Installing & Upgrading Client Systems Flashcards

1
Q

AppLocker is an application whitelisting technology introduced with Microsoft’s Windows 7 operating system. It allows restricting which programs users can execute based on the program’s path, publisher, or hash, and in an enterprise can be configured via Group Policy

A

AppLocker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

is a setting that lets you restrict a specified standard user account to only use one Windows Store App when signed in. It’s also called Kiosk mode because you can restrict customers to only use one app on your PC

A

Assigned Access 8.1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

is a full volume encryption feature included with Microsoft Windows versions starting with Windows Vista. It is designed to protect data by providing encryption for entire volumes.

A

BitLocker 4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

allows computers at a local branch office to cache data from a file or web server on a WAN (wide area network).

A

BranchCache

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

a place of business usually owned and operated by a retailer but sometimes owned and operated by a manufacturer or by someone other than a retailer in which merchandise is sold primarily to ultimate consumers.

A

Business Store

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

is a software installation in which any previous version is eradicated. The alternative to a clean install is an upgrade, in which elements of a previous version remain. The terms are often heard in reference to operating systems.

A

Clean installation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

is a type-1 hypervisor for the Windows 8. x and Windows 10 operating systems (OSes) that allows users to run multiple operating systems inside a virtual machine

A

Client Hyper-V

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cloud computing is the on-demand availability of computer system resources, especially data storage and computing power, without direct active management by the user.

A

Cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

processes commands to a computer program in the form of lines of text.

A

Command Line Interface (CLI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

a continuous sequence in which adjacent elements are not perceptibly different from each other, although the extremes are quite distinct.

A

Continuum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Cortana is a virtual assistant developed by Microsoft which uses the Bing search engine to perform tasks such as setting reminders and answering questions for the user

A

Cortana

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Credential Guard is a virtualization-based isolation technology for LSASS which prevents attackers from stealing credentials that could be used for pass the hash attacks. Credential Guard was introduced with Microsoft’s Windows 10 operating system.

A

Credential Guard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

is NOT and edition or version of Windows 10, instead it is a SETTING in Windows 10. You have enable DEFER UPGRADES in Windows Update settings. This is also configurable via Group Policy: Open a Group Policy Object that is targeted at the machines you wish to use CBB.

A

Current Branch for Business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Desktop PC

A

Desktop PC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

r is a computer program that operates or controls a particular type of device that is attached to a computer or automaton.

A

Device Driver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

is a Windows 10 security feature that enables virtualization-based security by using the Windows Hypervisor to support security services on the device.

A

Device Guard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

also known as Unified Remote Access, is a VPN-like technology that provides intranet connectivity to client computers when they are connected to the Internet.

A

DirectAccess

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The Encrypting File System on Microsoft Windows is a feature introduced in version 3.0 of NTFS that provides filesystem-level encryption.

A

Encryption File System(EFS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

is a compatibility mode that runs on Internet Explorer 11, letting websites render using a modified browser configuration that’s designed to emulate either Windows Internet Explorer 8 or Windows Internet Explorer 7, avoiding the common compatibility problems associated with web apps written and tested

A

Enterprise Mode Internet Explorer (EMIE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

is a form of user interface that allows users to interact with electronic devices through graphical icons and audio indicator such as primary notation, instead of text-based user interfaces, typed command labels or text navigation.

A

graphical user interface (GUI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

is a built-in Windows administration tool that enables administrators to manage Group Policy in an Active Directory forest and obtain data for troubleshooting Group Policy

A

Group Policy Management

22
Q

In a computer, an interrupt request (or IRQ) is a hardware signal sent to the processor that temporarily stops a running program and allows a special program, an interrupt handler, to run instead.

A

Hardware interrupts (IRQ)

23
Q

An operating system installation method in which you use an installation DVD or USB drive and manually install the operating system on every computer.

A

High Touch Installations (HTI)

24
Q

Hybrid computers are computers that exhibit features of analog computers and digital computers.

