Windows Client - Test 2

s-blossom05
Quiz by s-blossom05, updated more than 1 year ago
538
0
0

Description

Lessons 6 - 8, 10 - 14
Tags

Resource summary

Question 1

Question
What is the maximum number of Windows 8 devices on which you can install a Windows app?
Answer
  • 1
  • 3
  • 5
  • 10

Question 2

Question
Which of the following can be use to turn off automatic download of updates from the Windows store on a Windows 8 computer? (Select all that apply)
Answer
  • Windows Store > Settings > App Updates > Move slider to No
  • gpedit.msc
  • gpmc.msc
  • AppLocker

Question 3

Question
Which of the following rule collections is used to configure an AppLocker rule for a packaged app?
Answer
  • Executable files
  • Scripts
  • Appx
  • Windows Installer files

Question 4

Question
To create rules for multiple packaged apps in a single step, which wizard would you use with AppLocker?
Answer
  • Create New Rule
  • Create Default Rules
  • Automatically Generate Rules
  • Create Multiple Rules

Question 5

Question
Where can you obtain a sideloading product activation key to sideload an app on a Windows 8 Professional computer?
Answer
  • Microsoft TechNet
  • Volume Service Center
  • Volume Licensing Service Center
  • Running sideloadkey.exe from a command prompt

Question 6

Question
Which option represents the order of precedence for GPOs starting from first to last?
Answer
  • Local Group Policy, Site GPO, Domain GPO, Organizational Unit GPO
  • Site GPO, Domain GPO, Organizational Unit GPO, Local Group Group Policy
  • Site GPO, Domain GPO, Local Group Policy, Organizational Unit GPO
  • Organizational Unit, Site GPO, Domain GPO, Domain GPO, Local Group Policy

Question 7

Question
Which represents the correct path for disabling the "Turn off the Store application" using the Local Group Policy editor?
Answer
  • Computer Configuration > Windows Components > Store
  • Computer Configuration > Administrative Templates > Windows Store
  • Computer Configuration > Administrative Templates > Windows Components > Store
  • Computer Configuration > Administrative Templates > Windows Components > Windows Store

Question 8

Question
Which command can be used to add a sideloading product activation key?
Answer
  • slmgr /ipk <sideloading product key>
  • slmgr /pk <sideloading product key>
  • slmgr /ato <sideloading product key>
  • slmgr /ato ec67814b-30e6-4a50-bf7b-d55daf729dle

Question 9

Question
To create a single rule that allows the Everyone group to run packaged apps that are signed, which wizard would you use in AppLocker?
Answer
  • Automatically Generate Rules
  • Create Default Rules
  • Create New Rule
  • Create Default Rule

Question 10

Question
Which of the following are true regarding updating Windows apps from the Windows Store?
Answer
  • Only the user can update the apps, but they can be downloaded automatically in the background.
  • A number indicator appears on the Store icon that will inform you of the number of updates available.
  • Free Windows apps cannot be updated.
  • The updates are downloaded and installed in the background.

Question 11

Question
You have 25 Windows 8 computers in a Windows Active Directory domain named "contoso.com". Which of the following tools should be used to disable the automatic download of updates from the Windows Store on all of them with the least amount of administrative effort?
Answer
  • Local Group Policy editor
  • Group Policy Management console
  • Turn off via App Updates in the Windows Store
  • Delete the automatic updates registry key

Question 12

Question
To set up an AppLocker rule that disables access to Windows apps, which of the following rule collections would you create the rule from?
Answer
  • Scripts
  • Windows Installer files
  • Executable files
  • Appx

Question 13

Question
To uninstall a Windows app that you recently purchased on one of your Windows 8 devices last week but now would like to reinstall, which of the following options best describes the process to reinstall it?
Answer
  • Visit the Windows Store, browse through the categories to find the app, and reinstall it at no charge.
  • Visit the Windows Store, browse through the categories to find the app, and pay for the app to reinstall it.
  • Visit the Windows Store, access Your Apps, and click Apps not installed on this PC. Select and install.
  • Remove the app from one of your other Windows 8 devices, access Your Apps, and click Apps not installed on this PC. Select and install.

Question 14

Question
As the administrator for a network that has 50 Windows 8 client computers, which of the following approaches can be used to initiate Windows app updates on the users' machines?
Answer
  • Configure a Group Policy.
  • Configure a Local Policy.
  • Turn on automatic download/install of Windows Apps.
  • Ask users to perform updates when they see the indicator on their Store tile.

