Client Operating System Ch 14 – Flashcards
Unlock all answers in this set
Unlock answersquestion
An access control list is a collection of individual permissions, which are called what?
answer
Access Control Entries
question
How many basic and advanced permissions does NTFS provide for assignments to a folder or file?
answer
6 basic, 14 advanced
question
Regarding NTFS permissions, when you copy NTFS files or folders from one volume to another, which of the following statements is true?
answer
The permissions are not retained and permissions set at destination are applied.
question
Regarding NTFS permissions, when you move NTFS files or folders from one volume to another, which of the following statements is true?
answer
The permissions are retained if the source and destination are on the same NTFS volume.
question
When examining effective access, there are three rules that must be understood. Which of the following is NOT one of these rules?
answer
Implicit permissions break permissions inheritance.
question
When using the iacls.exe utility, what flag is used to specify that the command should be executed on all files and subfolders contained in the starting folder location?
answer
/T
question
What is the maximum support file name length in the NTFS file system?
answer
255 characters
question
To use EFS on a file or folder, which of the following conditions must you first meet?
answer
You must be using an NTFS volume, AND You must decompress the file or folder first.
question
If you apply a change to a folder to enable EFS for the folder only, what happens to the files currently in the folder?
answer
The files currently in the folder are not encrypted.
question
What do NTFS quotas provide an administrator?
answer
The ability to limit the quantity of storage space utilized by users on the volume.
question
When deciding what your auditing policy should be, there are some key things to consider to help you decide which computers, resources and events you want to audit. Which of the listed items is NOT one of the items typically considered?
answer
Allow users of computers the ability to manage the logs on those computers.
question
What two basic steps must be performed to fully configure auditing for file or folder access?
answer
Create and configure an audit policy, AND Enable auditing on the files or folders.
question
Digital certificates, smart cards, picture passwords, and biometrics are used to perform what action?
answer
Authentication
question
Which of the following items is not supported as a method of authentication in Windows 8.1?
answer
One-time passwords
question
Generally speaking, which of the following password conditions is NOT considered to be a part of a strong password?
answer
A predictable password
question
A picture password is made up of what components?
answer
A picture AND a gesture.
question
Where are user accounts stored for computers that are in a workgroup?
answer
Security Accounts Manager
question
Which of the following is NOT an allowed gesture for a picture password?
answer
Arcs
question
During the installation of Windows 8.1, a built-in Administrator account is created on the computer. Which of the following statements is true concerning this account?
answer
The account is disabled AND the account has no password set.
question
The Network Service special identity allows services, configured to run as a network service, permissions on the computer equivalent to what built-in group?
answer
Users
question
What type of account is required to purchase apps from the Windows Store?
answer
A Microsoft account
question
Which two of the listed account control options are mutually exclusive?
answer
User must change password at next logon AND password never expires.
question
What must you do, at a minimum, before you can manage domain objectives on a windows 8.1 workstation?
answer
install the remote server administration tools for windows 8.1
question
What is the term used when a password is obtained through tricking a user into giving it to another party?
answer
Social engineering
question
When the password must meet complexity requirements setting is enabled, which of the listed required are now enforced for passwords?
answer
Must include characters from at least three of the following four categories: uppercase letters, lowercase letters, numbers, and symbols; must be at least six characters long; AND must not use any part of the user's account name
question
What command-line utility could be used to elevate privileges in a script?
answer
runas.exe
question
What negative side effects will occur if an administrator resets the password for a local account?
answer
The user loses access to certificates in the personal certificate store AND the user loses access to data on the network shares.
question
You want to deploy two-factor authentication and smart card technology while keeping costs low. You have a laptop that includes a Trusted Platform Module (TPM) chip. Which technology should you use?
answer
Virtual Smart Cards
question
You want to implement virtual smart cards. What is the minimum hardware you need?
answer
TPM version 1.2 or higher
question
Which of the following Windows components must be enabled before you can use Protected Mode in IE?
answer
UAC
question
Which of the following terms best describes when your desktop is dimmed and you must approve or deny a UAC request?
answer
Secure desktop
question
What is the intended function of the User Account Control feature in Windows?
answer
Preventing unauthorized changes to your computer.
question
When UAC is configured, how many tokens will an administrator account holder receive when she logs into the computer.
