Configuring Windows 8 Flashcards
Microsoft has redesigned Windows Backup in Windows 8 and has renamed it. What is it called now?
File History
You have a computer (named X) on your network which is connected to the same network and domain to which your Windows 8 based PC (named B) is a part of. Computer X is a file store for various other computers on the network. You want to configure computer X as an authenticated exception for computer B. Which of the following type of rule will you create in Windows Firewall with Advanced Security to create the exception?
Connection Security Rules
John has just changed all the settings of your Windows 8 PC to match his needs. You want to help make sure that in case something goes wrong in the coming week, John should be able to revert back to the setting that he has just configured. Which of the following will help you achieve this?
Create a System Restore Point
You want to allow one of your shared folders to be available offline on other computers which can view the share. How do you configure this?
Right click the folder, select properties, go to sharing tab and click on the Advanced button. Then enable the share and click on the caching button.
Which of the following does the ‘Sync Center’ feature in Windows 8 depend upon?
Offline Files
You want to boot your Windows 8 PC into safe mode. Which of the following would help you reboot your PC into safe mode?
Go to PC Settings -> General -> Advanced Startup -> Restart now
Which of the following settings cannot be synced with another Windows 8 computer using the Sync options available in the OS?
Applications
Windows 8 requires a graphics card which:
Supports DirectX 9 and with WDDM driver
Which of the following in Group Policy Editor will allow you to disable the feature which allows you to automatically backup different versions of files?
Group Policy Editor -> Computer Configuration -> Administrative Templates -> Windows Components -> File History -> “Turn off File History”
You have a file located in D: drive which is encrypted. You want to allow another user (named Tony) on the same computer to open the file. So you right click file and open file properties. On properties window you click on advanced and then click “Details” button next to “Encrypt Contents to Secure Data’ option. You then click on ‘Add’ button to add another user who can open the file. However the user whom you want to allow the access to is not listed there. What can be the reason?
The user Tony has never encrypted any file
You want to enable location aware printing on your Windows 8 PC. Select the path which will allow you to enable location aware printing.
Control Panel -> Hardware and Sound -> Devices and Printers
Your client recently performed a driver upgrade on your Windows 8 PC and his audio stopped working. Where will you go first to roll back the driver upgrade?
Device Manager
Where would you go if you wanted to allow encryption of only used space on removable drive using Bitlocker?
Local Computer Policy -> Computer Configuration -> Administrative Templates -> Windows Components -> Bitlocker Drive encryption -> Removable Data Drives
Which of the following would be the first step in the process of removing a Metro App from Windows 8?
Right click the App tile on start screen
Your manager says that Remote Desktop sessions pose a threat to privacy of the computer being controlled remotely. Hence it is desirable that a remote desktop connection be automatically disconnected after 10 minutes of inactivity. Which of the tools would you use when the task is assigned to you for a Windows 8 PC?
Group Policy Editor
You want to create a new restore point and exclude the registry changes since last restore point to be excluded during the restore point creation. Which of the following tools will help you?
Local Security Policy Editor Local Group Policy Editor Registry Editor Control Panel =>None of the above
A user named ‘john’ wants to change his password on Windows 8 Pro computer remotely. He has access to the telnet prompt in the name of remote access. The user ‘john’ also has administrative rights on the system. Which of the following commands will get the job done? We assume that the remote system is online and user ‘john’ has already logged in to the remote computer. We also assume that he wants to change his password to ‘mynewpasswrd’
net user john mynewpasswrd
Which of the following is NOT one of the recommended minimum hardware requirements of Windows 8?
16 GB HDD Space for 64-bit system
You do not want the computer to be discovered by other computers when on a private network. Which of the following places will help you achieve this?
Control Panel -> Network and Internet -> Network and Sharing Center -> Advanced sharing settings
Which of the following tools will allow you to configure startup settings?
msconfig.exe
You are responsible for maintaining a network of 78 computers on a network. 77 of the computers are running Windows 8 Pro and the remaining 1 is running Windows server 2012 which also acts as an update server for the intranet to save internet bandwidth. You are asked to configure all Windows 8 PCs to download updates from the intranet server and upload statistics to the same. Where in the Local Group Policy editor will you go?