Question 15

Question
You have a Windows 8 computer set up with the 20 Windows Apps that you want everyone to have access to. Which of the following AppLocker wizards will create all the rules in a single step?
Answer
  • Create New Rule
  • Create Default Rules
  • Automatically Generate Rules
  • Create Custom Rule

Question 16

Question
Match the following terms with the corresponding definitions: a) [blank_start]Application Identity service[blank_end] - A service that is required by AppLocker to verify the identity of an app. b) [blank_start]Group Policy Management console[blank_end] - Used to configure Group Policy across your entire enterprise. c) [blank_start]Line of Business (LOB) apps[blank_end] - Apps that are unique to the main business of the company. d) [blank_start]AppLocker[blank_end] - Controls which applications and files users can run on their Windows 8 computer. e) [blank_start]Local Security Policy Editor[blank_end] - Used to modify local security settings on your computer (secpol.msc) f) [blank_start]sideloading[blank_end] - Used to bypass the Windows Store and load LOB apps. g) [blank_start]Windows Apps[blank_end] - Also known as as "packaged apps". h) [blank_start]Windows Store[blank_end] - Central location for distributing and purchasing apps. i) [blank_start]rule collections[blank_end] - Includes executables files, scripts, Windows installer files, and Appx. j) [blank_start]Group Policy Object[blank_end] - Can be associated with a selected Active Directory container.
Answer
  • Application Identity service
  • Group Policy Management console
  • Line of Business (LOB) apps
  • AppLocker
  • Local Security Policy Editor
  • sideloading
  • Windows Apps
  • Windows Store
  • rule collections
  • Group Policy Object

Question 17

Question
In order of first to last, specify the order of precedence for processing Group Policy objects. [blank_start]2[blank_end] Group Policies linked to the Site container [blank_start]4[blank_end] Group Policies linked to the Organizational Unit [blank_start]1[blank_end] Local Group Policy object [blank_start]3[blank_end] Group Policies linked to the Domain container
Answer
  • 1
  • 2
  • 3
  • 4
  • 1
  • 2
  • 3
  • 4
  • 1
  • 2
  • 3
  • 4
  • 1
  • 2
  • 3
  • 4

Question 18

Question
After deleting a Windows App that is installed on four other Windows 8 devices, specify the correct order of steps required to reinstall the Windows app. [blank_start]3[blank_end] Click Apps not installed on this PC. [blank_start]1[blank_end] Select the Windows logo key to open the Windows Start menu and select the Store tile. [blank_start]4[blank_end] Select the app you want to install. [blank_start]2[blank_end] Right-click and select Your Apps. [blank_start]5[blank_end] Click Install.
Answer
  • 1
  • 2
  • 1
  • 2
  • 1
  • 2
  • 3
  • 1
  • 2
  • 3
  • 4
  • 1
  • 2
  • 3
  • 4
  • 5
  • 3
  • 4
  • 5
  • 3
  • 4
  • 5
  • 4
  • 5
  • 5

Question 19

Question
In order of first to last, specify the tasks that must be completed to disable access to the Windows Store using the Local Group Policy editor. [blank_start]3[blank_end] Click Computer Configuration > Administrative Templates > Windows Components > Store. [blank_start]5[blank_end] Click Enabled and then click OK. [blank_start]1[blank_end] Press the Windows logo key + r. [blank_start]4[blank_end] Double-click Turn off the Store application. [blank_start]2[blank_end] In the Run dialog box, type gpedit.msc.
Answer
  • 1
  • 2
  • 3
  • 4
  • 5
  • 1
  • 2
  • 3
  • 4
  • 5
  • 1
  • 2
  • 3
  • 4
  • 5
  • 1
  • 2
  • 3
  • 4
  • 5
  • 1
  • 2
  • 3
  • 4
  • 5

Question 20

Question
Lee Jensen, owner of a large manufacturing company on the West Coast, recently approved the purchase and installation of 50 Windows 8 Enterprise desktops for his organization. A month earlier, the company installed 25 Windows 8 Professional client computers. All the computers are part of the Windows 2012 Active Directory domain named jensenmfg.com. The company has a Line of Business app called jenMax it would like to make available to its internal employees via the Windows Store. He has asked you to research the process and requirements and report back. What are the potential issues/recommendations you should bring to his attention? Distributing your LOB app via the Windows Store requires that you go through a certification process with Microsoft. Once your app is accepted, it will be made available via the Windows Store to the general public. LOB apps are usually designed for internal use only; therefore, making them available to the public is not the best approach. Instead, the solution is to use a process called sideloading. The Windows 8 Enterprise client computers are enabled for sideloading by joining them to the domain. The Windows 8 Professional client computers need to have the sideloading product activation key installed and activated for them to work correctly.
Answer
  • True
  • False

Question 21

Question
You have 50 Windows 8 Enterprise client computers on your network that are joined to the company’s Active Directory domain. You have several Group Policy objects linked to the domain including one GPO that has the “Turn off Automatic Download of updates" option set to Enabled. You open the Local Group Policy editor on one of the Windows 8 Enterprise client computers, navigate to the “Turn off Automatic Download of updates” option, and set it to Disabled. What would happen if you made this change? The order of precedence determines which Group Policy settings are applied to a Windows 8 client computer that is a member of a domain. Because the Local Group Policy setting is applied first, policies at the Site, Domain, and Organizational Unit level will overwrite it if there is a conflict. In this scenario, the GPO linked to the domain has turned off automatic updates from the Windows Store; therefore, it will be applied after the local policy.
Answer
  • True
  • False

Question 22

Question
What is one way that you can open the Search function?
Answer
  • Win + Q
  • Win + S
  • Win + F
  • Win + O

Question 23

Question
How often does Microsoft check for app updates?
Answer
  • hourly
  • daily
  • weekly
  • bi-weekly

Question 24

Question
Updates are downloaded and installed automatically.
Answer
  • True
  • False

Question 25

Question
Which of the following software restriction policy rule types takes the highest precedence?
Answer
  • Certificate rules
  • Hash rules
  • Default rules
  • Zone rules

