Windows OS Quiz 7-12 Answers PDF
Document Details
Uploaded by Deleted User
Tags
Summary
This document comprises a set of Windows OS quizzes covering various aspects of operating systems, including printer drivers, online learning websites, OneDrive, and others. Exam-style questions are presented to test knowledge and understanding of these topics.
Full Transcript
**[Quiz 7:]** **Software that Windows 10 uses to understand and use the features of a printer is known as which of the following?** a\. A shared printer b\. Printer driver c\. Print server d\. Print firewall **You are the administrator at a software consulting firm. A Windows 10 user accesses...
**[Quiz 7:]** **Software that Windows 10 uses to understand and use the features of a printer is known as which of the following?** a\. A shared printer b\. Printer driver c\. Print server d\. Print firewall **You are the administrator at a software consulting firm. A Windows 10 user accesses an online learning website. However, some features of the website, such as pop-up windows, are blocked. You verify that the website is a legitimate website that does not have any malicious software.\ *\ If the user is using Microsoft Edge, what should you do to resolve this issue?\ *** a\. Add the website to the Restricted sites zone. b\. Add the website to the Trusted sites zone. c\. Add the website to the Local intranet zone. d\. Add the website to the Internet zone. **Merwyn\'s laptop has Windows 10 installed on the C drive. He creates a new folder, Work, on the D drive and adds this folder to the Documents library. He then navigates to the Work folder in the Documents library and creates a new Word file.\ *\ Which of the following is true of this scenario?\ *** a\. The Work folder cannot be added to the library because it is not a file share. b\. The Work folder is moved from the D drive to the C drive when Merwyn adds it to the library. c\. The Word file is created in the Work folder on the D drive. d\. The Word file is created in the default save location specified in the library properties. **Lafisa, a scientific research associate, works on sensitive data on her laptop. To protect the data, sensitive information on her laptop is encrypted. She is unable to use Windows search to look for information in these files.\ \ Which of the following Advanced Options in Indexing Options contains a resolution to this issue?** a\. Troubleshooting b\. Index location c\. File Settings d\. Classic search **Windows 10 includes a search functionality that can be used to find files and folders. Which of the following is used to increase the efficiency of searching in Windows 10?** a\. Indexing b\. Profiling c\. Viewing d\. Context researching **Derwin uses OneDrive to back up files from his laptop to the cloud.\ *\ Which of the following circumstances will require Derwin to use the OneDrive website instead of the OneDrive client?\ *** a\. Derwin wants to recover a file that was deleted from OneDrive. b\. Derwin wants to rename a folder that is synced to OneDrive. c\. Derwin wants to change the default synchronization folder for OneDrive. d\. Derwin wants to delete a file from his laptop but not from OneDrive. **Yunha uses Microsoft Edge on her work laptop, home laptop, and smartphone. She wants her saved passwords and favorites that are on her home laptop to be available on her smartphone and work laptop. *Which of the following features in Microsoft Edge should Yunha use in this scenario?\ *** a\. Group Policy settings b\. Profile synchronization c\. Security zones d\. Collections **Which utility can be used by a user with administrative rights in order to stage a driver manually?** a\. pnputil.exe b\. pdriver.exe c\. pinstall.exe d\. xpsprnt.exe **Ariella configures a shared printer on the local network. Ryan logs on to his user account on a Windows 7 computer and installs the shared printer before printing a document. After a few hours, Maya logs on to the same computer using her account and tries to print a document.\ *\ Which of the following is true of this scenario?\ *** a\. Maya needs to install the printer in order to be able to use it to print her document. b\. Maya needs the same administrator privileges as Ryan to install the printer. c\. All prints job will be rendered on the server side, so Ryan did not need to install the printer. d\. Since Ryan has already installed the printer using his account, Maya cannot install it. **Which of the following is a newer browser included with Windows 10?\ ** a\. Safari b\. Google Chrome c\. Internet Explorer 10 d\. Microsoft Edge **What is the name of the cloud-based storage that is automatically included for free when a Microsoft account in created?\ ** a\. WindowsDrive b\. OneDrive c\. Microsoft Cloud d\. Windows Store **Jin enabled Personal Vault on OneDrive and added some important documents to the vault. To prevent anyone else from gaining access to the files, she immediately disabled the vault after adding the files.\ *\ Which of the following is the most likely outcome in this scenario?