GPE -> Local Computer Policy -> Computer Configuration -> Administrative Templates -> Windows Components -> Windows Update
You are receiving complaints that a client is not able to view a webpage properly in Internet Explorer. You suggest the person to switch on the compatibility view. The client however says that the problem still persists and the wanted site layout is not well. What do you think would be the problem?
The website is not compatible with Internet Explorer
Which of the following algorithms can be one of the Integrity algorithms for Windows 8 IPSec Policy filter rule?
MD5
You have a situation where you are asked to deny the execution of a set of programs for a particular user of the system which were all installed inside C:\CustomPrograms\ folder in their own individual sub-folders. Which of the following will you use to achieve the goal?
both secpol.msc and gpedit.msc
Your Windows 8 Pro installation was done on a machine which already had a Linux partition (ext4 file system) on it. During the installation, that partition was left untouched to preserve data for migration. Now that the data has been migrated already, it is required that the partition be deleted and space be freed. Which of the following would you do to get the job done?
Run ‘diskmgmt.msc’
Run ‘compmgmt.msc’
Right click on computer entry in the explorer window and select manage
=>Any of the above
Microsoft recommends that you install signed device drivers only on Windows to avoid unnecessary crashes and other problems. Which of the following tools will allow you to find out the unsigned device drivers?
sigverif
A client of yours has a PC with an external Blu-Ray media burner device which he can connect to the PC using a USB port. He wants to create a Recovery Drive for his Windows 8 Pro PC. But he constantly being asked by the operating system to insert a USB drive for creating the Recovery Drive. What might be the problem?
Windows 8 cannot use an external Blu-Ray device for creating Recovery Drive
You have enabled indexing on all your files. However you do not want Windows to index the contents of some .XLS file (Microsoft Office Excel files). How would you configure this?
Change indexing options in control panel
You are in charge of a small network with 10 computers named C1, C2, C3…C10. Computer C1 hosts a command line program which should be accessible to Computers C5, C6 and C7 so that those computers need launch the program on C1. However it is also desirable that other computers should not be able to connect to C1 for telnet. You have already enabled Telnet Client on C5,C6 and C7 as well as the Telnet Server on C1. Which one of the following tools will allow you to take the further step on computer C1?
Remember that the OS on C1 is Windows 8, not Windows Server.
WFAS
Which of the following command line programs can be used to configure the Windows Firewall?
netsh
You have been asked not to install a particular update for Windows which conflicts with the workflow of other apps in your organization. However you are being bugged by Windows update to install that update. How will you make sure that you are not being disturbed by Windows update for the unwanted update?
Please note that you are not supposed to disable automatic updates or install that update either.
Hide the update
One morning you have simply been asked by your senior to start up one of the Windows 8 Pro computers you manage in your company and run the command “net localgroup webmgrs /add” on an elevated command prompt. What is your senior trying to do on the computer?
He wants to add a new user group called ‘webmgrs’
Which of the following will allow you to activate VPN Reconnect?
Go to Control Panel -> Network and Internet -> Network Connections. Right click VPN1 and Select “properties”, Go to security tab and then to Advanced Settings
Which one of the following is the job of the feature named as ‘SmartScreen’ in Windows 8?
Automatically prevent installation of unverified applications on system
You installed Adobe Acrobat Reader and it installed an application called as ‘Adobe Update Checker’ which starts up everytime you start your computer and keeps disturbing with notifications of new updates. You do not want this to happen and have decided to block Adobe Updater program from starting up when Windows boots up. Which of the following commands will help you achieve the goal?
taskmgr
Which of the following is not an option provided with Windows 8 for Windows Update?
Download and install updates automatically but let me choose when to activate them
Where would you go if you wanted to allow encryption of only used space on removable drive using Bitlocker?
Local Computer Policy -> Computer Configuration -> Administrative Templates -> Windows Components -> Bitlocker Drive encryption -> Removable Data Drives
You are responsible for setting address of computers on a network under a tight corporate environment where automated IP address allocation via DHCP is not allowed. One of the computers you manage has two Ethernet interfaces on which you have installed Windows 8. You are able to use only one of the two networks when cables are connected but not both at the same time. What could be the problem given that all hardware is working well?
