Installing & Upgrading Client Systems Flashcards

1
Q

AppLocker

A

an application whitelisting technology introduced with Microsoft’s Windows 7 operating system. It allows restricting which programs users can execute based on the program’s path, publisher, or hash, and in an enterprise can be configured via Group Policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Assigned Access 8.1

A

a feature in Windows 8 that gives a standard user account access to just one Windows Store app. Not only can the user can’t download additional apps, they can’t even open other programs or navigate away from the app.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

BitLocker

A

a full volume encryption feature included with Microsoft Windows versions starting with Windows Vista. It is designed to protect data by providing encryption for entire volumes. By default, it uses the AES encryption algorithm in cipher block chaining or XTS mode with a 128-bit or 256-bit key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

BranchCache

A

When you pair up Windows 7 clients with Windows Server 2008 R2 file and Web servers, you have the ability to take advantage of a new technology known as “BranchCache”. BranchCache is a new Microsoft technology that allows branch offices to cache content that branch office employees obtain from the main office

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Business Store

A

software that helps small business owners manage their finances more efficiently by providing tools for tracking accounts receivable and accounts payable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Clean installation

A

A clean install is a software installation in which any previous version is eradicated. The alternative to a clean install is an upgrade, in which elements of a previous version remain. The terms are often heard in reference to operating systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Client Hyper-V

A

Microsoft Client Hyper-V is a type-1 hypervisor for the Windows 8. x and Windows 10 operating systems (OSes) that allows users to run multiple operating systems inside a virtual machine (VM). … When a user enables Client Hyper-V, Hyper-V Manager is also installed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cloud

A

Cloud computing is the on-demand availability of computer system resources, especially data storage and computing power, without direct active management by the user. The term is generally used to describe data centers available to many users over the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Command Line Interface (CLI)

A

A command-line interface (CLI) processes commands to a computer program in the form of lines of text. The program which handles the interface is called a command-line interpreter or command-line processor. … Many software systems implement command-line interfaces for control and operation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cortana

A

Cortana is a virtual assistant developed by Microsoft which uses the Bing search engine to perform tasks such as setting reminders and answering questions for the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Credential Guard

A

Credential Guard is a virtualization-based isolation technology for LSASS which prevents attackers from stealing credentials that could be used for pass the hash attacks. Credential Guard was introduced with Microsoft’s Windows 10 operating system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Current Branch for Business

A

Current Branch For Business is NOT and edition or version of Windows 10, instead it is a SETTING in Windows 10. You have enable DEFER UPGRADES in Windows Update settings. This is also configurable via Group Policy: Open a Group Policy Object that is targeted at the machines you wish to use CBB.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Desktop PC

A

A desktop computer is a personal computer designed for regular use at a single location on or near a desk or table due to its size and power requirements. … The case may be oriented horizontally or vertically and placed either underneath, beside, or on top of a desk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Device Driver

A

More commonly known as a driver, a device driver or hardware driver is a group of files that enable one or more hardware devices to communicate with the computer’s operating system. Without drivers, the computer would not be able to send and receive data correctly to hardware devices, such as a printer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Device Guard

A

Device Guard is a Windows 10 security feature that enables virtualization-based security by using the Windows Hypervisor to support security services on the device. The Device Guard policy enables security features such as secure boot, UEFI lock, and virtualization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

DirectAccess

A

also known as Unified Remote Access, is a VPN-like technology that provides intranet connectivity to client computers when they are connected to the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Encryption File System(EFS)

A

The Encrypting File System on Microsoft Windows is a feature introduced in version 3.0 of NTFS that provides filesystem-level encryption. The technology enables files to be transparently encrypted to protect confidential data from attackers with physical access to the computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Enterprise Mode Internet Explorer (EMIE)

A

Enterprise Mode, a compatibility mode that runs on Internet Explorer 11 on Windows 10, Windows 8.1, and Windows 7 devices, lets websites render using a modified browser configuration that’s designed to emulate either Windows Internet Explorer 7 or Windows Internet Explorer 8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Group Policy Management

A

The Group Policy Management Console (GPMC) is a built-in Windows administration tool that enables administrators to manage Group Policy in an Active Directory forest and obtain data for troubleshooting Group Policy. You can find the Group Policy Management Console in the Tools menu of Microsoft Windows Server Manager.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Hardware interrupts (IRQ)

A

In a computer, an interrupt request (or IRQ) is a hardware signal sent to the processor that temporarily stops a running program and allows a special program, an interrupt handler, to run instead. Hardware interrupts are used to handle events such as receiving data from a modem or network card, key presses, or mouse movements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

High Touch Installations (HTI)

A

An operating system installation method in which you use an installation DVD or USB drive and manually install the operating system on every computer. You must then also manually configure each system. HTI may include retail media or a standard image (ISO file). An exact replica of a computer system.

22
Q

Hybrid Computer

A

Hybrid computers are computers that exhibit features of analog computers and digital computers. The digital component normally serves as the controller and provides logical and numerical operations, while the analog component often serves as a solver of differential equations and other mathematically complex equations.

23
Q

Joining to a Domain Kernel Mode

A

Open the IIS manager.
Select the IIS web site to verify.
In Features View, under IIS, double-click the Authentication icon.
Select Windows Authentication and ensure that it is enabled.
Click Advanced Settings.
Verify that both EAP and Kernel Mode Authentication are disabled.

24
Q

Laptop

A

a computer that is portable and suitable for use while traveling.

25
Q

Lite Touch Installation (LTI)

A

a high-volume deployment strategy for small to midsized organizations that combines the use of MDT with Windows Deployment Services, a server role of Windows Server 2008 and later that allows new computers to be deployed through network-based installation.

