Test Questions Flashcards

1
Q

You are considering purchasing an inexpensive computer from a friend that has a 32-bit CPU and 8 GB of RAM. You install Windows 10 Home, 32-bit edition, but you cannot see the full amount of RAM. What is wrong?
a. The CPU does not support multiple cores.

b. You need to install a 64-bit version of Windows 10.

c. Windows 10, 32-bit editions cannot support more than 4 GB of RAM.

d. The CPU does not support hyperthreading.

e. You must install Windows 10 Pro.

A

c. Windows 10, 32-bit editions cannot support more than 4 GB of RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A volume license for Windows 10 is an upgrade from an OEM edition of Windows 10. True or False?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What type of software does Windows 10 require to manage a new type of hardware?
a. API
b. Hardware driver
c. Hardware shim
d. Resource configuration driver
e. Plug and play software

A

b. Hardware driver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Active Directory-based activation is more reliable than KMS. True or False?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The new browser included with Windows 10 is called _____.
a. Microsoft Edge
b. Virtual Desktop
c. Cortana
d. Charlie
e. Windows Hello

A

a. Microsoft Edge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An administrator of a manufacturing company would like to manage corporate computers with Group Policy. The administrator is reviewing a purchase request for 20 new computers from the business owners. Which version of Windows 10 should the administrator consider for installation on the new computers? (Select two.)
a. Windows 10 Home
b. Windows 10 Pro
c. Windows 10 Education
d. Windows 10 Enterprise

A

b. Windows 10 Pro
d. Windows 10 Enterprise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which editions of Windows 10 have support for 6 TB of memory? (Select two.)
a. Windows 10 Pro
b. Windows 10 Pro for Workstations
c. Windows 10 Home
d. Windows 10 Enterprise
e. Windows 10 Pro Education

A

b. Windows 10 Pro for Workstations
d. Windows 10 Enterprise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following is a disadvantage of workgroup computing?

a. Supports an unlimited number of workstations

b. No centralized security management

c. Simple to set up initially

d. Requires one or more expensive servers

A

b. No centralized security management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which type of license cannot be moved from one physical computer to another?
a. MAK
b. FPP
c. Volume licensing
d. OEM
e. KMS

A

d. OEM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following is an advantage of domain networking?

a. Support for up to 25 simultaneous shared connections

b. No central security database

c. Included in every version of Windows 10

d. Centralized security management

A

d. Centralized security management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following are valid upgrade paths? (Select 3)
a. Windows 7 Enterprise to Windows 10 Pro
b. Windows 7 Home to Windows 10 Pro
c. Windows 8.1 Pro to Windows 10 Pro
d. Windows 8 Enterprise to Windows 10 Enterprise
e. Windows 8.1 Pro to Windows 10 Enterprise

A

b. Windows 7 Home to Windows 10 Pro
c. Windows 8.1 Pro to Windows 10 Pro
e. Windows 8.1 Pro to Windows 10 Enterprise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

You can use cloud licensing for which specific scenario?

a. Upgrading from Windows 10 Pro to Windows 10 Enterprise
b. New installations of Windows 10 Pro
c. New installations of Windows 10 Enterprise
d. Upgrading Windows 8.1 Pro to Windows 10 Enterprise

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A friend has asked you which version of Windows 10 should be purchased to start a new home-based business. Your friend needs only one computer for now and requires support for Windows Store applications needed to manage the business. Your friend is not very experienced with computers and has asked for easy-to-use features. Which version of Windows 10 do you recommend?
a. Windows 10 Home
b. Windows 10 Enterprise
c. Windows 10 Pro
d. Windows 10 Education

A

a. Windows 10 Home

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the minimum activation threshold when using KMS with Windows 10?
a. 15
b. 10
c. 20
d. 5
e. 25

A

e. 25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which type of license has the product key embedded in firmware?
a. OEM
b. MAK
c. FPP
d. Volume licensing
e. KMS

A

a. OEM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

You are installing a computer to run a nuclear reactor management system. The software lists Windows 10 as a requirement. To ensure that future feature updates do not impact the stability of the software, you should consider what type of Windows 10 installation?
a. Windows 10 Enterprise
b. Windows 10 Pro
c. Windows 10 Enterprise LTSC
d. Windows 10 Core

A

c. Windows 10 Enterprise LTSC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