Same IP address allocated to both interfaces by mistake
You have just installed Windows 8 Pro 32-bit system on a system with a AMD processor with 6 processing cores. You have attached the Ethernet cable to the computer port but you are not able to access anything on the network. You find that both Ethernet port and Ethernet cable are functioning well. What has failed?
A DHCP server is faulty or non-functional
Your manager is suspicious of an employee who he thinks has been changing his computer’s system time multiple times a day which causes a company wide critical application to behave erratically. He wants you to present to him a log of when he changes the system time within the next week. Which of the following tools will help you get the log?
secpol.msc
You want to create a VHD file to install Windows 8 onto. Which of the following commands would help you to make one?
Diskpart.exe
diskmgmt.msc
=>both of the above
What is the default frequency of drive defragmentation set by Windows as default?
Every week
How can you deactivate the “Sync Center” feature from Windows 8 Pro (32-bit) installation?
Group Policy editor
Control Panel
System Properties box
=>none of the above (it cannot be done)
Which of the following services must be running to allow VPN access to the computer?
Routing and Remote Access
In which of the following situations a smart card authentication cannot be used to logon to a Windows 8 based PC?
A Windows 8 system installed using Windows AIK (Automated Installation Kit)
Access over VPN
Local Login
=>none of the above
You want to use the Hyper-V virtualization system built into Windows 8. However the tools for doing so are not pre-installed with Windows 8. How will you gain access to Windows Hyper-V virtualization system?
It is a Windows Feature which can be turned on in Control Panel
you have a program which can be run directly from a pen drive. You however create a self-extracting exe file using WinRar to install it easily on any computer. You then use the exe file to install it on your friend’s PC. Will the installation cause a restore point to be created?
No, it will not cause a System Restore Point to be created
While your company allows its employees to have administrative rights on their workstations, it does not want them to install any program or feature without notifying a senior. You suspect that one of the employees of your company enabled telnet server on his Windows 8 Enterprise PC to allow someone else control his computer without notifying his seniors and then disabled it to hide and cover up his deed. Where will you find the logs if he did this or not?
In the event viewer Windows logs -> Setup
Which of the following does the ‘Sync Center’ feature in Windows 8 depend upon?
Offline Files
Which of the following would help you create a new Broadband Connection to Internet?
Control Panel -> Network and Internet -> Network and Sharing Center
Which of the following is true for Windows to Go feature of Windows 8?
Windows to Go can utilize BitLocker to encrypt data on the USB
How does one update metro applications (or Windows 8 style applications) in Windows 8?
Use the Microsoft App Store (a Metro application)
Which of the following system configuration specs would be recommendable for a 64-bit version of Windows 8 to be installed on?
1 TB HDD space, Intel Core i7 based processor, 12 GB RAM
What of the following is the job of App-V in Windows 8?
Allow applications to be launched on different computers from a central server depending on the user who is trying to launch the application
Which of the following in Group Policy Editor will allow you to disable the feature which allows you to automatically backup different versions of files?
Group Policy Editor -> Computer Configuration -> Administrative Templates -> Windows Components -> File History -> “Turn off File History”
When upgrading from Windows XP to Windows 8, which one of the following would be left intact?
Personal Files
When upgrading from Windows XP to Windows 8, which Service Pack is required to be installed on your Windows XP system?
Service Pack 3
Which of the following types of network connections can be created in Windows 7 but not in Windows 8?
Wireless Ad-Hoc connection
By default Windows does not index encrypted files (even if they are encrypted by you). Can you configure Windows 8 (Basic) edition to index them?
No, Windows 8 (Basic) cannot index encrypted files
Which of the following command will launch the event viewer?
net launch event view taskmgr.msc event-viewer.exe taskmgr.exe =>None of the above
Which of the following will setup the boot sector on the target USB drive when installing Windows 8 as windows to go?
bcdboot.exe
You were working on a file since last 12 hours continuously. The file was an excel sheet located in one of your folders belonging to your ‘Documents’ library. You had also setup File History to take backups on a network drive. However you accidentally made a disastrous change on the file and closed the program (Excel). You have not changed any settings for File History. How many hours of your work has been lost at maximum?
1 hour
Which of the following features of Internet Explorer allows the user to get rid of all the browsing, cookies, form fillup data and login history as and when Internet Explorer Window is closed?