Question 26

Question
Which of the following types of rules can be manually created in AppLocker?
Answer
  • Publisher rules
  • Certificate rules
  • Path rules
  • File hash rules

Question 27

Question
Which of the following Windows versions support AppLocker policies? (Choose all that apply.)
Answer
  • Windows 8
  • Windows Vista
  • Windows Server 2003
  • Windows Server 2008 SP2

Question 28

Question
When you enable the Prevent installation of removable devices policy in a GPO and link that GPO to a domain, what is the effect on the devices already installed on computers in that domain?
Answer
  • The policy has no effect on removable devices that have already been installed.
  • The policy causes already installed removable devices to be uninstalled.
  • The policy allows already installed removable devices to function, but prevents their drivers from being updated.
  • The policy disables already installed removable devices, but does not uninstall them.

Question 29

Question
Which of the following rule types cannot be used to create software restriction policies?
Answer
  • hash rules
  • certificate rules
  • path rules
  • code rules

Question 30

Question
When creating an AppLocker rules manually, which of the following is NOT information the wizard prompts you to supply?
Answer
  • Conditions
  • User or group
  • Function
  • Action

Question 31

Question
Which of the following is NOT a setting for software restriction policies?
Answer
  • Basic user
  • Disallowed
  • Advanced user
  • Unrestricted

Question 32

Question
Which of the following statements is the primary reason why AppLocker is an improvement over software restriction policies?
Answer
  • AppLocker has more rule types than software restriction policies.
  • AppLocker can generate its own rules automatically.
  • AppLocker can be deployed in Group Policy objects in Active Directory.
  • AppLocker requires the Application Identity service to be running.

Question 33

Question
2. Which of the following statements is the primary reason why you must start the Application Identity service manually before using AppLocker?
Answer
  • Because AppLocker needs the Application Identity service to be running in order to function
  • Because the Application Identity service will hang the system if it starts with Windows.
  • Because requiring the manual start prevents improperly configured AppLocker rules from permanently hanging the system
  • Because Windows 8 does not support starting the Application Identity service automatically.

Question 34

Question
Complete the following exercise by matching the terms with their corresponding definitions: a) [blank_start]Path rules[blank_end] - Applies to applications with a specific file or folder name b) [blank_start]Windows Installer rules[blank_end] - Applies to packages with .msi and .msp extensions c) [blank_start]Certificate rules[blank_end] - Applies to digitally signed applications d) [blank_start]Executable rules[blank_end] - Applies to files with .exe and .com extensions e) [blank_start]Hash rules[blank_end] - Applies to applications with a digital fingerprint f) [blank_start]Packaged app rules[blank_end] - Applies to Windows Store purchases g) [blank_start]default rule[blank_end] - Applies to applications that do not match any other rule type h) [blank_start]Network zone rules[blank_end] - Applies to packages downloaded with Internet Explorer i) [blank_start]Script rules[blank_end] - Applies to files with .psl, .bat, .cmd, . vbs, and .js extensions j) [blank_start]DLL rules[blank_end] - Applies to libraries, as well as executables
Answer
  • Path rules
  • Windows Installer rules
  • Certificate rules
  • Executable rules
  • Hash rules
  • Packaged app rules
  • Default rule
  • Network zone rules
  • Script rules
  • DLL rules

Question 35

Question
Sophie is planning on using AppLocker to control access to applications on a new network she has constructed for the Research and Development department at a major aerospace firm. The software developers in the department have recently deployed a new application called Virtual Wind Tunnel, which is based on government project research and is therefore classified. All of the full-time personnel have sufficient clearance to use the application, but the interns in the department do not. Sophie has placed the user accounts for everyone in the department into a security group called ResDev. The interns are also members of a group called RDint. How can Sophie use AppLocker to provide everyone in the department with access to the Virtual Wind Tunnel application without changing the group memberships and without having to apply policies to individual users? Sophie has to create two rules, an allow rule that grants the ResDev group access to the application, and a deny rule that applies only to the RDint group. Because deny rules take precedence over allow rules in AppLocker, the interns will not be able to access the application.
Answer
  • True
  • False

Question 36

Question
What are the names of the two security zones in Internet Explorer that have no sites in them by default? (Choose all that apply.)
Answer
  • Internet
  • Local intranet
  • Trusted sites
  • Restricted sites

Question 37

Question
Which of the following is NOT one of the add-on types supported by Internet Explorer 8?
Answer
  • Toolbars and Extensions
  • Search Providers
  • Accelerators
  • SmartScreen Filtering

Question 38

Question
What does a broken window icon in the Internet Explorer 8 address bar indicate?
Answer
  • A failure to successfully download a certificate from the website
  • A web page that is incompatible with Internet Explorer 8
  • A failure to update a subscribed RSS feed
  • A failure to print a document from Internet Explorer

Question 39

Question
Which of the following can be used to highlight content in a browser window instead of typing content directly into the browser’s search box?
Answer
  • Accelerator
  • Search Provider
  • RSS Feed
  • Toolbars and Extensions

Question 40

Question
When you subscribe to an RSS Feed in Internet Explorer, the content is updated how frequently by default?
Answer
  • Weekly
  • Daily
  • Hourly
  • Monthly

Question 41

Question
When downloading a file from a website in Internet Explorer 10, the browser’s built-in download manager manages the process. Which of the following are valid options from within the download manager? (Choose all that apply.)
Answer
  • Download and run the selected file.
  • Download and save the selected file into the program's default folder.
  • Download and save the selected file to another folder.
  • Cancel the download.