\ *** a\. Jin will not be able to enable Personal Vault without renewing her OneDrive subscription. b\. All of the files in the vault are removed and cannot be recovered. c\. No one can gain access to the files unless Jin enables the vault again. d\. Only Jin can access the files in the vault by providing authentication information. **[Quiz 8:]** **Running apps in which mode ensures that a poorly written app does not affect system stability?** a\. User mode b\. Service mode c\. Environment mode d\. Kernel mode **normal\"\>Which registry key contains the default registry settings that are copied for new user profiles?** a\..SYSTEM b\..OWNER c\..DEFAULT d\..ADMIN **Which of the following is a cloud-based solution to compatibility issues?** a\. App-V b\. Desktop Analytics c\. Client Hyper-V d\. A virtual desktop **Which of the following is not a precaution you should take before modifying the registry?** a\. Back up the portion of the registry you will be changing before you make any changes. c\. Identify which change actually fixed the problem. d\. Restrict the number of changes made at one time to limit the impact. **Your organization is upgrading all existing computers to the 64-bit version of Windows 10. However, it needs to continue running a Windows XP app on some computers. As a systems administrator, you have been tasked with identifying a solution.\ \ How will you run the legacy app without dedicated resources?** a\. By using Desktop Analytics b\. By changing the compatibility mode to Windows XP c\. By using Client Hyper-V d\. By installing Windows XP on a few computers **As a freelancer, Manyata developed a traditional Win32 app for a client. The client has come back with a request to make the app compatible with Windows 10 in S mode.\ \ How should Manyata address the client\'s request?\ ** a\. She should deploy the app on a domain-based network. b\. She should repackage the app as an MSIX app. c\. She should upload the app to the Microsoft Store. d\. She should distribute the app via Group Policy. **Which of the following terms is used to refer to the individual sections of the registry?** a\. MSIX b\. Registry Editor c\. Registry key d\. Hive **Besides the.NET Framework 4.8, what other version of the.NET Framework does Windows 10 provide as a feature?** a\..NET 3.5 b\..NET 3.0 c\..NET 2.0 d\..NET 2.5 **How can MSI-based apps requiring user input be deployed through Group Policy?** a\. By providing a transform file that the user can input b\. By allowing the app to prompt the user for input c\. By deploying the app to users signed in with administrative privileges d\. By repackaging the app with the necessary input information **Which of the following allows backward compatibility in Windows 10?** a\. Ntvdm.exe b\..NET Framework 3.5 c\. The Universal Windows Platform d\. The Windows registry **Which of the following keys in the HKEY\_LOCAL\_MACHINE contains information regarding device drivers?** a\. SOFTWARE b\. BCD00000000 c\. SYSTEM d\. HARDWARE **Zen Corp. has developed a new word processor. Customers can download the app on a subscription basis. After a new customer purchases a subscription, the app is automatically streamed to the customer\'s computer and installed. Zen Corp. regularly updates the source app installed on its server, which in turn pushes the updates to the customer\'s computer.\ \ Which of the following has the company used to deploy its app?** a\. A virtual desktop b\. The Windows 10 ADK c\. Client Hyper-V d\. App-V **[Quiz 9:]** **Zachary wants to use File History to create regular backups of the data on his laptop. He is using File History for the first time and is unaware of this feature, so he approaches his friend, Leah, who has experience using this feature.\ *\ Assuming that Leah has good knowledge of File History, which of the following is Leah most likely to tell Zachary?\ *** a\. File History can perform a complete system backup. b\. File History cannot back up data to a network location. c\. File History is disabled by default. d\. File History was introduced with Windows 7. **Howard\'s Windows 10 laptop is a few years old. Over time, his laptop has slowed down, causing performance issues, so he decides to use the Reset the PC recovery method to gain some performance improvement.\ *\ If Howard chooses the Keep my files option, which of the following items is unlikely to be retained after the reset?*\ ** a\. Data files b\. Multimedia files c\. Application files in AppData d\. User accounts and profiles **Data Collector Sets organize multiple counters into a single unit. Which type of data can a Data Collector Set monitor to track when system events occur?\ ** a\. Bottleneck trace b\. Configuration c\. Event trace d\. Performance counters **Ablorde, a programmer, installed a new code editor on his laptop. After the installation, he is prompted to restart the laptop. He notices that the code editor has a registry key in the following location: HKEY\_CURRENT\_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\RunOnce.\ *\ What does this most likely indicate?\ *** a\. The code editor will run a configuration routine after the next restart. b\. The code editor will start automatically for all users after a system restart. c\. The code editor will not start automatically for any user. d\. The code editor will start automatically only for the current user whenever the system restarts. **Jordan installs Windows 10 on a laptop with low-end specifications. The laptop does not have a dedicated graphics card as well. In order to improve the performance of Windows 10, he wants to adjust the appearance of Windows by reducing most OS animations.