Configuring Windows 8 Flashcards
Microsoft has redesigned Windows Backup in Windows 8 and has renamed it. What is it called now?
File History
You have a computer (named X) on your network which is connected to the same network and domain to which your Windows 8 based PC (named B) is a part of. Computer X is a file store for various other computers on the network. You want to configure computer X as an authenticated exception for computer B. Which of the following type of rule will you create in Windows Firewall with Advanced Security to create the exception?
Connection Security Rules
John has just changed all the settings of your Windows 8 PC to match his needs. You want to help make sure that in case something goes wrong in the coming week, John should be able to revert back to the setting that he has just configured. Which of the following will help you achieve this?
Create a System Restore Point
You want to allow one of your shared folders to be available offline on other computers which can view the share. How do you configure this?
Right click the folder, select properties, go to sharing tab and click on the Advanced button. Then enable the share and click on the caching button.
Which of the following does the ‘Sync Center’ feature in Windows 8 depend upon?
Offline Files
You want to boot your Windows 8 PC into safe mode. Which of the following would help you reboot your PC into safe mode?
Go to PC Settings -> General -> Advanced Startup -> Restart now
Which of the following settings cannot be synced with another Windows 8 computer using the Sync options available in the OS?
Applications
Windows 8 requires a graphics card which:
Supports DirectX 9 and with WDDM driver
Which of the following in Group Policy Editor will allow you to disable the feature which allows you to automatically backup different versions of files?
Group Policy Editor -> Computer Configuration -> Administrative Templates -> Windows Components -> File History -> “Turn off File History”
You have a file located in D: drive which is encrypted. You want to allow another user (named Tony) on the same computer to open the file. So you right click file and open file properties. On properties window you click on advanced and then click “Details” button next to “Encrypt Contents to Secure Data’ option. You then click on ‘Add’ button to add another user who can open the file. However the user whom you want to allow the access to is not listed there. What can be the reason?
The user Tony has never encrypted any file
You want to enable location aware printing on your Windows 8 PC. Select the path which will allow you to enable location aware printing.
Control Panel -> Hardware and Sound -> Devices and Printers
Your client recently performed a driver upgrade on your Windows 8 PC and his audio stopped working. Where will you go first to roll back the driver upgrade?
Device Manager
Where would you go if you wanted to allow encryption of only used space on removable drive using Bitlocker?
Local Computer Policy -> Computer Configuration -> Administrative Templates -> Windows Components -> Bitlocker Drive encryption -> Removable Data Drives
Which of the following would be the first step in the process of removing a Metro App from Windows 8?
Right click the App tile on start screen
Your manager says that Remote Desktop sessions pose a threat to privacy of the computer being controlled remotely. Hence it is desirable that a remote desktop connection be automatically disconnected after 10 minutes of inactivity. Which of the tools would you use when the task is assigned to you for a Windows 8 PC?
Group Policy Editor
You want to create a new restore point and exclude the registry changes since last restore point to be excluded during the restore point creation. Which of the following tools will help you?
Local Security Policy Editor Local Group Policy Editor Registry Editor Control Panel =>None of the above
A user named ‘john’ wants to change his password on Windows 8 Pro computer remotely. He has access to the telnet prompt in the name of remote access. The user ‘john’ also has administrative rights on the system. Which of the following commands will get the job done? We assume that the remote system is online and user ‘john’ has already logged in to the remote computer. We also assume that he wants to change his password to ‘mynewpasswrd’
net user john mynewpasswrd
Which of the following is NOT one of the recommended minimum hardware requirements of Windows 8?
16 GB HDD Space for 64-bit system
You do not want the computer to be discovered by other computers when on a private network. Which of the following places will help you achieve this?
Control Panel -> Network and Internet -> Network and Sharing Center -> Advanced sharing settings
Which of the following tools will allow you to configure startup settings?
msconfig.exe
You are responsible for maintaining a network of 78 computers on a network. 77 of the computers are running Windows 8 Pro and the remaining 1 is running Windows server 2012 which also acts as an update server for the intranet to save internet bandwidth. You are asked to configure all Windows 8 PCs to download updates from the intranet server and upload statistics to the same. Where in the Local Group Policy editor will you go?
GPE -> Local Computer Policy -> Computer Configuration -> Administrative Templates -> Windows Components -> Windows Update
You are receiving complaints that a client is not able to view a webpage properly in Internet Explorer. You suggest the person to switch on the compatibility view. The client however says that the problem still persists and the wanted site layout is not well. What do you think would be the problem?
The website is not compatible with Internet Explorer
Which of the following algorithms can be one of the Integrity algorithms for Windows 8 IPSec Policy filter rule?
MD5
You have a situation where you are asked to deny the execution of a set of programs for a particular user of the system which were all installed inside C:\CustomPrograms\ folder in their own individual sub-folders. Which of the following will you use to achieve the goal?
both secpol.msc and gpedit.msc
Your Windows 8 Pro installation was done on a machine which already had a Linux partition (ext4 file system) on it. During the installation, that partition was left untouched to preserve data for migration. Now that the data has been migrated already, it is required that the partition be deleted and space be freed. Which of the following would you do to get the job done?