Question 42

Question
Which of the following best describes the role of a WebSocket? (Choose all that apply.)
Answer
  • Establishing a three-way handshake between the sending and receiving computer.
  • Application layer protocol that uses TCP's transport service
  • Allows clients and servers to exchange data immediately as it becomes available.
  • An open connection between client and server that remains open as long as the systems have data to exchange.

Question 43

Question
Which of the following are true regarding Internet Explorer in Windows 8 and the use of mandatory integrity control? (Choose all that apply.)
Answer
  • IE runs at a low integrity access level
  • IE runs at a medium access integrity level
  • IE can write to the History, Cookies, and Favourites folders
  • IE runs at a high integrity access level

Question 44

Question
By default, there are no sites included in which of these Internet Explorer security zones; you must add them manually. (Choose all that apply.)
Answer
  • Trusted sites
  • Restricted sites
  • Local Intranet
  • Internet

Question 45

Question
Which of the following represent techniques used by Internet Explorer to identify potential phishing websites? (Choose all that apply.)
Answer
  • Online lookup of phishing sites
  • Onsite analysis
  • Online lookup of downloaded sites
  • Offline lookup of download sites

Question 46

Question
The company is designing a new web-based application that is likely to require extensive access to system resources. Users will connect to it over their local network segment. To make sure the application works as planned, in which security zone should the website be placed to allow it to function at its full capability?
Answer
  • Trusted Sites zone
  • Internet zone
  • Local Intranet zone
  • Restricted Sites zone

Question 47

Question
A new company has just installed Windows 8 on their computers. They want to be able to protect themselves against phishing attacks. Which of these combinations will ensure they are using the best approach to defend against these types of attacks?
Answer
  • Prevent browsing to any sites that are not included in the Trusted Sites zone
  • Educate users on how to recognize phishing attacks and use SmartScreen Filter to display warnings if the site is suspicious
  • Prevent browsing to any sites that are not included in the Local Intranet zone
  • Place a list of known phishing sites into each user’s Restricted Sites zone

Question 48

Question
Several users on the network do sensitive research for the company using Internet Explorer on 50 Windows 8 computers. They do not want IE to maintain a permanent record of their activities during their browser sessions? What is the best approach to use to address their need?
Answer
  • Configure InPrivate Browsing on each of the computers.
  • Configure InPrivate Browsing on a subset of the computers and direct the users to only browse when working at those computers.
  • Configure InPrivate Browsing using Group Policy and apply it to the users’ computers.
  • Configure InPrivate Browsing using Group Policy and apply it to a subset of the computers; ask users to work on those computers only.

Question 49

Question
In Windows 8, Internet Explorer runs in protected mode. Which of the following best describes the capabilities of IE when running in this mode?
Answer
  • IE can write to the Temporary Internet files folder
  • IE can write to the Temporary Internet files and the History folders.
  • IE can write to the Temporary Internet files, History, and Cookies folders.
  • IE can write to the Temporary Internet files, History, Cookies, and Favorites folder.

Question 50

Question
The company is considering upgrading to Windows 8 but is concerned that some of their web-based applications may not be compatible. What is the best way to test for incompatibilities?
Answer
  • Upgrade a few computers to Windows 8 and ask users to report any problems they have to the help desk.
  • Upgrade all computers to Windows 8 and ask users to report any problems they have to the help desk.
  • Upgrade a subset of computers that use all the web-based applications and turn on Compatibility Logging via the Local Group policy.
  • Upgrade a subset of computers that use all the web-based applications. Ask users to report any problems. If problems are found, clear the Enable Protected Mode checkbox in the Local Intranet zone.

Question 51

Question
Complete the following exercise by matching the terms with their corresponding definitions: a) [blank_start]Add-ons[blank_end] - Software components that interact with the basic functions of the web browser. b) [blank_start]RSS Feeds[blank_end] - A push technology that simplifies the process of delivery updated content to designated users. c) [blank_start]Social engineering[blank_end] - Describes any attempt to penetrate the security of a system by convincing people to disclose secret information. d) [blank_start]security zones[blank_end] - Used by Internet Explorer to divide websites and assign different sets of privileges to each. e) [blank_start]accelerators[blank_end] - Enable users to highlight content in a browser window instead of using the search box. f) [blank_start]SmartScreen Filter[blank_end] - Examines traffic for evidence of phishing activity. g) [blank_start]WebSockets[blank_end] - Enables clients and servers to exchange data immediately. h) [blank_start]Protected mode[blank_end] - Provides a way to run Internet Explorer with highly reduced privileges. i) [blank_start]InPrivate Mode[blank_end] - Enables surfing the Internet without leaving any record of your activities. j) [blank_start]Compatibility View[blank_end] - Enables browser to display older pages properly.
Answer
  • Add-ons
  • RSS Feeds
  • Social engineering
  • Security zones
  • Accelerators
  • SmartScreen Filter
  • WebSockets
  • Protected mode
  • InPrivate Mode
  • Compatibility View

