Supporting Windows OS Exam 2

How many IDE controllers can a virtual machine have?

2

What is a requirement for booting a virtual machine from a network to install an operating system?

Legacy network adaptor

Which Hyper-V client utility is used to convert a VHD into a VHDX format?

Edit Disk

Which of the following allows a virtual hard disk size of up to 64 TB?

VHDX

Which of the following is a requirement for using the VHDX format? (Choose all that apply.)

Windows Server 2012 R2 AND Windows 8.1

Which of the following is NOT a valid integration service in Hyper-V client?

Application integration

Which of the following is NOT a virtual network adaptor advanced feature?

Virtual machine queue

Which of the following statements about the Virtual Switch Manager in Hyper-V client is NOT true?

The Private virtual switch is the default type when creating a new switch.

Which of the following virtual hard disk types can be used to reduce physical hard disk storage in a production environment?

Dynamically expanding

Which VHD type is NOT recommended for use in a production environment? (Choose all that apply.)

Differencing

Computers with link-local addresses, that do not have access to a DNS server, use which protocol?

Link Local Multicast Name Resolution

In which layer of the OSI model would packet acknowledgment, error correction, and flow control services typically be handled?

Transport Layer

What kind of IP address must a system have to be visible from the Internet?

Registered

What subnet mask would you use when configuring a TCP/IP client with an IPv4 address on the 172.16.32.0/19 network?

255.255.224.0

Which of the following are true statements regarding IPv4 and IPv6 addressing? Select all that apply.

IPv6 addresses are 128 bits in length. AND IPv4 addresses are 32 bits in length.

Which of the following is an automatic tunneling protocol used by Windows operating systems that are located behind NAT routers?

Teredo

Which of the following is the IPv6 equivalent to a private IPv4 address?

Unique local unicast address

Which of the following is the primary method for transmitting IPv6 traffic over an IPv4 network?

Tunneling

Which protocol is responsible for addressing packets at the data-link layer?

Ethernet

Windows 8.1 computers can acquire IP addresses in which of the following ways? Select all that apply.

DHCP, APIPA, and Manual configuration

In which mode would you configure a wireless client to connect through a wireless access point (WAP)?

Infrastructure mode

What type of attack is used to gain access to restricted network resources by impersonating authorized wireless users?

Masquerading

When a wireless network broadcasts this information to potential wireless clients, it appears in the list of available networks in Windows 8.1.

SSID

Which command would you use to view all wireless profiles currently stored on your Windows 8.1 computer?

Netsh wlan show profiles

Which of the following are included in a wireless profile? Select all that apply.

Security type, security keys, encryption type and SSID.

Which of the following represents the correct order that Windows 8.1 uses to prioritize networks?

Ethernet, Wi-Fi and then mobile broadband networks.

Which Windows 8.1 feature would you use to configure a default printer for each network the computer connects to?

Location-aware printing.

You are connected to a wireless network at a local coffee shop and want to make sure the next time you are in range of the network that Windows 8.1 does not automatically connect to it. What should you do before moving out of range of the network?

Right-click the network and then choose Forget this network.

You are currently connected to a mobile broadband network while a Wi-Fi network is within range. Which of the following statements are true on how Windows 8.1 manages these connections in regard to priority? Select all that apply.

The mobile broadband network is preferred for this session only. AND The Wi-Fi network is preferred the next time you are within range of both networks.

You are thinking about purchasing new wireless hardware for your company. Your wireless clients need to connect to a WAP. These clients are sometimes as far away as 50 meters from the WAP but most of the time are within 35 meters. What IEEE Wireless netwo

IEEE 802.11n

By exporting the Windows Firewall policy, you have a file with a .wfw extension that contains _____.

All its rules, including the preconfigured rules and the ones you have created or modified.

Connection security rules require that network traffic allowed through the firewall use which of the following security mechanisms?

Ipsec

In the Windows Firewall with Advanced Security console, while creating a new rule, the Program page specifies whether the ______.

Rule applies to all programs, to one specific program.

What is the primary objective of a firewall?

To protect a network by allowing certain types of network traffic in and out of the system.

When a user attempts to visit an Internet-based web server, what is the default action of the Windows Firewall?

The firewall by default will not block client-initiated network traffic.

Which of the following actions can you NOT perform from the Windows Firewall control panel? (Choose all that apply.)

Create firewall exceptions based on port numbers & Allow a program through the firewall in all three profiles.

Which of the following mechanisms is used most often used in firewall rules to allow traffic onto the network?

Port Numbers

Windows Firewall allows you to create inbound, outbound, and connection security rules for individual servers or systems. How can you do this for multiple systems?

You can create a new GPO and you can import settings from apolicy file created earlier. Then deploy the GPO to other systems on the network.

Windows Firewall Customize Settings contains three profiles (Public, Private, and Domain). What differentiates these profiles from each other?

Public is for servers accessible to unauthenticated users. Private is for inaccessible servers. Domain is for servers accessible only to authenticated users.

Windows Firewall uses three profiles to represent the type of network to which the server is connected. What are the three profiles?

Domain, Private, and Public.

Remote Assistance can provide which of the following benefits to administrative personnel?

Training end users on their local systems. AND Observing a remote user's activities. AND Installing software.

Remote Assistance provides which of the following protective features? Select all that apply.

Client-side control. AND Invotations. AND Interactive connectivity

To receive remote help, the computer running Windows 8.1 can be configured to use Remote Assistance. Where can this setting be configured? Select all that apply.

Using the Group Policy Object Editor snap-in. AND Control Panel > System and Security > Remote settings > Remote tab. AND Control Panel > System and Security > System > Remote settings > Remote tab.