Run ‘diskmgmt.msc’
Run ‘compmgmt.msc’
Right click on computer entry in the explorer window and select manage
=>Any of the above
Microsoft recommends that you install signed device drivers only on Windows to avoid unnecessary crashes and other problems. Which of the following tools will allow you to find out the unsigned device drivers?
sigverif
A client of yours has a PC with an external Blu-Ray media burner device which he can connect to the PC using a USB port. He wants to create a Recovery Drive for his Windows 8 Pro PC. But he constantly being asked by the operating system to insert a USB drive for creating the Recovery Drive. What might be the problem?
Windows 8 cannot use an external Blu-Ray device for creating Recovery Drive
You have enabled indexing on all your files. However you do not want Windows to index the contents of some .XLS file (Microsoft Office Excel files). How would you configure this?
Change indexing options in control panel
You are in charge of a small network with 10 computers named C1, C2, C3…C10. Computer C1 hosts a command line program which should be accessible to Computers C5, C6 and C7 so that those computers need launch the program on C1. However it is also desirable that other computers should not be able to connect to C1 for telnet. You have already enabled Telnet Client on C5,C6 and C7 as well as the Telnet Server on C1. Which one of the following tools will allow you to take the further step on computer C1?
Remember that the OS on C1 is Windows 8, not Windows Server.
WFAS
Which of the following command line programs can be used to configure the Windows Firewall?
netsh
You have been asked not to install a particular update for Windows which conflicts with the workflow of other apps in your organization. However you are being bugged by Windows update to install that update. How will you make sure that you are not being disturbed by Windows update for the unwanted update?
Please note that you are not supposed to disable automatic updates or install that update either.
Hide the update
One morning you have simply been asked by your senior to start up one of the Windows 8 Pro computers you manage in your company and run the command “net localgroup webmgrs /add” on an elevated command prompt. What is your senior trying to do on the computer?
He wants to add a new user group called ‘webmgrs’
Which of the following will allow you to activate VPN Reconnect?
Go to Control Panel -> Network and Internet -> Network Connections. Right click VPN1 and Select “properties”, Go to security tab and then to Advanced Settings
Which one of the following is the job of the feature named as ‘SmartScreen’ in Windows 8?
Automatically prevent installation of unverified applications on system
You installed Adobe Acrobat Reader and it installed an application called as ‘Adobe Update Checker’ which starts up everytime you start your computer and keeps disturbing with notifications of new updates. You do not want this to happen and have decided to block Adobe Updater program from starting up when Windows boots up. Which of the following commands will help you achieve the goal?
taskmgr
Which of the following is not an option provided with Windows 8 for Windows Update?
Download and install updates automatically but let me choose when to activate them
Where would you go if you wanted to allow encryption of only used space on removable drive using Bitlocker?
Local Computer Policy -> Computer Configuration -> Administrative Templates -> Windows Components -> Bitlocker Drive encryption -> Removable Data Drives
You are responsible for setting address of computers on a network under a tight corporate environment where automated IP address allocation via DHCP is not allowed. One of the computers you manage has two Ethernet interfaces on which you have installed Windows 8. You are able to use only one of the two networks when cables are connected but not both at the same time. What could be the problem given that all hardware is working well?
Same IP address allocated to both interfaces by mistake
You have just installed Windows 8 Pro 32-bit system on a system with a AMD processor with 6 processing cores. You have attached the Ethernet cable to the computer port but you are not able to access anything on the network. You find that both Ethernet port and Ethernet cable are functioning well. What has failed?
A DHCP server is faulty or non-functional
Your manager is suspicious of an employee who he thinks has been changing his computer’s system time multiple times a day which causes a company wide critical application to behave erratically. He wants you to present to him a log of when he changes the system time within the next week. Which of the following tools will help you get the log?
secpol.msc
You want to create a VHD file to install Windows 8 onto. Which of the following commands would help you to make one?
Diskpart.exe
diskmgmt.msc
=>both of the above
What is the default frequency of drive defragmentation set by Windows as default?
Every week
How can you deactivate the “Sync Center” feature from Windows 8 Pro (32-bit) installation?
Group Policy editor
Control Panel
System Properties box
=>none of the above (it cannot be done)
Which of the following services must be running to allow VPN access to the computer?
Routing and Remote Access
In which of the following situations a smart card authentication cannot be used to logon to a Windows 8 based PC?
A Windows 8 system installed using Windows AIK (Automated Installation Kit)
Access over VPN
Local Login
=>none of the above
You want to use the Hyper-V virtualization system built into Windows 8. However the tools for doing so are not pre-installed with Windows 8. How will you gain access to Windows Hyper-V virtualization system?
It is a Windows Feature which can be turned on in Control Panel
you have a program which can be run directly from a pen drive. You however create a self-extracting exe file using WinRar to install it easily on any computer. You then use the exe file to install it on your friend’s PC. Will the installation cause a restore point to be created?
No, it will not cause a System Restore Point to be created