Question 52

Question
In order of first to last, specify the correct order of steps to configure a default Search Provider. [blank_start]1[blank_end] On the Start screen, click the Desktop tile. [blank_start]3[blank_end] Click the Tools icon, and from the context menu that appears, select Manage Add-ons. [blank_start]5[blank_end] Select one of the search providers you installed earlier and click Set as default. [blank_start]4[blank_end] Select Search providers in the Add-on types list. [blank_start]6[blank_end] Click Close. [blank_start]2[blank_end] In the taskbar, click the Internet Explorer icon.
Answer
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6

Question 53

Question
Specify the correct order of steps to subscribe to an RSS Feed. [blank_start]4[blank_end] Click the Subscribe to this feed link. [blank_start]1[blank_end] On the Start screen, click the Desktop tile. [blank_start]2[blank_end] In the taskbar, click the Internet Explorer icon. [blank_start]3[blank_end] Press the Alt key to display the menu bar and, on the Tools menu, click Feed Discovery. Then click the name of the feed to which you want to subscribe. [blank_start]5[blank_end] In the Name text box, type a name you want to assign to the feed (if it differs from the default). [blank_start]6[blank_end] Select the folder to which you want to add the feed, or click New folder to create one. Then click Subscribe. The feed page changes to indicate that you have successfully subscribed to the feed.
Answer
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6

Question 54

Question
Specify the correct order of steps to add a site to a Security Zone. [blank_start]3[blank_end] Click the Tools icon and select Internet Options. [blank_start]2[blank_end] In the taskbar, click the Internet Explorer icon. [blank_start]7[blank_end] Type the URL of the website you want to add to the zone into the Add this website to the zone text box, and then click Add. [blank_start]6[blank_end] Click Sites. [blank_start]1[blank_end] On the Start screen, click the Desktop tile. [blank_start]8[blank_end] Click Close to close the Trusted sites or Restricted sites dialog box. [blank_start]5[blank_end] Select the zone, either Trusted sites or Restricted sites, to which you want to add a site. [blank_start]9[blank_end] Click OK to close the Internet Properties sheet. [blank_start]4[blank_end] Click the Security tab.
Answer
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9

Question 55

Question
Several employees at the company you work for have recently been victims of identity theft. These incidents were the result of emails received by the victims requesting that they supply personal bank account information to a website or risk having their accounts closed. The website was, of course, not legitimate, and attackers used the information collected there to transfer funds from the victims’ accounts. The company has recently upgraded all company workstations to Windows 8, and you are examining the capabilities of the SmartScreen Filter in Internet Explorer 8. Your superiors have told you that you can use any of the new IE8 security features for the company workstations, as long as they do not consume any additional Internet bandwidth. Explain to your supervisor the various methods IE8 uses to protect against phishing attacks, and specify which ones you intend to use for the company workstations. The SmartScreen Filter in IE8 has three mechanisms for detecting phishing attempts. One is to analyze incoming web pages for patterns and phrases indicative of a phishing attempt. This mechanism uses no additional Internet bandwidth, so you can implement it on the company workstations. The other two mechanisms perform online lookups of phishing sites and down sites, using a database maintained by Microsoft. Because these mechanisms require Internet bandwidth, you cannot use them.
Answer
  • True
  • False

Question 56

Question
A web-based site is needed by all users on the company’s network in order to perform research on the company’s competitors. After installing Windows 8, calls start coming into the help desk indicating there are compatibility problems with the site. What are some techniques that can be tried to address the problem? You can move the site to the Trusted zone in the users’ browser. Sites in the Trusted zone do not run in protected mode and receive elevated privileges. You could disable protected mode in IE (not recommended) or modify the application which is the most difficult and time-consuming option if the first option does not work.
Answer
  • True
  • False

Question 57

Question
Which of the following mechanisms is used most often used in firewall rules to allow traffic onto the network?
Answer
  • Protocol numbers
  • IP addresses
  • Port numbers
  • Hardware addresses

Question 58

Question
Which of the following actions can you NOT perform from the Windows Firewall control panel? (Choose all that apply.)
Answer
  • Turn Windows firewall off for all three profiles.
  • Manage firewall exceptions for the domain profile.
  • Allow a program through the firewall in all three profiles.
  • Create firewall exceptions based on port numbers.

Question 59

Question
Connection security rules require that network traffic allowed through the firewall use which of the following security mechanisms?
Answer
  • IPsec
  • EFS
  • UAC
  • PIV

Question 60

Question
Windows Firewall uses three profiles to represent the type of network to which the server is connected. What are the three profiles?
Answer
  • Private, Temporary, and Authenticated
  • Public, DMZ, and Private
  • Internet, Secure, and Private
  • Domain, Private, and Public

Question 61

Question
When a user attempts to visit an Internet-based web server, what is the default action of the Windows Firewall?
Answer
  • The firewall will not permit the user to visit a non-corporate website.
  • The firewall by default will not block client-initiated network traffic.
  • The firewall will block the web request unless the user is already authenticated.
  • The firewall will block all outbound traffic.

