Win 7 Config Study Guide Assessment Flashcards
What filename extension is applied by default to custom consoles that are created for the MMC? A. .mmc B. .msc C. .con D. .mcn
B. When you create a custom console for the MMC, the .msc filename extension is automatically applied. See Chapter 3 for more information.
You want to create roaming profiles for users in the Sales department. They frequently log on at computers in a central area. The profiles should be configured as mandatory and roaming profiles. Which users are able to manage mandatory profiles on Windows 7 computers? A. The user who uses the profile B. Server operators C. Power users D. Administrators
D. Only members of the Administrators group can manage mandatory profiles. See Chapter 6 for more information.
You want to monitor the CPU, memory, and disk usage on your computer to ensure that there are no bottlenecks. Which MMC snap-in would you load to access System Monitor? A. System Monitor B. Reliability Monitor C. ActiveX Control D. Performance Logs and Alerts
C. Select ActiveX Control in the Add/Remove Snap-in dialog box. Then, from the Insert ActiveX Control dialog box, select System Monitor Control to access the System Monitor utility. You can also access the System Monitor view by opening Performance Monitor. See Chapter 5 for more information.
If you wanted to require that a user enter an Administrator password to perform administrative tasks, what type of user account should you create for the user? A. Administrator user account B. Standard user account C. Power user account D. Authenticated user account
B. You would create a standard user account for the user. Standard users must provide the credentials of an administrator account when prompted by User Account Control (UAC) in order to perform administrative tasks. See Chapter 6 for more information.
You have installed a clean installation of Windows 7 on your computer. You want to create an image of the new installation to use as a basis for remote installs. What Windows 7 utility should you use to accomplish this? A. WDS B. Windows SIM C. ImageX D. Sysprep
C. You can use the ImageX utility to create an image of a Windows 7 installation. After the image has been created, you can prepare the image with a utility such as the System Preparation Tool (Sysprep). The image can then be used for remote installations of Windows 7. See Chapter 2 for more information.
Which of the following statements is true regarding the built-in Administrator account in Windows 7? (Choose all that apply.)
A. The built-in Administrator account does not exist in Windows 7.
B. The built-in Administrator account is disabled by default in Windows 7.
C. The built-in Administrator account has no permissions in Windows 7.
D. The built-in Administrator account is not a member of the Administrators group in Windows 7.
B. The built-in Administrator account is disabled by default in Windows 7. However, it can be enabled through Local Users and Groups or by modifying the Accounts: Administrator Account Status GPO setting. See Chapter 6 for more information.
You have a user with limited vision. Which accessibility utility is used to read aloud screen text, such as the text in dialog boxes, menus, and buttons? A. Read-Aloud B. Orator C. Dialog Manager D. Narrator
D. The Narrator utility uses a sound output device to read onscreen text. See Chapter 4 for more information.
You have just purchased a new computer that has Windows 7 preinstalled. You want to migrate existing users from a previous computer that was running Windows XP Professional. Which two files would you use to manage this process through the User State Migration Tool? A. usmt.exe B. ScanState.exe C. LoadState.exe D. Windows7Migrate.exe
B, C. Windows 7 ships with a utility called the User State Migration Tool (USMT) that is used by administrators to migrate users from one computer to another via a command-line utility. The USMT consists of two executable files: ScanState.exe andLoadState.exe. See Chapter 1 for more information.
You have scheduled a specific program that is required by the Accounting department to run as a scheduled task every day. When you log on as an administrator, you can run the task, but when the scheduled task is supposed to run, it does not run properly. You have already verified that the Task Scheduler task is running. What else should you check?
A. Verify that the task has been configured to run in unattended mode.
B. Make sure the user who is scheduled to run the task has the appropriate permissions.
C. Make sure the time is properly synchronized on the computer.
D. Verify that the Process Manager task is running.
B. If you are using Task Scheduler and your jobs are not running properly, make sure the Task Scheduler service is running and is configured to start automatically. You should also ensure that the user who is configured to run the scheduled task has sufficient permissions to run it. See Chapter 8 for more information.
You are the network administrator for your company. Recently, one of your users in the Accounting department has reported that they were unsure whether a banking website was legitimate or not. You want to configure a utility that will verify whether a website is known to be fraudulent. Which utility should you configure? A. Pop-up Blocker B. RSS Reader C. Phishing Filter D. Add-on Manager
C. Internet Explorer 9 ships with Phishing Filter, which can help verify whether a website is known to be fraudulent or not. Phishing Filter helps to prevent malicious websites from masquerading as a legitimate site in order to obtain your personal or financial information. See Chapter 5 for more information.
You have a user, Jan, who suspects that her Windows 7 computer has been infected with spyware. You remove the spyware from her computer and want to prevent spyware from infecting it in the future. Which of the following Windows 7 utilities should you configure? A. Windows Defender B. Phishing Filter C. Pop-up Blocker D. Windows OneCare
A. Windows Defender is an antispyware program included with Windows 7. It offers real-time protection from spyware and other unwanted software. You can also configure Windows Defender to scan for spyware on a regular basis. See Chapter 6 for more information.
You are configuring power settings on your laptop. You configure the laptop to enter sleep mode after a specified period of inactivity. Which of the following will occur when the computer enters sleep mode?
A. The computer will be shut down gracefully.
B. Data will be saved to the hard disk.
C. The monitor and hard disk will be turned off, but the computer will remain in a fully active state.
D. The user session will not be available when you resume activity on the computer.
B. Sleep mode is a combination of standby mode and hibernation mode. When sleep mode is configured, the user’s session is quickly accessible on wakeup, but the data is saved to the hard disk. Sleep mode is the preferred power-saving mode in Windows 7. See Chapter 4 for more information.
You are using Internet Explorer to access several RSS feeds that you subscribe to. One of the feeds stores only the 10 most recent updates. You want to ensure that the last 100 updates are stored. What should you do?
A. Configure the RSS feed to automatically download attached files.
B. Modify the schedule so that the RSS feed is updated more than once a day.
C. Turn on feed reading view in IE.
D. Modify the archive setting so that the last 100 items are stored.
D. Internet Explorer 9 provides the ability to read and subscribe to RSS feeds. You can configure several options for RSS feeds, such as how often the feed is checked for updates, whether attachments are automatically downloaded, and how many updates are stored for the feed. See Chapter 5 for more information.
What is the CIDR equivalent for 255.255.255.224? A. /24 B. /25 C. /26 D. /27
D. A subnet mask of 255.255.255.224 equals a CIDR of /27. CIDR is the number of on bits. See Chapter 7 for more information.
You are configuring a new Windows 7 computer for a new employee. You configure the new user with a standard user account. Which of the following functions will the new employee be allowed to perform? (Choose all that apply.) A. Install a printer. B. Install network drivers. C. Configure WPA keys. D. Modify the Desktop settings.
A, C, D. Standard users are allowed to perform a variety of tasks, such as install printers, configure wireless keys, and modify their Desktop settings. See Chapter 6 for more information.