\ *\ Which of the following options in the Performance Options dialog box should Jordan use to achieve this?\ *** a\. He should edit the Processor scheduling option on the Advanced tab. b\. He should change the size of the virtual memory on the Advanced tab. d\. He should select the Adjust for best performance option on the Visual Effects tab. **When a limitation in a single computer system component slows down the entire system, which of the following occurs?\ ** a\. A baseline b\. A crashdown c\. A bottleneck d\. A counterdown **Which utility allows you to visually display the data generated by counters and allows you to select the individual counters you want to review?\ ** a\. Performance Monitor b\. Network Monitor c\. Disk Monitor d\. Resource Monitor **Odilon installs a VPN application on his Windows 10 computer. The application is configured by default to start automatically. This is impacting the boot time on his computer, so he wants to disable automatic startup. The application does not have a setting to disable this, and Odilon is unsure of the mechanism used by the application to start automatically.\ *\ Which of the following tools can Odilon use to prevent the VPN application from automatically starting?\ *** a\. Task Manager b\. Resource Monitor c\. Registry Editor d\. Performance Monitor **Running fewer applications at once is a way to resolve which type of bottleneck?\ ** a\. A processor bottleneck b\. A memory bottleneck c\. A network bottleneck d\. A disk bottleneck **Which processor feature monitors processes to ensure that they do not access unauthorized memory spaces, which is done by various types of malware, to take control of systems?\ ** a\. WEI b\. XPS c\. LOGO d\. DEP **Which Windows 10 feature captures a screenshot each time the user clicks a screen item and saves the screenshots and user actions in a report that can be sent via email or saved to a shared storage location?\ ** a\. Steps Monitor b\. Steps Recorder c\. Event Viewer d\. File Recovery **Trisha is configuring File History for the first time on her computer. She attaches an external hard drive and configures it as the drive for File History.\ *\ Which of the following is most likely to occur in this scenario?\ *** a\. Backup data will be added to the free space on the hard drive. b\. Any files on the hard drive will be overwritten by backup files and folders. c\. Trisha will have to specify a folder that is not at the root of the drive for backup. d\. The hard drive will be formatted before being used by File History. **[Quiz 10:]** **During the installation process for a new device, what are used in order to control how the device driver software is installed?\ ** a\. Device setup classes b\. Hardware IDs c\. HDIDs d\. Device identification strings **Which of the following is not true of Active Directory?\ ** a\. Within Active Directory, Windows servers can be either member servers or domain controllers. b\. It is a single monolithic database with all the information about the network. c\. It uses multimaster replication. d\. It uses the same naming convention for domains and objects contained in these domains as DNS. **To enable centralized management of BitLocker, you need to install which of the following on each computer?\ ** a\. The MBAM agent b\. The WSUS node c\. The UE-V profile d\. The WDS client **Which of the following is a domain controller that holds a subset of the information in all domain partitions?\ ** a\. Domain path b\. The schema partition c\. An organizational unit d\. A global catalog server **As a systems administrator, you have been asked to quicken the domain join process in your organization by allowing domain-joined computers to join offline.\ \ Which of the following actions will you take?\ ** a\. Create the computer accounts and share them with the users b\. Synchronize the time between the Windows computer and domain controller c\. Instruct the users to sign in to their computer using their Microsoft account d\. Create a blob file on the Windows server and import it to the computers **The Group Policy settings used by Windows 10 are contained in which of the following?** a\. A controller object b\. A group object c\. A Group Policy object d\. A Domain Policy object **Which Active Directory component is responsible for authenticating users when they sign in to a workstation?\ ** a\. OUs b\. Domain controllers c\. Forests d\. Trees **When a new device is installed into a Windows 10 computer, the operating system uses a device setup class and which of the following in order to properly install the new device?** a\. An identification service b\. A device identification string c\. A device controller d\. A service string **In Active Directory, which partition holds general information about the Active Directory forest?** a\. The schema partition b\. The domain partition c\. The configuration partition d\. The application partition **Rishi works as a network administrator. He configures the domain-joined laptops in his company to sleep if they are on battery power and idle for more than 20 minutes. Some users, to save battery, change this duration to 10 minutes. However, the next time they restart the laptop, it is automatically configured to sleep in 20 minutes. Which of the following has Rishi likely used to configure the laptops?