Question 62

Question
In the Windows Firewall with Advanced Security console, while creating a new rule, the Program page specifies whether the ______.
Answer
  • rule applies to all programs, to one specific program
  • rule applies to all users, to one specific user
  • rule applies to all systems, to one specific system
  • rule applies to all programs, to one specific program, or to a specific service

Question 63

Question
By exporting the Windows Firewall policy, you have a file with a .wfw extension that contains _____.
Answer
  • all the rules you have created or modified
  • preconfigured rules to be applied to another firewall
  • all its rules, including the preconfigured rules and the ones you have created or modified
  • firewall settings as specified by the Group Policy settings

Question 64

Question
Which of the following statements about Windows Defender is true?
Answer
  • Windows Defender uses rules that you create to control its scans.
  • Windows Defender can detect spyware that is already present on the system, but it cannot prevent the infiltration of new spyware.
  • Windows Defender eliminates the need for third-party anti-virus software.
  • Windows Defender requires definition updates that are supplied free with the regularly scheduled Windows Update downloads.

Question 65

Question
Which of the following wireless networking standards uses spatial multiplexing to increase bandwidth?
Answer
  • IEEE 802.11b
  • IEEE 802.11g
  • IEEE 802.11n
  • IEEE 802.11X

Question 66

Question
Which of the following wireless security protocols is the most secure?
Answer
  • WPA-TKIP
  • WEP (128-bit) with 802.1X authentication
  • WEP (128-bit)
  • WPA-AES

Question 67

Question
What is the primary objective of a firewall?
Answer
  • To permit traffic in and out for legitimate users, and to block the rest
  • To authenticate and authorize users past the network perimeter
  • To compare traffic information against a list of known valid traffic
  • To protect a network by allowing certain types of network traffic in and out of the system

Question 68

Question
Windows Firewall Customize Settings contains three profiles (Public, Private, and Domain). What differentiates these profiles from each other?
Answer
  • Public is for servers accessible to temporary users. Private is for servers on an internal network. Domain is for servers in which users are all authenticated.
  • Public is for servers accessible to unauthenticated users. Private is for inaccessible servers. Domain is for servers accessible only to authenticated users.
  • Public is for servers accessible to temporary users. Private is for servers on an internal network. Domain is for servers across multiple sites.
  • Public is for servers accessible to unauthenticated users. Private is for servers on a private network. Domain is for servers spanning different domain groups.

Question 69

Question
Windows Firewall allows you to create inbound, outbound, and connection security rules for individual servers or systems. How can you do this for multiple systems?
Answer
  • You can delegate to administrators the task of performing the same configuration to their local servers.
  • You can create a new Group Policy object (GPO) and create matching rules to match the desired configuration. Then deploy the GPO to other systems on the network.
  • You can visit individual systems and configure them as you have the initial system.
  • You can create a new GPO and you can import settings from a policy file created earlier. Then deploy the GPO to other systems on the network.

Question 70

Question
What is the primary benefit of configuring Windows Firewall through the Windows Firewall with Advanced Security snap-in for the Microsoft Management Console?
Answer
  • The Microsoft Management Console offers a more familiar interface than the Windows Firewall control panel.
  • The Microsoft Management Console snap-in applies the rules faster than the Windows Firewall control panel.
  • Compared to the Windows Firewall control panel, the Microsoft Management Console can be brought up in fewer clicks.
  • The Microsoft Management Console snap-in offers full access compared to the Windows Firewall control panel.

Question 71

Question
When creating a firewall exception, what is the difference between opening a port and allowing an application?
Answer
  • Opening a port is permanent, and thus is less risky than allowing an application.
  • Allowing an application opens the specified port only while the program is running, and thus is less risky.
  • Both options are available in the Windows Firewall with Advanced Security console.
  • There is no functional difference between opening a port and allowing an application.

Question 72

Question
Specify the order of steps for processing an application in Windows Firewall. [blank_start]3[blank_end] Click Allow an app or feature through Windows Firewall. The Allowed Apps dialog box appears. [blank_start]4[blank_end] Scroll down in the Allowed apps and features list and select the check box for the application you want to allow through the firewall. [blank_start]1[blank_end] Log on to Windows 8, using an account with administrator privileges. 5 Click OK to close the Allowed Apps dialog box. [blank_start]2[blank_end] Open the Control Panel and click System and Security > Windows Firewall. The Windows Firewall window appears.
Answer
  • 1
  • 2
  • 3
  • 4

Question 73

Question
In order of first to last, specify the order of steps for creating Windows Firewall rules. [blank_start]5[blank_end] From the Action menu, select Export Policy. The Save As combo box appears. [blank_start]1[blank_end] Log on to Windows 8, using an account with administrator privileges. [blank_start]4[blank_end] Modify the inbound or outbound firewall rules or create new rules as needed. [blank_start]2[blank_end] Open the Control Panel and select System & Security > Administrative Tools > Windows Firewall with Advanced Security. The Windows Firewall with Advanced Security console appears. [blank_start]3[blank_end] In the left pane, select the Windows Firewall with Advanced Security on Local Computer node. [blank_start]6[blank_end] In the File Name text box, type a name for the policy file and click Save.
Answer
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6