InPrivate Browsing
You have a folder named ‘MyData’ located in D: drive (considering that D: drive is a local hard disk volume and Windows is installed on C:). You have a file which is located inside MyData encrypted using NTFS’ EFS system on Windows 8 Enterprise PC. You want it to be shared with another user on the same PC. Can this be done?
Yes, using the file properties window.
Which of the following edition has the ‘Windows to Go’ feature?
Windows 8 Enterprise
Which of the following tools can be used to migrate a user profile on a Windows 7 PC to another user on a Windows 8 PC?
Windows Easy Transfer
You have Windows 8 installed on a system with AMD Phenom II processor, 4 GB RAM and a 40 GB hard disk. Since Windows 8 requires at least 20 GB for installation, you utilized all of 40 GB for the C: drive. You want to backup your data using Windows File history onto C:\Backup folder. However Windows 8 has not been showing you the option for the same. What might be the reason?
Windows File history cannot utilize a disk of less than 80 GB
You are in charge of a small network with 10 computers named C1, C2, C3…C10. Computer C1 hosts a command line program which should be accessible to Computers C5, C6 and C7 so that those computers need launch the program on C1. Which of the following would you do?
Enable Telnet Client on C5,C6,C7 and Telnet Server on C1
Which of the following is not an option you can control for Windows to Go workspaces from Group Policy Editor?
Controlling local file visibility for Windows to Go workspaces
Which of the following would you run as an administrator to change the network settings of the ethernet interface of your Windows 8 Enterprise PC?
ipconfig
Which of the following is not automatically recorded with a System Restore Point?
Username whose action caused the creation
Which one of the following will not cause Windows 8 to create a System Restore Point automatically?
When a new Library is created by any administrator user on the computer
How would you share a folder which is located in your ‘Downloads’ folder inside your User Folder on Windows 8 Pro?
Right Click the folder -> Sharing and select the mode.
Right click the folder, select properties, go to sharing tab and configure the share
=>Any one of the above
Your Internet connection is not allowing you to take advantage of the expected bandwidth. Your router as well as your Windows 8 Pro PC shows a heavy network utilization. You need to find out which program or process has been consuming the bandwidth. Which tool can come in handy?
Task manager
Resource Monitor
A third party application designed to monitor bandwidth consumption by individual applications
=>All of the above
You want to disable network communications for a single program on Windows 8 PC. The program is installed on a partition separate from the main Windows installation partition. Which of the following will help you achieve the goal?
Windows Firewall with Advanced Security
You have a Windows 8 Pro installation on your computer in home-office setup. The ‘D:’ drive contains all your work related files. You already have setup backup to another computer over network. However you want to make sure that the data is safe and want to allocate maximum space for system restore. How much space can you allocate on D: drive for system restore points?
100% of full capacity
Which of the following is false?
The default disk partitioning scheme is MBR style
MBR paritioning scheme allows for only 4 primary partitions
Windows 8 Enterprise with MBR partitioning scheme can have only 3 visible drives using primary partitions
=>Windows 8 Enterprise can convert a MBR partitioned HDD into a GPT style partition
You want to be able to download Windows updates automatically but do not want any of the apps installed via Windows App store to be able to auto-update. Which of the following method can be used to achieve this?
In Group Policy Editor, go to Computer Configuration -> Administrative Templates -> Windows Configuration -> Store and enable the “Turn off automatic download of updates” setting
Which of the following cannot be done by WFAS (Windows Firewall with Advanced Security)?
Detect Virus propagation on a selected interface
One the 3 hard disks attaches to your computer contains a lot of files which are frequently uploaded, modified and deleted by other people on the network. The disk has started working slow. Where would you head to to fix it?
Go to Windows Explorer -> Computer and right click G drive and click on properties
You want Windows File history to save backups on a “keep latest versions’ strategy. Which one of the following will you use?
control.exe
You have installed a huge application package with a lot of executable programs. Being a huga package from a reputed software vendor, they were all digitally signed. You however now need to make sure that none of those programs execute by the order of a senior manager who suspects the programs have been leaking sensitive data and has put a team for inspection of the same. Your job is to prevent the execution of all programs by that vendor now and any new programs which belong to the same vendor. Which rule type with AppLocker would be able to achieve this?
