Win 10 Exam 2 Study Ch 8-15

Which of the following is the net effect of the following combination of share and NTFS permissions when the share is accessed over the network?

Members of the Sales group will be able to edit content and delete files.

Which of the following steps begins the process of modifying the default homegroup sharing configuration?

Select one of your shared libraries in File Explorer and click Share in the toolbar.

Which of the following best describes how to turn on Public folder sharing?

Enable the feature by opening the Network and Sharing Center and then enabling the appropriate feature in Advanced Sharing Settings.

The hardware that actually produces hard-copy documents is called a _____.

Print device

In Windows, a _________ is the software interface through which a computer communicates with a print device.

Printer

Which of the following is not a basic printer permission?

Take ownership

Which basic printer permission should be granted to a user to be able to pause, resume, restart, and cancel his own print jobs as well as the print jobs of others?

Manage documents

Which of the following printer-related terms refers to the actual physical hardware that prints data?

Print device

With one of the following network printing configurations, the print devices do not need to be attached to computers; instead, they can be connected directly to the network. Identify the network printing configuration described.

Network-attached printing

Which printing configuration makes the computer with the locally attached print device function as a print server?

Locally attached printer sharing

For users at home, which file sharing is most likely the simplest to set up and use?

Homegroup sharing

Which permissions are assigned directly to a file or folder?

explicit

Which of the following is the minimum permission needed to take ownership of a file or folder?

Full Control

Which Windows feature allows an administrator to control the amount of disk space that is made available to each user?

Disk quotas

When configuring disk quotas using Group Policy, which of the following must administrators be aware of when configuring the default and warning levels in their quotas?

The limits will only apply to users who have never written data to the volumes in scope

Windows 10 provides many emulation modes for older versions of Windows. Which of the following modes is not available to select from?

Windows 2000

In Windows 10, which of the following is used to uninstall a program?

Open Control Panel Programs and Features

A widget program automatically starts up when you turn on the computer. However, this program is consuming too many resources. Which of the following actions stops this program from starting during bootup?

Using Task Manager to disable the startup program

Which of the following can be used to deploy Windows apps via a private store that would be available only to corporate users?

Windows Store for Business

Which of the following programs can be installed via group policy?

.msi files

Which of the following tools enables users to connect to a remote computer, including servers with no interaction required from the remote computer, so that they can interact with the Windows desktop and applications?

Remote Desktop

How many inbound Remote Desktop connections are allowed by Windows 10?

One

Which of the following ports are used by Remote Assistance and Remote Desktop?

TCP 3389

Which of the following troubleshooting tools enables you to connect to a user's remote computer, view and interact with the user's screen, and chat with the user?

Remote Assistance

Which of the following tools requires an invitation?

Remote Assistance

How do you connect to the Remote Desktop administrative session?

Use the mstsc /admin command

Which Remote Assistance option requires Peer Name Resolution Protocol (PNR) and IPv6?

Use Easy Connect

Which service enables administrators to execute a command on remote computers using Windows PowerShell or the Windows Remote Shell command-line programs?

Windows Remote Management

Which of the following allows you to run PowerShell commands on a remote computer?

PowerShell Remoting

By default, when will Windows install software updates?

Daily at 3:00 A.M.

Which of the following command-line commands can be executed to force a computer to contact its configured WSUS server immediately?

wuauclt /detectnow

Which of the following names is given to software updates that fix a specific problem addressing a critical nonsecurity bug?

Critical Updates

Which of the following names is given to software updates that contain a tested set of cumulative updates?

Cumulative patch

Which of the following allows you to receive early builds of Windows?

Windows Insider Preview

Which of the following update scenarios defer updates for four months after Microsoft makes the updates available to the public?

Current Branch for Business servicing

To examine performance correctly, you must establish a performance baseline. When is this task performed?

during normal usage

Which of the following statements is true of Task Manager?

Task Manager can indicate when you might have a bottleneck.

Which of the following terms is used to identify when a program is being executed?

process

Resource Monitor is a powerful tool for understanding how your system resources are used by which of the following system consumers?

processes and services

In the Windows Defender console, in which of the following locations will you find items that were not allowed to run but were not removed from the computer?

Quarantined items

Which type of Windows Defender scan uses signature detection methodology and heuristics to monitor and catch malware behavior as files are being accessed?

A real-time scan

Which type of Windows Defender scan checks all files on your disks and running programs?