Question 74

Question
You are a desktop technician in the IT department of a small corporation. Today is the day of the company picnic and, as the junior member of the department, you have been left in charge of the entire corporate network while everyone else is out of the office. Shortly after 2:00 PM, an email arrives from the company’s biggest customer, complaining that they can’t access the web server they use to place their orders. After checking the web server logs, it seems clear that the server is undergoing a denial-of-service attack, because there are suddenly hundreds of Internet computers repeatedly trying to access it. What temporary modifications could you make to Windows Firewall on the Windows 8 computer that stands between the web server and the Internet that would allow customers to access the web server while blocking the attackers? You could require IPsec authentication for all incoming communications to TCP port 80, the well-known port for web server communications. Customers would then be able to authenticate and access the server, while the random, unauthenticated DoS connection attempts are blocked.
Answer
  • True
  • False

Question 75

Question
Ed is a desktop technician at a large law firm. Ed’s firm is a slow adopter of new technologies, and the organization has, to date, not deployed a wireless network. After bringing up the benefits of wireless networks at a recent meeting with the IT staff, Ed was told that the company will not be deploying a wireless network for several years, if ever. The lack of an IT-configured wireless network has not entirely stopped their adoption, however. Yesterday, Ed noticed a junior attorney surfing the web with his laptop in the lunch room, without a network cable. When Ed asked the attorney how he was connected to the network, he confessed that he had plugged a consumer WAP into the network port in his office. Explain the potential risks of having a rogue wireless network in the office. An attacker with a wireless network card could join their Active Directory Domain Services domain. An attacker could use a wireless network card to capture traffic between two wired network hosts. An attacker could use the company’s Internet connection from the lobby of the building with a wireless-enabled mobile computer.
Answer
  • True
  • False

Question 76

Question
Which of the following is the primary method for transmitting IPv6 traffic over an IPv4 network?
Answer
  • Subnetting
  • Tunneling
  • Supernetting
  • Contracting

Question 77

Question
Which of the following is the IPv6 equivalent to a private IPv4 address?
Answer
  • Link-local unicast address
  • Global local unicast address
  • Unique local unicast address
  • Anycast address

Question 78

Question
Which of the following is an automatic tunneling protocol used by Windows operating systems that are located behind NAT routers?
Answer
  • Teredo
  • 6to4
  • ISATAP
  • APIPA

Question 79

Question
What kind of IP address must a system have to be visible from the Internet?
Answer
  • Registered
  • Binary
  • Class B
  • Subnetted

Question 80

Question
What subnet mask would you use when configuring a TCP/IP client with an IPv4 address on the 172.16.32.0/19 network?
Answer
  • 255.224.0.0
  • 255.240.0.0
  • 255.255.224.0
  • 255.255.240.0
  • 255.255.255.240

Question 81

Question
Which protocol is responsible for addressing packets at the data-link layer?
Answer
  • Internet Protocol
  • Transmission Control Protocol
  • Ethernet
  • CIDR

Question 82

Question
Windows 8 computers can acquire IP addresses in which of the following ways? Select all that apply.
Answer
  • APIPA
  • Manual Configuration
  • DHCP
  • TCP/IP

Question 83

Question
Which of the following are true statements regarding IPv4 and IPv6 addressing? Select all that apply.
Answer
  • IPv4 addresses are 32 bits in length.
  • IPv4 addresses are 128 bits in length.
  • IPv6 addresses are 128 bits in length.
  • IPv4 and IPv6 support stateful and stateless configuration.

Question 84

Question
Computers with link-local addresses, that do not have access to a DNS server, use which protocol?
Answer
  • Link Local Name Resolution
  • Link Local Multicast Name Resolution
  • Link Local Unicast Name Resolution
  • Link Local Anycast Name Resolution

Question 85

Question
In which layer of the OSI model would packet acknowledgment, error correction, and flow control services typically be handled?
Answer
  • Network layer
  • Physical layer
  • Transport layer
  • Data-link layer

Question 86

Question
A computer is currently experiencing connectivity problems. The network administrator is unsure whether the source of the problem is the local computer, the remote computer, or one of the routers between the two. Which tool would most likely provide the information needed to answer these questions and pinpoint the location of the problem?
Answer
  • nslookup
  • ping
  • netstat
  • tracert

Question 87

Question
Two computers are configured to communicate on a local network segment 192.168.2.0/24. Computer A is currently assigned 192.168.2.17 and Computer B is assigned 192.168.2.22. A new administrator adds a third computer (Computer C) to the network and forgets to configure its IP address. If the DHCP server were temporarily unavailable, which of the following would most likely be the result?
Answer
  • Computer C would be assigned an address automatically.
  • Computer C would be assigned an APIPA address.
  • Computer C would be assigned an APIPA address and not be able to communicate with the other two computers.
  • Computer C would be assigned an APIPA address and not be able to communicate with the other two computers. Once the DHCP server came back online, all computers will be able to communicate.

Question 88

Question
The network administrator is currently having problems connecting and gathering information from a Windows 8 computer using telnet. He wants to use telnet on a very limited basis. Which of the following would represent the best approach to solve this problem?
Answer
  • Turn the Windows Firewall off on the target computer.
  • Disable the Windows Firewall on the target computer temporarily.
  • Configure the target computer’s Windows Firewall to allow traffic directed to port 23, 20, and 21.
  • Configure the target computer’s Windows Firewall to allow traffic directed to port 23; complete the work and then block the port until he needs to connect at a late date/time.