answer
Two
question
What is the default setting for UAC in windows 8.1?
answer
Notify me only when apps try to make changes to my computer.
question
How can you fully disable UAC in windows 8.1?
answer
Manually edit the registry
question
After changing the configuration of the user account control: run all administrators in admin approval mode setting, what must next be done to make the change effective?
answer
Reboot the computer
question
Which program or component is used to change the computer name?
answer
system properties
question
A server that is not running as a domain controller is known as a _________.
answer
member server
question
Which of the following terms best describes a collection of computers in which all of the computers utilize a central directory service for authentication and authorization?
answer
Domains
question
Which of the following is used to get applications from the Windows Store, to back up important data and files to free cloud storage, and to sync photos between multiple devices?
answer
a Microsoft account
question
Where in the control panel can you find quick access to settings most commonly adjusted by mobile computer users?
answer
Windows Mobility Center
question
By default, eight tiles appear in the windows mobility center. Which of the listed items does NOT appear by default here?
answer
User Accounts
question
Which of the following is NOT an option on the second screen menu of windows 8.1?
answer
First Screen Only
question
What windows keyboard combination can you use to project to a second screen?
answer
Windows + P
question
How does windows 8.1 transmit display signals to a network projector?
answer
Using RDP
question
Which of the following are selectable options on the presentation settings dialog box?
answer
Turn off the screen saver, Show this background, AND Set volume to:
question
Which power plan is not shown by default in the Power Options control panel?
answer
High Performance
question
What can the powercfg.exe utility be used to accomplish that can be accomplished in no other way?
answer
Export and import power management plans
question
What two steps must you execute with powercfg.exe to export power plans from a computer?
answer
Enter powercfg.exe -list and make a note of the listed GUIDs, AND enter powercfg.exe - export power.pow GUID
question
What windows 8.1 feature provides a form of fault tolerance that individual users can employ to maintain access to their server files, even in the event of a network service failure?
answer
Offline files
question
What group policy settin causes windows 8.1 to save copies of files that users access from remote servers on a local drive, regardless of whether they are configured as offline files?
answer
Enable Transparent Caching
question
What is wi-fi direct?
answer
A new microsoft implementation of ad hoc wireless networking
question
What options do you have for implementing BitLocker Drive Encryption?
answer
Encrypt enter drive AND encrypt used disk space only
question
When you encrypt the drive where the windows operating system is installed, BitLocker must store the keys it uses to encrypt/decrypt on a separate piece of hardware. Where can the keys be stored?
answer
TPM v1.2 or later chip AND USB flash drive
question
Of the listed BitLocker authentication methods, which is considered to be the most secure?
answer
TPM only
question
Of the listed BitLocker authentication methods, which is considered the least secure?
answer
Startup key only
question
In ordere to use BitLocker Drive Encryption, how much free space will be required on your system partition?
answer
100 MB
question
BitLocker to Go can be used to encrypt removable storage data drives that are formatted with which of the following file systems?
answer
NTFS, FAT32, AND exFAT
question
When using BitLocker to Go, which of the following that is typically associated with BitLocker is NOT required to unlock the drive?
answer
a TPM chip
question
The windows location provider uses what to try and determine your geographic location?
answer
Wi-Fi- triangulation AND IP address resolution
question
When is Patch Tuesday?
answer
The second tuesday of every month
question
By default, when will windows install software updates?
answer
daily at 3:00 AM
question
What group policy setting removes or keeps in place the install updates and shut down option when shutting down the system?
answer
Do not display install updates and shut down option in shut down windows dialog box
question
What group policy setting configures the day of the week to install updates?
answer
Configure Automatic Updates
question
If the configure automatic updates policy is not enabled and applied to the devices along with other windows update settings, what will happen?
answer
the devices will not be affected by the policy
question
When the automatic updates detection frequency policy is left undefined, what is the default interval at which windows checks for new updates from the configured update server?
answer
22 hours
question
What is the configurable interval range of the re-prompt for restart with scheduled installations policy?
answer
1-1440 minutes
question
What is the default value of the Delay Restart for scheduled installations policy?
answer
15 minutes
question
What is the maximum value of the delay restart for scheduled installations policy?
answer
30 minutes
question
How do you update window store apps?
answer
use the windows store
question
How do you enable automatic updates for windows store apps?
answer
in the store, tap settings