Installing and Upgrading Client Systems Flashcards

1
Q

AppLocker

A

It allows restricting which programs users can execute based on the program’s path, publisher, or hash, and in an enterprise can be configured via Group Policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Assigned Access 8.1

A

Assigned Access is a setting that lets you restrict a specified standard user account to only use one Windows Store App when signed in.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

BitLocker

A

It is designed to protect data by providing encryption for entire volumes. By default, it uses the AES encryption algorithm in cipher block chaining or XTS mode with a 128-bit or 256-bit key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

BranchCache

A

BranchCache allows computers at a local branch office to cache data from a file or web server on a WAN (wide area network). The data can be cached either on the client computers, in distributed cache mode, or on a local server, in hosted cache mode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Clean Installation

A

A clean install is a software installation in which any previous version is eradicated. The alternative to a clean install is an upgrade, in which elements of a previous version remain. The terms are often heard in reference to operating systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Client Hyper-V

A

Microsoft Client Hyper-V is a type-1 hypervisor for the Windows 8. x and Windows 10 operating systems (OSes) that allows users to run multiple operating systems inside a virtual machine (VM).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cloud

A

Cloud computing is the on-demand availability of computer system resources, especially data storage and computing power, without direct active management by the user. The term is generally used to describe data centers available to many users over the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Command Line Interface (CLI)

A

A command-line interface processes commands to a computer program in the form of lines of text. The program which handles the interface is called a command-line interpreter or command-line processor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Continuum

A

Windows 10 Continuum is a feature that adjusts a device’s user interface to accomodate different form factors. For example, if a user works with a 2-in-1 device, the operating system automatically detects a keyboard and adjusts the device’s view to that of a traditional desktop computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cortana

A

Cortana is a virtual assistant developed by Microsoft which uses the Bing search engine to perform tasks such as setting reminders and answering questions for the user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Credential Guard

A

Credential Guard is a virtualization-based isolation technology for LSASS which prevents attackers from stealing credentials that could be used for pass the hash attacks. Credential Guard was introduced with Microsoft’s Windows 10 operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Current Branch for Business

A

Current Branch For Business is NOT and edition or version of Windows 10, instead it is a SETTING in Windows 10. You have enable DEFER UPGRADES in Windows Update settings. This is also configurable via Group Policy: Open a Group Policy Object that is targeted at the machines you wish to use CBB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Desktop PC

A

A desktop computer is a personal computer designed for regular use at a single location on or near a desk or table due to its size and power requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Device Driver

A

In computing, a device driver is a computer program that operates or controls a particular type of device that is attached to a computer or automaton.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Device Guard

A

Device Guard is a Windows 10 security feature that enables virtualization-based security by using the Windows Hypervisor to support security services on the device. The Device Guard policy enables security features such as secure boot, UEFI lock, and virtualization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

DirectAccess

A

DirectAccess, also known as Unified Remote Access, is a VPN-like technology that provides intranet connectivity to client computers when they are connected to the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Encryption File System (EFS)

A

The Encrypting File System on Microsoft Windows is a feature introduced in version 3.0 of NTFS that provides filesystem-level encryption. The technology enables files to be transparently encrypted to protect confidential data from attackers with physical access to the computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Enterprise Mode Internet Explorer (EME)

A

Enterprise Mode is a compatibility mode that runs on Internet Explorer 11, letting websites render using a modified browser configuration that’s designed to emulate either Windows Internet Explorer 8 or Windows Internet Explorer 7, avoiding the common compatibility problems associated with web apps written and tested

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Graphical User Interface (GUI)

A

A GUI (graphical user interface) is a system of interactive visual components for computer software. A GUI displays objects that convey information, and represent actions that can be taken by the user. The objects change color, size, or visibility when the user interacts with them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Business Store

A

The Microsoft Store for Business gives you a place to find and purchase apps for your organization, individually, or in volume. By connecting the store to Microsoft Intune, you can manage volume-purchased apps from the portal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Group Policy Management

A

The Group Policy Management Console (GPMC) is a built-in Windows administration tool that enables administrators to manage Group Policy in an Active Directory forest and obtain data for troubleshooting Group Policy. You can find the Group Policy Management Console in the Tools menu of Microsoft Windows Server Manager.

22
Q

Hardware Interrupts (IRQ)

A

In a computer, an interrupt request is a hardware signal sent to the processor that temporarily stops a running program and allows a special program, an interrupt handler, to run instead. Hardware interrupts are used to handle events such as receiving data from a modem or network card, key presses, or mouse movements.

23
Q

High Touch Installations

A

The High-Touch, Retail Media strategy is a hands-on, manual deployment of retail media (installing the Windows operating system on each PC by using the installation DVD) and manual configuration of each PC

24
Q

Hybrid Computer

A

Hybrid computers are computers that exhibit features of analog computers and digital computers. The digital component normally serves as the controller and provides logical and numerical operations

25
Q

Joining to a Domain Kernel Mode

A

In Kernel mode, the executing code has complete and unrestricted access to the underlying hardware. It can execute any CPU instruction and reference any memory address. Kernel mode is generally reserved for the lowest-level, most trusted functions of the operating system

26
Q

Laptop

A

A laptop or laptop computer is a small, portable personal computer with a “clamshell” form factor, typically having a thin LCD or LED computer screen mounted on the inside of the upper lid of the clamshell and an alphanumeric keyboard on the inside of the lower lid. The clamshell is opened up to use the computer.

27
Q

Life Touch Installation (LTI)

A

LTI (Lite Touch Installation) is a high-volume deployment strategy for small to midsized organizations that combines the use of MDT with Windows Deployment Services, a server role of Windows Server 2008 and later that allows new computers to be deployed through network-based installation.