To use KMS or Active Directory-based activation, you need to configure all Windows 10 computers with the same key. True or False?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Application windows can be docked to the sides and corners of the screen using a feature called _____.
a. Virtual Desktop
b. Peek
c. Docker
d. Snap
e. Shake

A

d. Snap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Your workstation is running Windows 10 Pro, and you decide to share a folder on your computer. Twenty-two people in your office are trying to connect to that folder at the same time over the network. The first 20 people can connect, but the other two cannot. To fix this, you could _____.
a. restart your computer
b. make sure the network card is using WDF device drivers
c. buy a computer, software, and licenses to run Windows Server 2016
d. None of the answers is correct

A

c. buy a computer, software, and licenses to run Windows Server 2016

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A new company will have 40 workstations in one building sharing a single network. All users must be able to share files and printers with one another. Access to shared information must be secure and simple to administer. The best technology for this system is _____.
a. people to people
b. workgroups
c. Windows Peer-to-Peer Networking
d. domain networking

A

d. domain networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which Settings category allows you to control whether apps can access your location?
a. Network & Internet
b. Devices
c. System
d. Privacy
e. Accounts

A

d. Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Hybrid sleep is a combination of which ACPI power states? (Choose two.)
a. S3
b. S4
c. S5
d. G3
e. S0

A

a. S3
b. S4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which tasks can you accomplish using the Services administrative tool? (Choose all that apply.)
a. Stop a service.
b. Configure a service to start automatically.
c. Configure the credentials for a service.
d. Schedule the time when a service will start.
e. Configure the dependencies for a service.

A

a. Stop a service.
b. Configure a service to start automatically.
c. Configure the credentials for a service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which of the following are found in Administrative Tools? (Choose all that apply.)
a. Event Viewer
b. Computer Management
c. Task Scheduler
d. Installed Programs
e. Windows Memory Diagnostic

A

a. Event Viewer
b. Computer Management
c. Task Scheduler
e. Windows Memory Diagnostic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which snap-ins are available in Computer Management? (Choose all that apply.)
a. Device Manager
b. Services
c. Folder Options
d. Task Scheduler
e. Security Configuration Management

A

a. Device Manager
b. Services
d. Task Scheduler

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

A(n) ____________ is software used to manage communication between hardware components and Windows 10.

A

device driver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

You can use the Get-Member cmdlet to view the properties available for an object. True or False?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Modern Standby puts the computer in which ACPI power state?
a. S4
b. S3
c. S0
d. G3
e. S5

A

c. S0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

When you view optional features in Settings, dism, and Get-WindowsOptionalFeature, they all show the same list of optional features. True or False?

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

The primary purpose of a screen saver is to prevent screen burn-in. True or False?

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

A(n) ____________ is a type of Windows application that runs in the background without user intervention.

A

service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

To find a list of hardware components certified to run on Windows 10, you should consult the Hardware Compatibility List. True or False?

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Which multiple monitor display mode should you select when you are using each monitor for different tasks?
a. Duplicate
b. Second screen only
c. Extended
d. PC only
e. Office workspace

A

c. Extended

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Which tool can you use to create reports about power management?
a. Device Manager
b. Powerrpt.exe
c. System Information
d. Powercfg.exe
e. Create-PowerReport

A

d. Powercfg.exe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Which requirements must be met for display adapters in Windows 10? (Choose all that apply.)
a. The computer is certified as “Designed for Windows 10.”
b. A minimum of 256 MB of RAM on the video card is required.
c. Support for WDDM is required.
d. Do not use Windows 10 Starter Edition.
e. Support for DirectX 9 is required.

A

c. Support for WDDM is required.
e. Support for DirectX 9 is required.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Which of the following accurately describe the administrative tools available in Control Panel? (Choose all that apply.)
a. You can manage device drivers.
b. You can change power options.
c. You can schedule tasks.
d. Most are MMCs.
e. You can change the screen resolution.

A

a. You can manage device drivers
c. You can schedule tasks.
d. Most are MMCs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

You can build a customized MMC console by adding ________ to the console.

A

snap-ins

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Which of the following is used by apps to connect to databases?
a. RPC
b. SQL
c. DB sources
d. ODBC

A

d. ODBC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Which tasks can you perform in Device Manager? (Choose all that apply.)
a. Disable devices.
b. Determine which devices do not have a driver loaded.
c. Roll back a device driver.
d. View hardware resource configuration.
e. Install new hardware.