26
Q

LoadState.exe

A

You use LoadState to restore user state from the data store. By default, this program restores user state to the location from which ScanState originally saved it-unless one of the migration . xml files redirects it. You must specify the same migration .

27
Q

Long-Term Servicing Branch

A

Officially, LTSB is a specialized edition of Windows 10 Enterprise that promises the longest intervals between feature upgrades of any version of the operating system. Where other Windows 10 servicing models push feature upgrades to customers every six months, LTSB does so only every two or three years.

28
Q

Private Catalog

A

When administrators add applications to private store, all employees in the organization can view and download the application. Remote Desktop Connection: It provides to connect someone else’s computer remotely

29
Q

Remote Desktop

A

In computing, the term remote desktop refers to a software or operating system feature that allows a personal computer’s desktop environment to be run remotely on one system, while being displayed on a separate client device. Remote desktop applications have varying features.

30
Q

RemoteApp

A

a virtual application solution that allows users to run windows-based applications regardless of what operating system they are using. It allows users to launch virtual applications from a server that appear on their computer as if it is installed locally, but in reality are running on a remote server.

31
Q

ScanState.exe

A

You use ScanState to save user state data. By default, this program places user state data into the data store location as defined by the three migration . xml files.

32
Q

Smartphone

A

a mobile phone that performs many of the functions of a computer, typically having a touchscreen interface, internet access, and an operating system capable of running downloaded applications.

33
Q

Tablet

A

A tablet computer, commonly shortened to tablet, is a mobile device, typically with a mobile operating system and touchscreen display processing circuitry, and a rechargeable battery in a single, thin and flat package

34
Q

Text User Interface (TUI)

A

In computing, text-based user interfaces, is a retronym describing a type of user interface common as an early form of human–computer interaction, before the advent of graphical user interfaces. Like GUIs, they may use the entire screen area and accept mouse and other inputs.

35
Q

Upgrade Installation

A

Upgrading is the process of replacing a product with a newer version of the same product.

36
Q

User Experience Control & Lockdown User Interface (UI)

A

“User experience (UX) is the interaction and experience users have with a company’s products and services. … User interface (UI) is the specific asset users interact with. For example, UI can deal with traditional concepts like visual design elements such as colors and typography.

37
Q

User Mode

A

The system is in user mode when the operating system is running a user application such as handling a text editor. The transition from user mode to kernel mode occurs when the application requests the help of operating system or an interrupt or a system call occurs. The mode bit is set to 1 in the user mode

38
Q

User State Migration Tool(USMT)

A

The User State Migration Tool is a command line utility program developed by Microsoft that allows users comfortable with scripting languages to transfer files and settings between Windows PCs.

39
Q

UsmtUtils.exw

A

Returns a list of supported cryptographic algorithms (AlgIDs) on the current system. You can use this on a destination computer to determine which algorithm to use with the /encrypt command before you run the ScanState tool on the source computer.

40
Q

Virtual Desktops

A

preconfigured images of operating systems and applications in which the desktop environment is separated from the physical device used to access it. Users can access their virtual desktops remotely over a network.

41
Q

Windows 10 (Home, Pro, Education, Enterprise)

A

One major difference between the editions is licensing. While Windows 10 Pro can come preinstalled or through an OEM, Windows 10 Enterprise requires the purchase of a volume-licensing agreement. There are also two distinct license editions with Enterprise: Windows 10 Enterprise E3 and Windows 10 Enterprise E5.

42
Q

Windows 10 Media Creation Tool

A

The Windows 10 Media Creation Tool is a small program that you can can be downloaded from here and executed to download the Windows 10 ISO file that you can later use to create a Windows 10 installation DVD or USB, either to start a new Windows 10 installation or to repair an existing one.

43
Q

Windows Deployment Services

A

Windows Deployment Services is a server technology from Microsoft for network-based installation of Windows operating systems. It is the successor to Remote Installation Services.

44
Q

Windows Hello

A

Windows Hello is a biometrics-based technology that enables Windows 10 users to authenticate secure access to their devices, apps, online services and networks with just a fingerprint, iris scan or facial recognition.

45
Q

Windows Spotlight

A

Windows Spotlight is a feature included by default in Windows 10 that downloads pictures and advertisements automatically from Bing and displays them when the lock screen is being shown on a computer running Windows 10.

46
Q

Windows To Go

A

Windows To Go is a feature in Windows 10 Enterprise and Windows 10 Education that enables the creation of a Windows To Go workspace that can be booted from a USB-connected external drive on PCs.

47
Q

Windows Update for Business

A

allows you to keep Windows 10-based devices in your organization always up-to-date with the latest security defenses and Windows features when these devices connect directly to the Windows Update (WU) service.

48
Q

X64

A

shorthand for 64-bit processor architecture. It is often contrasted with x86 architecture, which refers to 32-bit Intel processors, including the 386, 486, and 586 series. However, x64 refers to all 64-bit processors, regardless of the manufacturer

49
Q

X86

A

a term used to describe a CPU instruction set compatible with the Intel 8086 and its successors, including the Pentium and others made by Intel and other companies. This is the CPU architecture used in most desktop and laptop computers. Many 21st century workstations and servers also use x86 processors.

50
Q

Zero Touch Installation (ZTI)

A

a high-volume deployment strategy for midsize to large organizations that combines the use of MDT with System Center Configuration Manager (SCCM), which is part of the System Center family of products from Microsoft. … Support for performing multicast deployment.

51
Q

Continuum

A

a feature that adjusts a device’s user interface to accomodate different form factors. For example, if a user works with a 2-in-1 device, the operating system automatically detects a keyboard and adjusts the device’s view to that of a traditional desktop computer.