise edition? (Choose all that apply.)

A. Windows 8 Home
B. Windows 8 Professional
C. Windows 8 Home Premium
D. Windows 8 Enterprise

A

B. Windows 8 Professional
D. Windows 8 Enterprise

  1. B, D. You can upgrade Windows 8 Professional and Windows 8 Enterprise to Windows 10 Enterprise edition. See Chapter 1 for more information.
26
Q
  1. You are configuring a Windows 10 computer that is going to be used by your children. You are configuring access restrictions using the Parental Controls feature of Windows 10. Which of the following can be configured by setting Parental Controls? (Choose all that apply.)

A. When your children can access the computer
B. Which websites your children can view
C. Which programs your children can access
D. Which other computers on your home network your children can access

A

A. When your children can access the computer
B. Which websites your children can view
C. Which programs your children can access

  1. A, B, C. Using Parental Controls, you can configure which websites your children can access, when they can use the computer, which games they can play, and which programs they can run, and you can view reports regarding their activity. See Chapter 5 for more information.
27
Q

How do you access the Advanced Boot Options menu in Windows 10 during the boot process?

A. Press the spacebar.
B. Press F6.
C. Press F8.
D. Press F10.

A

C. Press F8.

  1. C. During the boot process, you are prompted to press F8 to access the Advanced Boot Options menu. See Chapter 10 for more information.
28
Q
  1. You have two remote sites with Windows 10 machines. You need to share data across the slow sites. What feature can help with this?

A. Link Detection
B. BranchCache
C. DirectAccess
D. DirectCache

A

B. BranchCache

  1. B. BranchCache allows multiple sites with slower links to share data quickly and efficiently. See Chapter 5 for more information.
29
Q
  1. Which utility is used to upgrade a FAT32 partition to NTFS?

A. UPFS
B. UPGRADE
C. Disk Manager
D. Convert

A

D. Convert

  1. D. The Convert utility is used to convert a FAT32 partition to NTFS. See Chapter 3 for more information.
30
Q
  1. Your organization has created an application for its employees. You need to deploy the internally developed application to all employees while minimizing the costs. What’s the best way to do that?

A. Install the application one system at a time.
B. Enable application sideloading.
C. Purchase System Center and deploy the application.
D. Run the Add-Application PowerShell cmdlet.

A

B. Enable application sideloading.

  1. B. Applications that are developed by a company and are not signed by the Windows Store can be installed by the process of sideloading. Sideloading allows companies to load applications into the Windows Store for deployment throughout a company. See Chapter 7 for
    more information.