A

a. Disable devices.
b. Determine which devices do not have a driver loaded.
c. Roll back a device driver.
d. View hardware resource configuration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

With a signed device driver, which of the following can Windows 10 do? (Choose all that apply.)
a. Determine if a driver has been modified.
b. Automatically download updates.
c. Determine if a driver has been adequately tested.
d. Determine if the publisher is valid.
e. Determine if the driver is 32-bit or 64-bit.

A

a. Determine if a driver has been modified
d. Determine if the publisher is valid.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

The ____________ group becomes a member of the Administrators local group when a Windows 10 computer joins a domain.

A

Domain Admins

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

After you set a PIN for an Azure AD account on your laptop, that PIN can be used only on your laptop. True or False?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Which user management tool is required to assign a logon script to a user?
a. User Accounts in Control Panel
b. Advanced User Accounts applet
c. Local Users and Groups MMC snap-in
d. Advanced Users and Groups MMC snap-in

A

c. Local Users and Groups MMC snap-in

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Which profile is copied to create a profile for new user accounts?
a. Blank
b. Public
c. Default
d. New
e. Default User

A

c. Default

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Which security feature can you enable to lock computers that are left unattended?
a. Windows Hello
b. Secure sign-in
c. Dynamic lock
d. Fast user switching
e. A security key

A

c. Dynamic lock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

How do you reset the password for a Microsoft account?
a. A local administrator can reset the password in the User Accounts applet in Control Panel.
b. A local administrator can reset the password in Accounts settings.
c. One can reset the password by using a password reset disk.
d. The user needs to reset the password on the Microsoft website for Microsoft accounts.
e. A local administrator can reset the password by using the Local Users and Groups MMC snap-in.

A

d. The user needs to reset the password on the Microsoft website for Microsoft accounts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Which profile is merged into each user profile when the user is signed in?
a. Default User
b. New
c. Public
d. Blank
e. Default

A

c. Public

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Which sign-in method requires users to press Ctrl+Alt+Delete before signing in?
a. Automatic sign-in
b. Fast user switching
c. Assigned access
d. Secure sign-in

A

d. Secure sign-in

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Which characters are not allowed in user account names? (Choose all that apply.)
a. $
b. \
c. 1
d. *
e. !

A

b. \
d. *

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

A roaming profile is located on a network server. True or False?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Because user names are case sensitive, you can use capitalization to ensure that they are unique. True or False?

A

False

52
Q

Which characteristics apply to the Administrator account? (Choose all that apply.)
a. It cannot be renamed.
b. It can be locked out.
c. It has a blank password by default.
d. It is visible on the sign-in screen.
e. It cannot be deleted.

A

c. It has a blank password by default.
e. It cannot be deleted.

53
Q

Each user account is assigned a(n) ____ to ensure that security is kept intact if the account is renamed.

A

SID

54
Q

In a domain-based network, each server authenticates users by using the SAM database. True or False?

A

False

55
Q

Which sign-in method allows multiple users to have applications running on the computer at the same time?
a. Fast user switching
b. Assigned access
c. Secure sign-in
d. Automatic sign-in

A

a. Fast user switching

56
Q

Standard users are members of which built-in local group?
a. Users
b. Guests
c. Remote Desktop Users
d. Administrators

A

a. Users

57
Q

Local user accounts are stored in the SAM database. True or False?
a. True
b. False

A

True

58
Q

Because the initial user account created during installation is a member of the Administrators group, it has all the characteristics of the Administrator account. True or False?

A

False

59
Q

Which sharing method should you recommend if a user wants to configure share and NTFS permissions for another user that wants to access a folder on their computer in a single simple process?
a. Grant access to
b. Public folder sharing
c. Create A Shared Folder Wizard
d. Advanced sharing

A

a. Grant access to

60
Q

The number of physical disks required to implement three-way resilience for a Storage Spaces volume is _____.
a. 5
b. 3
c. 2
d. 7
e. 1

A

a. 5

61
Q

An NTFS partition has disk quotas enabled. You would like to run a weekly report that summarizes how much space each user is consuming. The _____ utility allows you to review quota details from the command line.
a. fsutil
b. get-diskquota
c. convert
d. dsquota
e. diskpart