A

Hybrid Computer

25
Joining to a Domain Kernel Mode
Joining to a Domain Kernel Mode
26
Laptop
Laptop
27
LTI (Lite Touch Installation) is a high-volume deployment strategy for small to midsized organizations that combines the use of MDT with Windows Deployment Services, a server role of Windows Server 2008 and later that allows new computers to be deployed through network-based installation
Lite Touch Installation (LTI)
28
You use LoadState to restore user state from the data store. By default, this program restores user state to the location from which ScanState originally saved it-unless one of the migration . xml files redirects it. You must specify the same migration .
LoadState.exe
29
LTSB is a specialized edition of Windows 10 Enterprise that promises the longest intervals between feature upgrades of any version of the operating system.
Long-Term Servicing Branch
30
Private Catalog enables developers and cloud admins to make their solutions discoverable to their own organization's internal enterprise users.
Private Catalog
31
In computing, the term remote desktop refers to a software or operating system feature that allows a personal computer's desktop environment to be run remotely on one system, while being displayed on a separate client device. Remote desktop applications have varying features.
Remote Desktop
32
Remoteapp is a virtual application solution that allows users to run windows-based applications regardless of what operating system they are using. It allows users to launch virtual applications from a server that appear on their computer as if it is installed locally, but in reality are running on a remote server.
RemoteApp
33
The ScanState tool collects information about the application settings and user data components from the . xml files that are specified on the command line. In Windows 7, and Windows 8, the manifest files control how the operating-system settings are migrated. You cannot modify these files.
ScanState
34
Smartphone
Smartphone
35
a visual element on a computer screen that helps humans to interact with the underlying software
User Experience Control
36
when the operating system is running a user application such as handling a text editor.
User Mode
37
The User State Migration Tool is a command line utility program developed by Microsoft that allows users comfortable with scripting languages to transfer files and settings between Windows PCs.
User State Migration Tool(USMT)
38
Returns a list of supported cryptographic algorithms (AlgIDs) on the current system. You can use this on a destination computer to determine which algorithm to use with the /encrypt command before you run the ScanState tool on the source computer.
UsmtUtils.exe
39
Virtual desktops are preconfigured images of operating systems and applications in which the desktop environment is separated from the physical device used to access it. Users can access their virtual desktops remotely over a network.
Virtual Desktops
40
Windows 10 (Home, Pro, Education, Enterprise)
Windows 10 (Home, Pro, Education, Enterprise)
41
Windows 10 Media Creation Tool
Windows 10 Media Creation Tool
42
Windows Deployment Services is a server technology from Microsoft for network-based installation of Windows operating systems. It is the successor to Remote Installation Services.
Windows Deployment Services
43
is a biometrics-based technology that enables Windows 10 users to authenticate secure access to their devices, apps, online services and networks with just a fingerprint, iris scan or facial recognition.
Windows Hello
44
s a feature included by default in Windows 10 that downloads pictures and advertisements automatically from Bing and displays them when the lock screen is being shown on a computer running Windows 10.
Windows Spotlight
45
is a feature in Windows 8 Enterprise, Windows 8.1 Enterprise, Windows 10 Education and Windows 10 Enterprise versions prior to the May 2020 update, that allows the system to boot and run
Windows To Go
46
is a free service that is available for all premium editions including Windows 10 Pro, Enterprise, Pro for Workstation, and Education editions.
Windows Update for Business
47
x86-64 is a 64-bit version of the x86 instruction set, first released in 1999
x64
48
x86 is a family of instruction set architectures initially developed by Intel based on the Intel 8086 microprocessor and its 8088 variant
X86
49
ZTI (Zero Touch Installation) is a high-volume deployment strategy for midsize to large organizations that combines the use of MDT with System Center Configuration Manager (SCCM), which is part of the System Center family of products from Microsoft
Zero Touch Installation (ZTI)
50
Upgrading is the process of replacing a product with a newer version of the same product.
Upgrade Installation
51
is a retronym describing a type of user interface common as an early form of human–computer interaction,
Text User Interface (TUI)