Publisher rule
You want to switch off the Windows Application Store in Windows 8. How will you do it?
Go to Group Policy Editor -> Computer Configuration -> Windows Components -> Store and “turn off the store application” policy setting
Which one of the following can be used to disable SmartScreen feature in Windows 8?
Control Panel -> System and Security -> Action Center
You work for a company which creates hardware. The developers test their drivers against Windows 8. However Windows 8 wants to search for drivers on Windows driver store online. Which of the following commands will open the window where you would find the setting for the same?
gpedit.msc
You wanted to know about your colleagues in your company who you think have been trying to sniff some important data from your computer. At the same time you want to know about those friend who would warn you in case you make a mistake. So you have created a fake folder named as “Secret Files” and have shared it on the network. Now you want to know who all are viewing that folder. What would you do?
Open the Computer management console and navigate to the Shared Folders -> Sessions node
Which of the media can not be used to save a Windows 8 system image?
FTP Server
Which of the following commands is responsible for expanding install.wim file so that it becomes ready for being transferred for booting via the required media?
imagex.exe
Which one out of the following editions of Windows 8 would you recommend to a client who works with sensitive documents wants easy and transparent encryption features along with full disk encryption but is not interested in any of Windows Domain related functionality?
Windows 8 Pro
Which of the following is true about Folder Redirection feature?
Folder Redirection allows you to have the user folders like Documents and Desktop on a remote server.
Which of the following upgrade methods are not possible for Windows 8?
Windows 7 Professional to Windows 8 Professional
Which of the following editions of Windows 8 cannot utilize Sideloading?
Both Windows 8 (Basic) and Windows 8 RT
You were asked to switch on the “Audit Process Termination” policy in “Local Security Policy” (Security Policy Editor) -> Advanced Audit Policy Configuration -> System Audit Policies - Local Group -> Detailed Tracking. What are the implications?
An audit event is generated when a process ends
You want to share a folder named “ShrdFldr” located in D: drive (Considering that your Windows 8 installation has been done on C: drive) with a particular computer on the network which also belongs to your HomeGroup. However, you do not want to share the folder with any other computer on the HomeGroup. Over this, it is desirable that the share be a read-only share so that the remote user is not able to make any changes to the share and the folder name should appear as ‘Temporary Data’ when viewed as a network location from the other computers. Which of the following paths will you take for the same?
Right click the folder -> Properties -> Sharing (TAB) -> Advanced button and then configure the share
A person runs a computer learning center where he teaches others how to use a computer. He buys 3 laptops each of which have come preinstalled with Windows 8. Laptop-1 came with Windows 8 (Basic Edition) 32-bit. Laptop-2 came with Windows 8 Pro 32 bit and Laptop-3 came with Windows 8 Pro 64 bit. Each laptop is being used by a separate individual. The person who is using Laptop-1 complains that he is not able to encrypt a file on his computer using EFS. Which of the following is a reason why he is not able to use EFS?
FS is not available in Windows 8 Basic edition
Which of the following upgrade method can be applied to upgrade from Windows Vista to Windows 8?
Both Clean Install and Migration
Which of the following is not a requirement which must be fulfilled for installation an App which is not available on Windows App Store (also known as sideloading)?
The application must be able to run on a target Windows 8 system via App-V
You are working as a IT Manager of a section of an enterprise which uses Windows 8 Pro on all of their PCs. One of the PCs have started crashing and you suspect that a driver is misbehaving. Which of the following tools will you use to figure out the problem with drivers?
verifier.exe
You want to install a Windows 8 Enterprise ISO image as Windows to Go on a client’s USB drive. You have already mounted and extracted the contents of the ISO file, have prepared the USB drive for boot and are ready to deploy the install.wim file. Which of the following commands will finally let you deploy the file onto the USB drive?
dism.exe
You went to PC Settings -> General -> Advanced Startup and clicked on the restart button. How will you now boot into safe mode?
Troubleshoot -> Advanced options -> Startup settings
How will you roll back a Windows update which did not contain an update to a driver?