A

a. fsutil

62
Q

Upon opening the Disk Management console, you notice a disk whose status is reported as Foreign Disk. This is most likely because _____.
a. the disk must be initialized
b. the disk was moved from another computer
c. the disk has been corrupted
d. the disk is shared on the network

A

b. the disk was moved from another computer

63
Q

A user has been given Full Control permission to a shared folder. The user has been given Modify permission at the NTFS level to that folder and its contents. What is that user’s effective permissions to that folder when they access it through the shared folder from another computer?
a. Modify
b. Full Control
c. No access
d. Read

A

a. Modify

64
Q

The _____ file system is the only one that supports file compression in Windows 10.
a. FAT32
b. ReFS
c. FAT
d. NTFS

A

d. NTFS

65
Q

The preferred technology to set up disk storage with mirrored fault tolerance for a user’s backup data is _____.
a. Storage Spaces
b. hardware-based RAID 1
c. dynamic disks
d. hardware-based RAID 5
e. basic disks

A

a. Storage Spaces

66
Q

What is the most accurate way to view all the shares on your system?
a. Use the Show me all the files and folders I am sharing link.
b. View the shares in Computer Management.
c. Browse your computer on the network.
d. View the shares in the Network and Sharing Center.
e. Use the Show me all the shared network folders on this computer link.

A

b. View the shares in Computer Management.

67
Q

A user checks the free space in a folder on their local computer, Y:\BusReports, and notices that 3 GB of disk space is reported as available. When the user checks free space in Y:\BusReports\Archive, he notices that 50 GB of disk space is reported as available. The difference in available disk space is probably because the folder Y:\BusReports\Archive is _____.
a. compressed
b. dynamic
c. a mount point
d. archived
e. encrypted

A

c. a mount point

68
Q

Which type of startup firmware best supports Windows 10 with regard to device operation and management?
a. BIOS
b. GPT
c. MBR
d. UEFI

A

d. UEFI

69
Q

A VHD has been created using the Disk Management utility. Before the newly created VHD can be used to store files, it must be _____.
a. configured as a dynamic disk
b. initialized
c. detached
d. set to MBR partition style
e. set to GPT partition style

A

b. initialized

70
Q

A user is given Read permission to a file stored on an NTFS-formatted volume. The file is then moved to a folder on the same NTFS-formatted volume, where the user has been given Modify permission to that folder. When the user signs in to the computer holding the file and accesses its new location via a drive letter, what is the user’s effective permission to the file?
a. No access
b. Read
c. Modify
d. None of the answers is correct.
e. Full Control

A

b. Read

71
Q

Which sharing method does not allow you to pick the folder that is being shared?
a. Create A Shared Folder Wizard
b. Simple sharing
c. Public folder sharing
d. Advanced sharing

A

c. Public folder sharing

72
Q

Windows 10 supports locally encrypted files stored on these types of partitions. (Choose all that apply.)
a. ReFS
b. FAT32
c. FAT
d. NTFS

A

d. NTFS

73
Q

You have just plugged a USB portable hard drive into an older laptop and the disk has not appeared as available. You are concerned that the hard disk controller hardware has not been recognized by the computer. Which utility would you use to verify that the controller is functioning correctly?
a. None of the answers is correct.
b. Device Manager
c. Disk Management console
d. DiskPart
e. USB Management console

A

b. Device Manager

74
Q

A user is given Read permission to a file stored on an NTFS-formatted volume. The file is then moved to a different folder on a different NTFS-formatted volume where the user has been given Full Control permission to that folder. When the user signs in to the computer holding the file and accesses its new location via a drive letter, what is the user’s effective permission to the file?
a. Full Control
b. Read
c. None of the answers is correct.
d. Modify
e. No access

A

a. Full Control

75
Q

A file is currently compressed in its local file system. For security reasons, the file is required to be encrypted. The file can be both compressed and encrypted. True or False?

A

False

76
Q

A user is given Read permission to a file stored on an NTFS-formatted volume. The file is then moved to a different folder on a different NTFS-formatted volume where the user has been given Modify permission for that folder. The file is then moved to a folder on a FAT32-formatted volume. When the user signs in to the computer holding the file and accesses it via a drive letter, what is the user’s effective permission to the file?
a. It will lose its permissions.
b. Read
c. Modify
d. Change
e. Full Control

A

a. It will lose its permissions.

