01.Assesment Test Flashcards
- What filename extension is applied by default to custom consoles that are created for the MMC?
A. .mmc
B. .msc
C. .con
D. .mcn
B. .msc
- B. When you create a custom console for the MMC, the .msc filename extension is automatically applied. See Chapter 3 for more information.
- You want to create roaming profiles for users in the Sales department. They frequently log on at computers in a central area. The profiles should be configured as mandatory and roaming profiles. Which users are able to manage mandatory profiles on Windows 10 computers?
A. The user who uses the profile
B. Server operators
C. Power users
D. Administrators
D. Administrators
- D. Only members of the Administrators group can manage mandatory profiles. See Chapter 8 for more information.
- Your employees use both desktops and tablets to access the company network. Your tablet users use a 4G mobile broadband Wi-Fi connection. You need to monitor how much data your users are using for this connection. How do you accomplish this?
A. Configure the broadband connection as a metered network.
B. Turn on network resource monitoring.
C. Enable Performance Monitor.
D. Enable tablet metering in the tablets’ settings.
A. Configure the broadband connection as a metered network
- A. Administrators have the ability to limit and monitor network usage by configuring the network as a metered network. Network metering allows network downloading to be watched or metered and then administrators can charge users or departments for the network usage. See Chapter 6 for more information.
- If you wanted to require that a user enter an Administrator password to perform administrative tasks, what type of user account should you create for the user?
A. Administrator user account
B. Standard user account
C. Power user account
D. Authenticated user account
B. Standard user account
- B. You would create a standard user account for the user. Standard users must provide the credentials of an administrator account when prompted by User Account Control (UAC) in order to perform administrative tasks. See Chapter 8 for more information.
- You have installed a clean installation of Windows 10 on your computer. You want to create an image of the new installation to use as a basis for remote installs. What Windows 10 utility should you use to accomplish this?
A. WDS
B. Windows SIM
C. ImageX
D. Sysprep
C. ImageX
- C. You can use the ImageX utility to create an image of a Windows 10 installation. After the image has been created, you can prepare the image with a utility such as the System Preparation Tool (Sysprep). The image can then be used for remote installations of Windows 10. See Chapter 2 for more information.
- Which of the following statements is true regarding the built-in Administrator account in Windows 10?
(Choose all that apply.)
A. The built-in Administrator account does not exist in Windows 10.
B. The built-in Administrator account is disabled by default in Windows 10.
C. The built-in Administrator account has no permissions in Windows 10.
D. The built-in Administrator account is not a member of the Administrators group in Windows 10.
B. The built-in Administrator account is disabled by default in Windows 10.
- B. The built-in Administrator account is disabled by default in Windows 10. However, it can be enabled through Local Users and Groups or by modifying the Accounts: Administrator Account Status GPO setting. See Chapter 8 for more information.
- You have a user with limited vision. Which accessibility utility is used to read aloud screen text, such as the text in dialog boxes, menus, and buttons?
A. Read-Aloud
B. Orator
C. Dialog Manager
D. Narrator
D. Narrator
- D. The Narrator utility uses a sound output device to read onscreen text. See Chapter 5 for more information.
- You have just purchased a new computer that has Windows 10 preinstalled. You want to migrate existing users from a previous computer that was running Windows XP Professional. Which two files would you use to manage this process through the User State Migration Tool?
A. usmt.exe
B. ScanState.exe
C. LoadState.exe
D. Windows7Migrate.exe
B. ScanState.exe
C. LoadState.exe
- B, C. Windows 10 ships with a utility called the User State Migration Tool (USMT) that is used by administrators to migrate users from one computer to another via a command-line utility. The USMT consists of two executable files: ScanState.exe and LoadState.exe. See Chapter 2 for more information.
- You are the IT director for large company that has decided to move to the cloud. The company wants to use Azure Active Directory and Microsoft Intune. The company has been looking into this because users have been using multiple devices to get their job done. When your users get added to Intune and get licensed, how many devices can each user add by default?
A. Three
B. Four
C. Five
D. None. Device administrators are the only persons who can add devices to Intune.
C. Five
- C. By default, licensed users can add up to five devices to their accounts. Device administrators have the ability to add devices to Intune, but users do have the ability to enroll up to five devices on their own. See Chapter 6 for more information.
- You are the network administrator for your company. Recently, one of your users in the Accounting department has reported that they were unsure whether a banking website was legitimate or not. You want to configure a utility that will verify whether a website is known to be fraudulent. Which utility should you configure?
A. Pop-up Blocker
B. RSS Reader
C. Phishing Filter
D. Add-on Manager
C. Phishing Filter
- C. Internet Explorer 11 ships with Phishing Filter, which can help verify whether a website is known to be fraudulent or not. Phishing Filter helps to prevent malicious websites from masquerading as a legitimate site in order to obtain your personal or financial information. See Chapter 7 for more information.
- You have a user, Jan, who suspects that her Windows 10 computer has been infected with spyware. You remove the spyware from her computer and want to prevent spyware from infecting it in the future. Which of the following Windows 10 utilities should you configure?
A. Windows Defender
B. Phishing Filter
C. Pop-up Blocker
D. Windows OneCare
A. Windows Defender
- A. Windows Defender is an antispyware program included with Windows 10. It offers real- time protection from spyware and other unwanted software. You can also configure Windows Defender to scan for spyware on a regular basis. See Chapter 7 for more information.
- You are configuring power settings on your laptop. You configure the laptop to enter sleep mode after a specified period of inactivity. Which of the following will occur when the computer enters sleep mode?
A. The computer will be shut down gracefully.
B. Data will be saved to the hard disk.
C. The monitor and hard disk will be turned off, but the computer will remain in a fully active state.
D. The user session will not be available when you resume activity on the computer.
B. Data will be saved to the hard disk.
- B. Sleep mode is a combination of standby mode and hibernation mode. When sleep mode is configured, the user’s session is quickly accessible on wakeup, but the data is saved to the hard disk. Sleep mode is the preferred power-saving mode in Windows 10. See Chapter 5 for more information.
- You are using Internet Explorer to access several RSS feeds that you subscribe to. One of the feeds stores only the 10 most recent updates. You want to ensure that the last 100 updates are stored. What should you do?
A. Configure the RSS feed to automatically download attached files.
B. Modify the schedule so that the RSS feed is updated more than once a day.
C. Turn on feed reading view in IE.
D. Modify the archive setting so that the last 100 items are stored.
D. Modify the archive setting so that the last 100 items are stored.
- D. Internet Explorer 11 provides the ability to read and subscribe to RSS feeds. You can configure several options for RSS feeds, such as how often the feed is checked for updates, whether attachments are automatically downloaded, and how many updates are stored for the feed. See Chapter 7 for more information.
- What is the CIDR equivalent for 255.255.255.224?
A. /24
B. /25
C. /26
D. /27
D. /27
- D. A subnet mask of 255.255.255.224 equals a CIDR of /27. CIDR is the number of on bits. See Chapter 9 for more information.
- You are configuring a new Windows 10 computer for a new employee. You configure the new user with a standard user account. Which of the following functions will the new employee be allowed to perform? (Choose all that apply.)
A. Install a printer.
B. Install network drivers.
C. Configure WPA keys.
D. Modify the Desktop settings.
A. Install a printer.
C. Configure WPA keys.
D. Modify the Desktop settings.
- A, C, D. Standard users are allowed to perform a variety of tasks, such as install printers, configure wireless keys, and modify their Desktop settings. See Chapter 8 for more information.