** a\. A domain controller b\. A Distributed File System c\. Group Policy Preferences d\. Organizational units **Which of the following can be used to create groups to organize users, but on the cloud?** a\. Office 365 Enterprise b\. Active Directory c\. Azure AD d\. Microsoft 365 Enterprise **Which of the following downloads updates from Microsoft Update and stores them in a local datastore, rather than each client computer downloading updates individually?** a\. USMT b\. WSUS c\. PXE d\. WDS **[Quiz 11:]** **An application on Welma\'s computer crashes whenever she tries to save a file that she is working on. To help resolve the issue over the Internet, she contacts Ezekiel from the tech support team. After signing in using his Microsoft Azure AD account, he receives a security code that he sends across to Welma. Welma uses this code to grant Ezekiel access to her computer.** **Which of the following remote assistance tools are Ezekiel and Welma most likely using?** a. Remote Assistance b. MMC Snap-Ins c. Quick Assist d. Remote Desktop **Chao is using a VPN client to access work files via a remote access server. However, her VPN connection to access work files has also made Internet access slow.** **Which of the following is the best solution to optimizing the Internet connection?** a. Use IPv4 instead of IPv6. b. Disable VPN from being used as a default gateway. c. Disable the VPN connection. d. Change the VPN protocol from PEAP-MS-CHAP v2 to PAP. **Guocheng, the IT administrator at Curio Technologies, is evaluating alternatives to using roaming profiles in the organization. He considers configuring folder redirection using Group Policy.** **Which of the following justifies Guocheng\'s decision?** a. He wants user certificates issued by the organization to be stored in Active Directory. b. He wants user profile settings to be synchronized while the user is signed in rather than at sign-in or sign-out. c. He wants to use an Azure AD account to synchronize profile settings to multiple computers. d. He wants to store user profile information on a file server so that it is accessible from any computer. **In Remote Desktop Connection, which tab controls which resources in the local computer are available for the session?** a. The General tab b. The Experience tab c. The Local Resources tab d. The Display tab **Trisha, an IT admin, implements Work Folders to enable data synchronization for users in the sales team in her organization.** **Which of the following is true of this scenario?** a. The Work Folders client cannot be run on an iOS or Android phone. b. The Work Folders client is not available for Windows 7 devices. c. The folder for each user is stored on their individual computers. d. The users are given unique folders for file storage. **When a VPN connection loses connectivity due to a network interruption, which protocol can reconnect automatically once network connectivity is restored using a feature known as VPN Reconnect?** a. IKEv2 b. L2TP c. PPTP d. SSTP **Which of the following best describes Extensible Authentication Protocol (EAP)?** a. A framework that allows multiple authentication methods to be integrated with the sign-in process b. The Microsoft implementation of the WS-Management protocol for remote management c. A Windows 10 feature that synchronizes files from a shared folder to a Windows 10 computer d. One of the easiest protocols to use for a VPN, typically based on a user name and password **You are using Remote Desktop Connection as the RDP client to resolve an issue on a user\'s system. You want to configure the RD Gateway settings.** **Which tab should you use to make the desired change?** a. Advanced b. Experience c. Local Resources d. Display **You can start Remote Desktop Connection from a command prompt by running mstsc.exe. Which option can be used with this command to prevent Remote Desktop Connection from saving information to the local computer?** a. /shadow b. /admin c. /control d. /public **Nanxi wants to switch from using roaming profiles in the organization. After evaluating various alternatives, she decides to proceed with UE-V because it offers several advanced functionalities that are not offered by roaming profiles.** **Which of the following is an example of such functionality?** a. Synchronization can be performed across multiple operating devices using the same operating system. b. Settings are synchronized at sign-in or sign-out rather than while the user is signed in. c. Certificates can be synchronized to user profiles by storing them in Active Directory. d. Synchronization is based on templates for fine-grained control of specific application settings. **You decide to automate VPN deployment in your organization. You want to create an executable file that users can click on whenever they want to create a VPN connection.** **Which of the following deployment methods should you use?