77
Q

Which of the following options in the Settings window must be selected to view speech recognition settings?
a. System
b. Personalization
c. Apps
d. Devices

A

c. Apps

78
Q

You are configuring sharing options for the Public folder on a Windows 10 computer. In Advanced sharing settings in the Network and Sharing Center, you enable the option Turn on sharing so that anyone with network access can read and write files in the Public folders.

Which of the following is a valid observation if you choose the option Turn on password protected sharing?
a. Network users can access the shared folder by using a local user account and not a domain user account.
b. Anyone can access the information in the Public folder, even if they do not have a valid user account on the sharing computer.
c. You can restrict access to the shared Public folder to valid user accounts, but you cannot select which user accounts have access.
d. Network users do not need to sign in to the sharing computer to access the contents of the Public folder.

A

c. You can restrict access to the shared Public folder to valid user accounts, but you cannot select which user accounts have access.

79
Q

What is used to configure data sources for applications that require access to a database?
a. ODBC
b. Event Viewer
c. iSCSI Initiator
d. Memory Diagnostics Tool

A

a. ODBC

80
Q

Which of the following tabs in the properties window of a user account can be used to add the user account to a group?
a. General
b. Account name
c. Profile
d. Member Of

A

d. Member Of

81
Q

Which feature in Windows 10 allows the user to create multiple desktops that can host different open windows?
a. Windows Cardspace
b. Virtual Desktop
c. Open Desktop
d. Windows Manager

A

b. Virtual Desktop

82
Q

Maya, a graphic designer, has many files stored on her laptop and the hard drive is running out of space. She decides to move some of these files to another storage device. She plugs in an SSD into the USB port, transfers some of the older files to it, and unplugs the SSD.

Which of the following disk technologies does the SSD exemplify?
a. Multiple disks as one logical disk
b. Virtual hard disk
c. Internal disk
d. External disk

A

d. External disk

83
Q

Which part of the motherboard in your computer is used to store encryption keys and certificates?
a. TPM
b. NAP
c. EFS
d. NTFS

A

a. TPM

84
Q

Jimmy downloaded a game from the Internet and installed it on his Windows 10 system. A couple of days after the installation, his computer’s performance degraded drastically. Assuming that the game had slowed it down, he uninstalled the game and used software to get rid of residual files. Despite this, his computer’s performance did not improve. Inspecting the Resource Monitor revealed that the Memory and CPU were running close to 100% capacity. He suspects that the computer is infected with malware.

Which of the following scans would you recommend to Jimmy?
a. Real-time scanning
b. A full scan
c. A custom scan
d. A quick scan

A

b. A full scan

85
Q

As a systems administrator, you are asked to set up an infrastructure that would allow employees to use any computer, and the files that a user stores on one computer should be available on any other computer that he or she signs into.

Which of the following user profiles will you configure for the user accounts?
a. A roaming profile
b. The public profile
c. A mandatory profile
d. The default profile

A

a. A roaming profile

86
Q

Lorena has multiple windows open on her desktop. She wants to minimize all the windows except the currently active window.

Which of the following features of Windows 10 should Lorena use?
a. The Shake feature
b. The Task View feature
c. The Virtual Desktop feature
d. The Snap feature

A

a. The Shake feature

87
Q

Tobias, a system administrator at a pharmaceutical company, uses BitLocker Drive Encryption to encrypt all Windows 10 computers in the organization. Because the computers contain sensitive information, users must enter a PIN to start the system. While this is a useful security feature when the computers are disconnected from the organization’s network, this becomes a hindrance in performing remote maintenance because Tobias cannot start these computers without entering the PIN.

Which of the following tools can Tobias use to overcome this issue?
a. Trusted Platform Module (TPM)
b. BitLocker Network Unlock
c. BitLocker To Go
d. Windows Defender Smartscreen

A

b. BitLocker Network Unlock

88
Q

When is a domain user account required for a scheduled task?
a. When the scheduled task runs on a local system
b. When the task needs to access network resources
c. When the task needs to be configured as an interactive task
d. When necessary permissions are required to run a background task

A

b. When the task needs to access network resources

89
Q

Ariella is viewing the permission settings for a folder, D:\Labs\TestFolder, in the Advanced Security Settings window. She wants to identify where the permission setting was first applied to this particular folder.