Question 89

Question
When troubleshooting computers and networks, it’s wise to use the OSI model as a guide. If a user is experiencing problems with resolving host names to IP addresses, which layer of the OSI model would you focus on to quickly resolve the problem?
Answer
  • Data-link layer
  • Physical layer
  • Network layer
  • Application layer

Question 90

Question
A network administrator is trying to locate where packets are being delayed in transit. She uses the tracert command and receives the following information. Which of these hops would be the source of the delay?
Answer
  • <100 ms 103 ms <130 ms
  • <210 ms 200 ms <205 ms
  • <250 ms 210 ms <240 ms
  • <375 ms 300 ms <360 ms

Question 91

Question
Complete the following exercise by matching the terms with their corresponding definitions. a. [blank_start]ipconfig[blank_end] - Used to view the settings assigned to a DHCP-enabled client. b. [blank_start]netstat[blank_end] - Used to display ports that are currently listening for incoming network connections. c. [blank_start]media access control address[blank_end] - A hardware address used at the data-link layer. d. [blank_start]network address translation[blank_end] - Feature built into routers; substitutes a registered address for the computer’s private address and then forwards to destination. e. [blank_start]connectionless protocol[blank_end] - A protocol that does not perform error detection or correction. f. [blank_start]connection-oriented protocol[blank_end] - Protocol in which two system establish a connection before they transmit any data. g. [blank_start]Transmission Control Protocol[blank_end] - A connection-oriented protocol found at the Transport layer. h. [blank_start]Internet Protocol[blank_end] - A connectionless protocol found at the Network layer. i. [blank_start]packet switching network[blank_end] - Also referred to as a local area network. j. [blank_start]Automatic Private IP Addressing (APIPA)[blank_end] - Allows computers on networks without DHCP to communicate with each other when not assigned manual IP addresses.
Answer
  • ipconfig
  • netstat
  • media access control address
  • network address translation
  • connectionless protocol
  • connection-oriented protocol
  • Transmission Control Protocol
  • Internet Protocol
  • packet switching network
  • Automatic Private IP Addressing (APIPA)

Question 92

Question
In order of first to last, specify the correct order of steps to view connection status. [blank_start]1[blank_end] Open the Network and Sharing Center. [blank_start]4[blank_end] Click Close to close the Network Connection Details dialog box. [blank_start]5[blank_end] Click Close to close the Local Area Connection Status dialog box [blank_start]3[blank_end] Click Details. The Network Connection Details dialog box appears. [blank_start]2[blank_end] In the View your active networks section, click Ethernet or the name of the connection whose status you want to view.
Answer
  • 1
  • 2
  • 3
  • 4
  • 5
  • 1
  • 2
  • 3
  • 4
  • 5
  • 1
  • 2
  • 3
  • 4
  • 5
  • 1
  • 2
  • 3
  • 4
  • 5
  • 1
  • 2
  • 3
  • 4
  • 5

Question 93

Question
Specify the correct order of steps to configure IPv4 settings. [blank_start]2[blank_end] Click Change adapter settings. [blank_start]4[blank_end] Select Internet Protocol Version 4 (TCP/IPv4) and then click Properties. [blank_start]6[blank_end] Select the Use The Following DNS Server Addresses option and then enter appropriate values for the following parameters (preferred DNS Server, alternate DNS server. [blank_start]3[blank_end] Right-click the connection you want to manage and, from the context menu, select Properties. [blank_start]1[blank_end] Open the Network and Sharing Center. [blank_start]7[blank_end] Click OK to close the Internet Protocol Version 4 (TCP/IPv4) Properties sheet. [blank_start]5[blank_end] Select the Use The Following IP Address option and then enter appropriate values for IP address, subnet mask, and default gateway). [blank_start]8[blank_end] Click OK to close the connection’s Properties sheet.
Answer
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 1
  • 2
  • 1
  • 2
  • 1
  • 2
  • 1
  • 2
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8

Question 94

Question
Specify the correct order of steps to configure Advanced Sharing settings. [blank_start]1[blank_end] Open the Network and Sharing Center. 4 Configure the following settings by selecting from the options provided (Network Discovery, Turn on automatic setup of network connected device, file/printer sharing, public folder sharing, media streaming, file sharing connections, password protected sharing, and HomeGroup connections). 5 Click Save Changes. 3 Click the down arrow for the network location whose settings you want to modify. 2 In the left pane, click Change advanced sharing settings. The Change sharing options for different network profiles dialog box appears.
Answer
  • 1
  • 2
  • 3
  • 4
  • 5
Show full summary Hide full summary

Similar

Project Communications Management
farzanajeffri
Common Technology Terms
Julio Aldine Branch-HCPL
Computing
Kwame Oteng-Adusei
Abstraction
Shannon Anderson-Rush
RESTful Web Services with Express Framework and mongoose.
Angel Martínez Rodriguez
Web Designing & Development Full Tutorial
Nandkishor Dhekane
Network Protocols
Shannon Anderson-Rush
Introduction to the Internet
Shannon Anderson-Rush
Database design
linneamd
HTTPS explained with Carrier Pigeons
Shannon Anderson-Rush