** a. Windows PowerShell b. Windows Configuration Designer c. Connection Manager Administration Kit d. Group Policy Preferences **Your organization issues certificates to users for authentication to resources. Because roaming profiles are not implemented, you implement credential roaming to synchronize the certificates to the profile on multiple computers.** **In this scenario, where are the user certificates stored?** a. In the user profile b. In Active Directory c. In Group Policy d. On a file server **[Quiz 12:]** **Which of the following installation methods requires computers to be booted into Windows PE from removable storage and then run the Windows 10 installation from a server?\ ** a\. Image-based b\. Distribution share c\. Local share d\. Removable media **Howard\'s organization purchased laptops with Windows 10 Home preinstalled, and he is tasked with upgrading these computers to Windows 10 Pro. Along with the OEM installation of Windows 10, he notices that several additional software is installed by the vendor. He performs a clean installation on these computers.\ *\ Which of the following is true in this scenario?\ *** a\. The software will be retained in the fresh installation of Windows 10. b\. Howard will not be able to use DVD boot installation in this scenario. c\. A clean installation and upgrade installation are indistinguishable in this scenario. d\. The hard drive of the computers will be wiped before installation. **Which of the following scenarios represents the best use of Windows PE?\ ** a\. Installing, troubleshooting, or repairing Windows 10 b\. Preparing a Windows 10 workstation for imaging c\. Capturing a Windows 10 image and storing it in a WIM file d\. Configuring running instances of Windows 10 or offline images **You want to use WDS in conjunction with Microsoft Deployment Toolkit to deploy Windows 10 to a computer over the network. You are not going to use Endpoint Configuration Manager.\ *\ Which of the following is true in this scenario?\ *** a\. No part of the installation process can be automated in this scenario. b\. This exemplifies a zero-touch installation. c\. Someone will need to start the remote computer from a boot image. d\. You can perform a completely automated installation in this scenario. **You create a provisioning package for Windows 10 and share it with the users in your organization. The provisioning package is named Win10V1.ppkg.\ *\ What should users do to initiate the installation of the package?\ *** a\. They should double-click the file Win10V1.ppkg. b\. They should copy Win10V1.ppkg to the local drive containing the operating system files. c\. They should run the file with Administrator permissions. **When a generalized image is applied to a computer, that computer generates all of the system-specific data that is required, including the computer name and what other item?\ ** a\. Windows system path b\. Windows version c\. computer SID d\. installation path **Which of the following is a suitable method for small organizations that only occasionally install Windows 10?\ ** a\. OEM b\. Distribution share c\. Removable media d\. Image-based **Chao is creating a provisioning package. When given the option to encrypt the package, he considers proceeding with encryption. However, his colleague advises against encryption mentioning that it would make the package more difficult to deploy.\ *\ Which of the following justifies the colleague\'s advice?\ *** a\. Encrypted packages can only be deployed to domain-joined computers. b\. Encrypted packages cannot be used to configure Wi-Fi and VPN connections. c\. Any sensitive information in the package will be lost upon encryption. d\. The encryption key will be needed to deploy the package. **After a customized image is created, which of the following is used to place the image on a distribution share?\ ** a\. Windows SIM b\. Windows PowerShell c\. Windows Configuration Designer d\. Windows PE **Which of the following configuration passes is applied during the portion of the installation where users are asked for information after the second reboot?\ ** a\. specialize b\. windowsPE c\. oobeSystem d\. offlineServicing **Jin is performing an unattended installation of Windows 10 on 40 computers. The computers need to be configured differently depending on the users who will be using these systems. Certain users will need access to specific drivers and hardware, while others may need access to different sets of hardware and drivers.\ *\ Which of the following would help Jin in this scenario?\ *** a\. Creating a catalog file b\. Creating a distribution share with a \$OEM\$ folder c\. Applying offline updates d\. Creating a configuration set **Frida is performing an unattended installation of Windows 10. She uses the answer file to ensure that certain security update packages are applied to the Windows 10 image during the offlineServicing configuration pass.\ *\ What is the advantage of performing this action during this particular stage?\ *** a\. It ensures that the update packages are applies when the image is running. b\. It ensures that the system is never vulnerable to the exploits fixed by the update. c\. It ensures that settings are applied after the SID (security ID) is generated for the local computer. d\. It ensures that the computer reboots only after the packages are applied.