Which of the following columns will give her this information?
a. Principal
b. Access
c. Applies to
d. Inherited from

A

d. Inherited from

90
Q

You have bought a new Windows 10 desktop. While exploring your new computer, you notice that some of the visual effects that you expected to see on the computer are not being displayed. You browse the Internet to find out that Windows 10 could have disabled some of these effects as per the computer configuration.

Which of the following options in Control Panel will you choose to enable them?
a. Personalization
b. System and Security
c. Hardware and Sound
d. Programs

A

b. System and Security

91
Q

Identify a difference between a standard user account and an administrator account.
a. A standard user account cannot be deleted, but an administrator account can be deleted.
b. Unlike a standard user account, an administrator cannot be renamed.
c. An administrator account can update device drivers, whereas a standard account cannot.
d. Unlike an administrator account, a standard account can install or uninstall programs.

A

c. An administrator account can update device drivers, whereas a standard account cannot.

92
Q

Raphael, a system administrator, is setting up the password policy for local user accounts. He allows users to reuse a password after they have used 4 different passwords. He also modifies the policy to force users to change their old passwords every 60 days. After some time, he notices that users are modifying their passwords 4 times in a short time span and continuing to use their old passwords. This defeats the purpose of setting up the password restrictions.

Which of the following settings should Raphael modify to control this behavior?
a. Raphael should set the Minimum password length to 10 characters.
b. Raphael should modify the setting to enforce password history.
c. Raphael should set the Minimum password age setting to at least 1 day.
d. Raphael should modify the Maximum password age setting to 60 days.

A

c. Raphael should set the Minimum password age setting to at least 1 day.

93
Q

Identify an administrative tool in Windows 10 that helps in the troubleshooting process.
a. System Information
b. Event Viewer
c. Task Scheduler
d. System Configuration

A

b. Event Viewer

94
Q

The process of taking data and rendering it unreadable is known as which of the following?
a. Decryption
b. Encryption
c. Verifying
d. Signing

A

b. Encryption

95
Q

Which of the following is a command-line utility that can be used to display, change, add, and delete network configuration settings on a computer, including basic and advanced settings?
a. netstat
b. nslookup
c. netsh
d. hostname

A

c. netsh

96
Q

Members of which group are able to monitor performance counters on the computer, but cannot access performance logs?
a. Event Log Readers
b. Performance Log Users
c. Guests
d. Performance Monitor Users

A

d. Performance Monitor Users

97
Q

Chao creates a file YTDReport and places it a folder titled TownHall. Only the Managers group has full control permissions to the TownHall folder. Later, Chao moves this folder to the Presentations folder on the same NTFS volume. The Managers group does not have any explicit permissions to the content in the Presentations folder.

Which of the following is true of this scenario?
a. The Managers group will not be able to modify content within the TownHall folder.
b. Users outside the Managers group will be able to view content within the TownHall folder.
c. Chao will not be able to make further modifications to the YTDReport.
d. The Managers group will have full control permissions to the TownHall folder.

A

d. The Managers group will have full control permissions to the TownHall folder.

98
Q

Which account is the most powerful local user account possible?
a. Installation
b. Guest
c. Administrator
d. Initial

A

c. Administrator

99
Q

Nikita intends to use the folder sharing wizard to create a share named Proposals on her computer, Desktop20. She navigates to the location D:\Sales. There, she right-clicks the Proposals folder and creates the share using the folder sharing wizard. She wants to share this folder with other users in the same workgroup.

Which of the following will allow other users to access the share on Nikita’s computer?
a. D:\Sales\Proposals
b. \Desktop20\Proposals
c. \Desktop20\ D:\Sales\Proposals
d. \Desktop20\Sales\Proposals

A

b. \Desktop20\Proposals

100
Q

Which of the following is considered one of the biggest sources of malware (malicious software)?
a. The Internet
b. A hard disk
c. A router
d. A cloud library

A

a. The Internet

101
Q

Veronica copies an unencrypted file from one partition on her hard drive to an encrypted folder on another partition. From there, she moves the file to a folder on a flash drive.

If the file on the flash drive is encrypted, which of the following must be true?
a. Copying the file to the encrypted folder encrypted the file.
b. Moving the file to the flash drive encrypted the file.
c. The flash drive is a FAT32-formatted volume.
d. The folder on the flash drive is an encrypted folder.