A full scan

Which type of Windows Defender scan checks only the locations you specify?

A custom scan

Which type of Windows Defender scan checks only the areas that are most likely to contain malware?

A quick scan

The Reliability Monitor provides a range of numbers to help you evaluate the reliability of a computer. What is the name of this range of numbers?

stability index

Which of the following programs is used to view the Windows logs?

Event Viewer

Which of the following tasks can be performed by using the Event Viewer MMC snap-in?

You can save useful event filters as custom views that can be reused.

Event Viewer is essentially which type of tool?

It is a log viewer tool.

Event Viewer allows you to collect events from remote computers and store them locally. By what name is this collection of events known?

event subscription

Which of the following performance indicators can indicate when your CPU is over capacity and must be replaced?

%Processor Time

Which Windows 10 recovery option is considered the most complete because the computer is set back to its original state after the recovery completes?

PC Reset

Which of the following items is not retained after a PC Refresh?

Windows Firewall settings

How often will Windows automatically create a system restore point if the user doesn't otherwise create one?

Every 7 days

Which recovery method enables you to retain your personal data, Windows Store apps, and basic settings while resetting Windows back to a good working state?

PC Refresh

Which recovery method helps users boot into an environment to get them back into the system so they can begin the troubleshooting process?

Windows 10 File Recovery drive

Which recovery method can be used to recover settings and registry data but not personal data?

System Restore

Windows Backup and Restore is now known as which of the following in Windows 8 and 10?

Windows 7 File Recovery

Which recovery method allows users to back up their personal files to an external drive or network share without administrative assistance?

File History

Which of the following statements about File History is incorrect?

File History can back up your files to the cloud.

By default, how long does File History keep your saved versions in the backup location?

Forever

Digital certificates, smart cards, picture passwords, and biometrics are used to perform which of the following actions?

Authentication

Which of the following items are not supported as a method of authentication in Windows 10?

One-time passwords

Generally speaking, which of the following password conditions is not considered to be part of a strong password for a corporation?

Is also used for online accounts

How does the TPM chip work?

It encrypts private keys stored in the file system.

Where are user accounts stored for computers that are in a workgroup?

Security Accounts Manager

Which of the following is used to find computers, users, and other resources throughout an Active Directory forest?

Global Catalog

Workgroup computers use which authentication protocol when granting resource access?

NTLM v2

Which authentication protocol is used when authenticating to a server that belongs to a different Active Directory forest?

NTLM v2

Which of the following is not an allowed gesture for a picture password?

Arcs

When configuring two-factor authentication using digital certificates in Windows 10 on hardware with TPM chips, which of the following methods is the most cost effective and secure?

Using virtual smart cards

Which of the following basic security components is used to support virtual smart cards?

Trusted Platform Module

Which of the following statements best describes how Password Settings Objects (PSOs) should be assigned to users?

You should assign PSOs to a global security group and add users to the group.

When visiting websites, users are automatically logged on. However, if other people use the same profile, a user might not want to automatically log on. Which of the following statements best describes how a user can delete the credentials used in the aut

Using Credential Manager

Which of the following is used to register a nondomain smartphone or tablet in Active Directory, which installs a certificate on a device so that it can secure single sign-on mechanism?

Device Registration Service

Which term refers to a method used to provide proof that a security principal is the source of data, an action, or a communication?

Nonrepudiation

Which term refers to preventing people from reading information they are not authorized to read?

Confidentiality

Which term refers to the process of determining what an authenticated security principal can do?

Authorization

Which term refers to the ability to guarantee that the information has not been arbitrarily changed?

Integrity

Why are account lockout policies put into place

To enforce security standards

Which of the following provides biometric authentication that uses a user's face, iris, or fingerprint to unlock devices?

Authentication

Which of the following is used provides two-factor authentication that consists of an enrolled device and Windows Hello or a PIN?

Microsoft Passport

Which of the following is required by Device Guard and Credential Guard in order to operate?

Virtual secure mode

Which program runs in the background on a Windows system while providing a function or network application?

Services

Which of the following allows you to manage services?

Computer Management console

Which account provides extensive privilege to the local computer but does not require a password?

Local System account

Which of the following programs allows you to enable Safe Mode during the next boot up?

System Configuration Utility

Which of the following can be used to start a program at a certain time?

Task Scheduler

Which program allows you to create Windows PowerShell scripts easier than if you were using a basic text editor?

Windows PowerShell Integrated Scripting Environment (ISE)