28
Q

Loadstate.exe

A

You use LoadState to restore user state from the data store. By default, this program restores user state to the location from which ScanState originally saved it-unless one of the migration . xml files redirects it. You must specify the same migration

29
Q

Long-Term Servicing Branch

A

Officially, LTSB is a specialized edition of Windows 10 Enterprise that promises the longest intervals between feature upgrades of any version of the operating system. Where other Windows 10 servicing models push feature upgrades to customers every six months, LTSB does so only every two or three years.

30
Q

Private Catalog

A

like Active Directory but it is cloud-based. Private Catalog: When administrators add applications to private store, all employees in the organization can view and download the application. Remote Desktop Connection: It provides to connect someone else’s computer remotely

31
Q

Remote Desktop

A

In computing, the term remote desktop refers to a software or operating system feature that allows a personal computer’s desktop environment to be run remotely on one system, while being displayed on a separate client device. Remote desktop applications have varying features

32
Q

RemoteApp

A

Remoteapp is a virtual application solution that allows users to run windows-based applications regardless of what operating system they are using. It allows users to launch virtual applications from a server that appear on their computer as if it is installed locally, but in reality are running on a remote server.

33
Q

ScanState.exe

A

You use ScanState to save user state data. By default, this program places user state data into the data store location as defined by the three migration . xml files

34
Q

Smartphone

A

a mobile phone that performs many of the functions of a computer, typically having a touchscreen interface, internet access, and an operating system capable of running downloaded applications.

35
Q

Tablet

A

A tablet computer, commonly shortened to tablet, is a mobile device, typically with a mobile operating system and touchscreen display processing circuitry, and a rechargeable battery in a single, thin and flat package.

36
Q

Text User Interface (TUI)

A

In computing, text-based user interfaces, is a retronym describing a type of user interface common as an early form of human–computer interaction, before the advent of graphical user interfaces. Like GUIs, they may use the entire screen area and accept mouse and other inputs

37
Q

Upgrade Installation

A

Upgrading is the process of replacing a product with a newer version of the same product.

38
Q

User Experience Control & Lockdown User Interface (UI)

A

Granular UX Control allows IT managers to customize and lock down the user experience of a Windows device which uses device management policies in order to perform a specific task (e.g., a check-in kiosk at the airport)

39
Q

User Mode

A

The system is in user mode when the operating system is running a user application such as handling a text editor. The transition from user mode to kernel mode occurs when the application requests the help of operating system or an interrupt or a system call occurs. The mode bit is set to 1 in the user mode.

40
Q

User State Migration Tool(USMT)

A

The User State Migration Tool is a command line utility program developed by Microsoft that allows users comfortable with scripting languages to transfer files and settings between Windows PCs

41
Q

UsmtUtils.exe

A

Returns a list of supported cryptographic algorithms (AlgIDs) on the current system. You can use this on a destination computer to determine which algorithm to use with the /encrypt command before you run the ScanState tool on the source computer

42
Q

Virtual Desktops

A

In computing, a virtual desktop is a term used with respect to user interfaces, usually within the WIMP paradigm, to describe ways in which the virtual space of a computer’s desktop environment is expanded beyond the physical limits of the screen’s display area through the use of software

43
Q

Windows 10 (Home, Pro, Education, Enterprise)

A

Windows 10 is a series of operating systems developed by Microsoft and released as part of its Windows NT family of operating systems. It is the successor to Windows 8.1, released nearly two years earlier, and was released to manufacturing on July 15, 2015, and broadly released for the general public on July 29, 2015

44
Q

Windows 10 Media Creation Tool

A

The Windows 10 Media Creation Tool is a small program that you can can be downloaded from here and executed to download the Windows 10 ISO file that you can later use to create a Windows 10 installation DVD or USB, either to start a new Windows 10 installation or to repair an existing one

45
Q

Windows Deployment Services

A

Windows Deployment Services is a server technology from Microsoft for network-based installation of Windows operating systems. It is the successor to Remote Installation Services

46
Q

Windows Hello

A

Windows Hello is a biometrics-based technology that enables Windows 10 users to authenticate secure access to their devices, apps, online services and networks with just a fingerprint, iris scan or facial recognition

47
Q

Windows Spotlight

A

Windows Spotlight is a feature included by default in Windows 10 that downloads pictures and advertisements automatically from Bing and displays them when the lock screen is being shown on a computer running Windows 10

48
Q

Windows To Go

A

Windows To Go is a feature in Windows 8 Enterprise, Windows 8.1 Enterprise, Windows 10 Education and Windows 10 Enterprise versions prior to the May 2020 update, that allows the system to boot and run

49
Q

Windows Update for Business

A

Windows Update for Business (WUfB) allows you to keep Windows 10-based devices in your organization always up-to-date with the latest security defenses and Windows features when these devices connect directly to the Windows Update (WU) service

50
Q

X64

A

x64 is shorthand for 64-bit processor architecture. It is often contrasted with x86 architecture, which refers to 32-bit Intel processors, including the 386, 486, and 586 series. However, x64 refers to all 64-bit processors, regardless of the manufacturer

51
Q

X86

A

x86 is a term used to describe a CPU instruction set compatible with the Intel 8086 and its successors, including the Pentium and others made by Intel and other companies. This is the CPU architecture used in most desktop and laptop computers. Many 21st century workstations and servers also use x86 processors

52
Q

Zero Touch Installation (ZTI)

A

ZTI (Zero Touch Installation) is a high-volume deployment strategy for midsize to large organizations that combines the use of MDT with System Center Configuration Manager (SCCM), which is part of the System Center family of products from Microsoft.