A

a. Copying the file to the encrypted folder encrypted the file.

102
Q

Which of the following statements about domains is true?
a. Only one domain can exist on a network.
b. A computer can be a member of both a workgroup and a domain at the same time.
c. The computer and the domain do not need to be identified by unique names.
d. If a domain user account needs to be removed, it has to be removed only from the domain database on the domain controller and not each domain member computer.

A

b. A computer can be a member of both a workgroup and a domain at the same time

103
Q

Identify the default settings that can be used to control the methods used for encryption in IPSec connections.
a. Data protection
b. Authentication method
c. Exempt ICMP from IPSec
d. Key exchange

A

a. Data protection

104
Q

Which of the following technologies combines selected physical disks into a managed logical group called a storage pool?
a. Volume disks
b. Dynamic disks
c. Storage Spaces
d. Basic disks

A

c. Storage Spaces

105
Q

Talal, an IT administrator, sets up a KMS server in his organization to enable KMS activation of Windows 10 licenses. The organization buys 20 new computers with generic volume license keys (GVLK) configured. Two days after the purchase, Talal tries to activate these 20 computers using the KMS server, but the licenses are not activated.

Which of the following is a reason for the activation failure?
a. A KMS activation is only possible after 180 days of the purchase.
b. A KMS server cannot activate Windows 10 on computers with generic volume license keys.
c. A KMS is only possible when the client computers are connected to the Internet.
d. A KMS server has a minimum activation threshold of 25 instances for Windows 10

A

d. A KMS server has a minimum activation threshold of 25 instances for Windows 10

106
Q

A firm purchases five hundred computers for its new office. A system administrator installs Windows 10 on all the computers. The administrator wants all the computers in the new office to have a consistent configuration.

Which of the following features included in Windows 10 would be appropriate to complete this task?
a. Multiple Activation Key
b. Group Policy
c. Application programmer interface
d. Automatic updates

A

b. Group Policy

107
Q

Which type of network consists of multiple Windows computers that share information, but no computer on the network serves as an authoritative source of user information?
a. peer-to-peer
b. server-based
c. domain-based
d. centralized

A

a. peer-to-peer

108
Q

What type of encryption algorithm uses two related, but unique, keys to encrypt and decrypt data?
a. Hashing
b. Signing
c. Asymmetric
d. Symmetric

A

c. Asymmetric

109
Q

After too many sign-in attempts, one of your colleagues has been blocked from using her Windows 10 user account. As a systems administrator, you need to help resolve this issue.

How will you help her sign in using the computer management administrative tool?
a. By selecting the User cannot change password option
b. By deselecting the Account is locked out option
c. By unchecking the Account is disabled option
d. By selecting the Password never expires option

A

b. By deselecting the Account is locked out option

110
Q

Which policy controls password characteristics for local user accounts?
a. Account Lockout
b. Encryption
c. Password
d. Reset

A

c. Password

111
Q

Which of the following storage space types can only be created with three or more physical disks?
a. Parity
b. Simple
c. Two-way mirror
d. Three-way mirror

A

a. Parity

112
Q

Chieh is assigned the Read permission to a shared folder as user. She is also part of the Marketing group that has List Folder permissions to the shared folder.

What is Chieh’s effective permission to this folder?
a. Read & Execute
b. Modify
c. Write
d. Read

A

a. Read & Execute

113
Q

Which protocol is responsible for responding to discovery requests from other computers?
a. Link-Layer Topology Discovery Responder
b. Microsoft LLDP Protocol Driver
c. TCP/IPv6
d. Link-Layer Topology Discovery Mapper I/O Driver

A

a. Link-Layer Topology Discovery Responder

114
Q

Primewall Informatics is an IT consulting firm that provides IT services to other companies. On one of its projects, the client requires the entire team to use computers with newly installed operating systems. The client wants to retain control over the applications that will be allowed to run on these computers.

Which of the following editions of Windows 10 should Primewall choose?
a. Windows 10 Enterprise
b. Windows 10 Home
c. Windows 10 Pro for Workstations
d. Windows 10 Pro Education

A

a. Windows 10 Enterprise

115
Q

Samantha is conducting a presentation on hardware and software troubleshooting. While she is conducting the presentation using a projector screen, one of her colleagues is working on another task on her laptop. During the presentation, the slides keep moving back and forth from the screen.