Control Panel -> System and Security -> Windows updates -> installed updates
Control Panel -> Programs -> Programs and Features -> view installed updates
Control Panel -> System and Security -> Windows Update -> View update history and click on “installed updates”
=>Any of the above
Which of the following path in the Local Group Policy Editor will allow you to control the startup options for Windows to Go workspaces?
Computer Configuration\Administrative Templates\Windows Components\Portable Operating System
You have already configured an Ethernet network interface on your Windows 8 Enterprise (32-bit) PC as a “Public” network. Now you want to convert it to a “Private” network. Which of the following would help you do that?
Security Policy Editor
While installing a software from the vendor XYZ, you checked on “Always Trust content from XYZ”. Now you want to remove the vendor from the list of trusted vendors. Which of the following will help you do that?
Certificate Manager -> Trusted Publisher -> Certificate
You work for a company which happens to be a Microsoft Certified Gold Support Partner. In their training department, they have 10 computers on a network all running Windows 8 Enterprise. Out of 10 computers, 1 computer (named DemoComp) is being used for demonstration and lab purposes where new trainees are supposed to login and practice how to use Remote Desktop Connections. The machine ‘DemoComp’ has multiple accounts but trainees are supposed to use only one account of DemoComp named as TestUserAcc. You have been asked to configure the DemoComp system to allow access to DemoComp, but only for the TestUserAcc account. Can this be done?
Yes, using the Remote Assistance Settings on DemoComp
Which of the following Bitlocker options is not available to be used with removable drives?
Use RSA Encryption technique to encrypt data
You want to enforce the complexity of password for the ones being used for Bitlocker on Operating System drives. Which of the following policies must be activated?
Local Computer Policy -> Computer Configuration -> Administrative Templates -> Windows Components -> Bitlocker Drive encryption -> Operating System Drives
Local Computer Policy -> Computer Configuration -> Windows Settings -> Security Settings -> Account Policies -> Password Policy -> Password must meet complexity requirements
Both options indicated in 1 and 2
Where is sync center located?
Control Panel
You want to create a new restore point and exclude the registry changes since last restore point to be excluded during the restore point creation. Which of the following tools will help you?
Local Security Policy Editor Local Group Policy Editor Registry Editor Control Panel =>None of the above
What is the minimum required resolution to use Windows App Store on Windows 8?
1024 X 768
What is the name of the edition of Windows 8 which would come pre-installed with ARM based devices?
Windows 8 RT
You have just enabled Hyper-V client side subsystem on Windows 8 Enterprise 32 bit system. However the Virtual Machine Manager reports errors that services are not running and denies to connect to local system. When you go to services management console and try to start up the hyper-v services, they deny to start up as well. What do you think is wrong?
The system must be 64-bit
The RAM must be 4 GB at minimum
The processor must have virtualization assistive technologies such as AMD-V or Intel VTx
=>Any of the above
You have created a HomeGroup with 3 Windows 8 (Professional Edition) PCs (named PC-1, PC-2 and PC-3) in your home network which is labelled as a “private” network for all the PCs as well. You changed the homegroup password on PC-1 and are not able to access files on the other PCs. What could be the reason?
Other PCs were switched off when you changed the setting
You have one partition of 1 TB which you now want to compress to 400 GB and get a new partition of 600 GB. The disk has 700 GB of data. Can this be done?
No, the data has to be less than the space to which the drive has to be shrinked to
You are trying to share media on your network using Windows Media Player. However, you have been failing and want to look into the event logs for more information. Where in the event viewer will you find the event logs for Windows Media Player?
Windows Logs -> System
When trying to upgrade Windows Vista to Windows 8 with personal files and settings, which of the following is required?
Windows Vista must have all hardware drivers installed
Windows Vista installation must be one with Volume License key
Windows Vista must have Service Pack 2 installed at minimum.
=>none of the above
You just updated the driver for your webcam and Windows 8 is not starting up to normal mode. You want to rollback the driver to the previous one. You want to rollback the driver manually. Which of the following would you try?
Boot into safe mode
You want to allow computer to sleep even when a file is open over the network. Can you do it in Windows 8 Enterprise PC?
Yes, using Group Policy Editor
You changed the HomeGroup password on your computer accidentally while other PCs were switched off and hence other computers on the network are unable to access the homegroup. How can you make sure that homegroup starts working again?
Change the HomeGroup Password again