Which command is used to start the Windows Remote Management service from a command prompt?

winrm quickconfig

Which of the following are true statements regarding the capabilities of Remote Desktop connections? Select all that apply.

Communicates with the host computer over RDP. AND Requires a separate license for each connection. AND Allows you to operate the remote computer as if you were sitting at its console. AND Requires that you have an account on the remote computer to access

Which of the following are true statements regarding the use of snap-ins? Select all that apply.

The Windows Firewall can block a snap-in's funcionality. AND A single console can be created that contains multiple instances of the same snap-in (e.g., Event Viewer). AND Not all snap-ins have the ability to connect to a remote computer.

Which of the following can be used to initiate a Remote Assistance session? Select all that apply.

Create and send invitation via file. AND Create and send invitation via email. AND Accept and approve a Remote Assistance connection on the client computer.

Which of the following names are used to describe the person connecting to a client using Remote Assistance? Select all that apply.

Expert AND Helper

Which of the following remote access solutions requires a user to be present at the remote site to allow the connection to be established?

Remote Assistance

Which of the following use Windows Remote Management to execute commands on remote computers? Select all that apply.

WinRS.exe AND Windows PowerShell

A user calls the help desk and asks you why she cannot send print jobs to a shared printer that is using Windows 8.1 as a print server. You determine that the problem is related to the printer permissions. The user cannot send jobs to the printer because

Print

If a user is granted the share permission Allow READ to a folder named Sales and also has the share permission Allow CHANGE to the same folder as part of her membership in the Finance Group. What is her effective permission to the Sales folder? (Choose al

She can execute any program files located in the Sales folder. AND She can delete files and folders in the Sales folder. AND She can create folders, files, and change data in the files in the Sales folder.

In the Windows printing architecture, which of the following are the hardware components? (Choose all that apply.)

Print server AND Print device

Share level permissions provide which of the following levels of access? (Choose all that apply.)

Read, Full Control, AND Change

The primary function of a printer driver is to take printer commands generated by applications and convert them into what format?

Printer Control Language

To share a folder with network users on a public network, you must first open the Network and Sharing Center and do which of the following? (Choose all that apply.)

Enable File and Print Sharing. AND Turn on Network Discovery.

What must you do to create a shared folder called DOCS and hide it from network users?

Append a dollar sign to the name (DOCS$)

Which basic Printer permission is needed to allow a user to cancel all of their documents currently queued on a print device?

Print

Which of the following methods can be used to access OneDirve storage space? (Choose all that apply.)

Through the Web (http://OneDrive.com). AND By using the OneDrive Desktop app. AND Through an Office 2013 application.

Which type permissions apply when you are connecting to a resource locally or across the network?

Share folder permissions.

After setting quota limits on an NTFS volume, you want to be able to monitor how much disk space users are consuming while still allowing them to go over the default quota limit you set for them. Which option must NOT be selected for this to work?

Log event when a user exceeds their quota limit.

In the NTFS permission system, combinations of advanced permissions are also known as __________ permissions.

Basic AND Share

When an audited event occurs, Windows 8.1 writes the event to which log?

Security log

Which of the following computers would restrict you from implementing EFS? Select all that apply.

A computer with an NTFS volume that has been compressed. AND A computer with a hard drive formatted with FAT32 only. AND A computer with a hard drive formatted with FAT only.

Which of the following is key reason for assigning permissions when configuring file and share access?

Improves data security, granting file and share access only to the users and who needs it.

Which of the following is the best description of a security principal?

The network resource receiving permissions.

Which of the following NTFS features is incompatible with EFS encryption?

Compression.

Which of the following statements about effective access is NOT true?

Inherited permissions take precedence over explicit permissions. AND Deny permissions always override Allow permissions.

Which of the following statements about permissions are true?

All of the above.

Which of the following statements is NOT true in reference to resource ownership?

It is possible to lock out a file or folder by assigning a combination of permissions that permits access to no one at all, including the owner of the file or folder.

Which of the following account lockout policy modifications could you make to ensure that user passwords cannot be intercepted by analyzing captured packets?

Disable the Store Passwords Using Reversible Encryption policy.

The built-in local groups on a Windows 8.1 workstation receive their special capabilities through which of the following mechanisms?

User Rights

This Windows element contains a list of users for each permission-protected resource and the degree of access each user has to the resource.

Access control lists (ACL)

When you log on to a newly installed Windows 8.1 computer for the first time, why can you not use the Administrator account?

The Administrator account is disabled.

Which of the following policy modifications would make it harder for intruders to penetrate user passwords by a brute force attack? (Choose all that apply.)

Increase the Account Lockout Threshold value AND Reduce the value of the Minimum Password Age policy

Which of the following provides you with the strongest level of password protection on a computer that contains sensitive data?

A password created using 7 characters including uppercase, lowercase, numerical characters, and symbols.

Which of the following statements are true regarding domain and local user accounts? (Choose all that apply.)

Local user accounts are stored in the Security Account Manager (SAM) database.

Which of the following statements is true?

The user accounts control panel applet can create local users only.

You have set the Account Lockout Duration policy setting to 15 and the Account Lockout Threshold to 3. What would be the result? (Choose all that apply.)

A user will have to wait 15 minutes before Windows 8.1 automatically unlocks their account. AND A user will be allowed 3 invalid logon attempts before they are locked out. AND The user may get locked out due to normal user error during logon.

Your Windows 8.1 computer is currently a member of a workgroup that includes four other Windows 8.1 computers. If you want to access resources on all four of these computers, you must have a user account on how many of them?

4