Can you identify the configuration issue that is likely causing this problem?
a. The displays are probably configured using the Extended option.
b. The screen settings were set to Second screen only.
c. The colleague might have changed the display setting to PC only.
d. Samantha might not have changed the default option when connecting to the projector.

A

a. The displays are probably configured using the Extended option.

116
Q

Which security process records the occurrence of specific operating system events in the Security log?
a. Hashing
b. Filtering
c. Encrypting
d. Auditing

A

d. Auditing

117
Q

Which IP utility is used to display response times for every router on the path to the destination?
a. tracert
b. route
c. ping
d. arp

A

a. tracert

118
Q

Karen has installed a new router for her home network. She connects her Windows 10 computer and smartphone to the Wi-Fi to access the Internet. The next day, when she tries connecting to the Internet, she gets the error message “Check your Internet connection and try again.”

Which of the following should Karen do first to troubleshoot the issue?
a. Restart the router first, and then the computer
b. Change the SSID of the wireless access point
c. Check if the wireless radio on her computer is turned on
d. Activate Airplane mode on her computer

A

c. Check if the wireless radio on her computer is turned on

119
Q

You must right-click the disk name in Disk Management and select which of the following from the menu to initiate the import process?
a. Import Foreign Disk
b. Foreign Disk
c. Unknown Disk
d. Corrupt Disk

A

a. Import Foreign Disk

120
Q

You have created accounts for five people on a Windows 10 computer. They are able to sign in, work on files, and save them; however, they are not able to install new software on the computer.

Which of the following groups do these accounts belong to?
a. Users
b. Device Owners
c. Power Users
d. Administrators

A

a. Users

121
Q

For security reasons, MedCorp, a pharmaceutical company, blocks all inbound connections to a proprietary program installed on its employees’ computers through a Group Policy. One of the employees, to override this rule, creates a rule on a local computer that allows all inbound connections to the program.

Will the employee be successful in his attempt?
a. No, security rules cannot be created on local computers.
b. Yes, all the inbound connections will be allowed.
c. No, only the Group Policy-based rules will be effective.
d. Yes, the local rule will override the rule enforced by the company.

A

c. No, only the Group Policy-based rules will be effective.

122
Q

Cryopact, a research laboratory, has distributed laptops to its employees. The employees can access work files even when they are outside the office and collaborate with the office network through the services available in Office 365.

Which of the following Windows 10 networking models is Cryopact most likely using?
a. Azure AD join
b. The domain model
c. The workgroup model
d. Active Directory

A

a. Azure AD join

123
Q

Joanna, a graphic designer at ChromaStage, has an application installed on her UAC-enabled Windows 10 system that was designed for an older version of Windows. Some of the application’s features require administrative privileges. When she tries running the application, the application fails to run and generates an error instead.

If Joanna’s account already has administrative privileges, what can she do to resolve this issue?
a. She should sign in with another user account that has administrative privileges.
b. She should use the Application Compatibility Toolkit to resolve the issue.
c. She should add an entry in the application manifest to trigger the privilege elevation prompt.
d. She should sign in with a user account that has standard user privileges.

A

b. She should use the Application Compatibility Toolkit to resolve the issue.

124
Q

Which of the following illustrates the use of a domain network?
a. A group policy setting is used to update the settings of all computers in the network.
b. Michelle is able to manually connect her computer to the network.
c. Raja is not able to view the users connected to the network.
d. The network is assigned the default location type when new computers are connected.

A

a. A group policy setting is used to update the settings of all computers in the network.

125
Q

Oshane is configuring security settings on his computer. Recently, his friend’s computer was attacked by malware that encrypted data on all the hard disks and demanded a cryptocurrency ransom to decrypt this data.

Which of the following options in Windows 10 is the best option to help Oshane avoid a similar situation?
a. Windows Defender Application Guard
b. Controlled folder access
c. Secure boot
d. Windows Defender Smartscreen

A

b. Controlled folder access

126
Q

A manufacturing company has bought a new batch of computers that run on a Windows 10 operating system. As the systems administrator, Michael needs to check if the computers support Modern Sleep.

What cmdlet should Michael use for this purpose?
a. powercfg.exe
b. Get-Help
c. Get-service
d. ipconfig.exe

A

a. powercfg.exe