• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/20

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

20 Cards in this Set

  • Front
  • Back
1. You install Windows 8.1 on a stand-alone computer. You then connect that computer to a network. What is the default network configuration for the new computer on the network?

A. Domain


B. Workgroup


C. Both A and B


D. Neither A nor B

B. When you first install Windows 8.1 on a computer, it automatically belongs to a work- group. If you want it to connect to a domain, you must specify the domain name.

2. You are tasked with setting up a Windows domain on your network. From the following choices, which constitutes a Windows domain?


A. One server running Windows Server 2008 or higher


B. One server running as a domain name server


C. One server acting as a domain controller and one hosting Active Directory Domain Services (AD DS)


D. One server acting as the workgroup host

C. A Windows domain includes at least one server acting as a domain controller and hosting AD DS.

3. You are assigned as the network administrator for your company and you have multiple servers and 100+ client computers running Microsoft Windows 8.1. You want to make a change so that you turn off the Windows Store feature on all client computers. What is the most efficient method for doing so?

A. Registry Editor


B. Group Policy Management Console


C. Domain Control Security Policy


D. Terminal Servers Configuration tool

B. Group Policy settings can be configured using the Group Policy Management Console in a domain.
4. Which of the following Group Policy nodes lets you deploy applications to clients?

A. Administrative Settings


B. Windows Settings


C. Configuration Settings


D. Software Settings

D. The Software Settings node can be used to deploy software to clients.
5. When accessing resources on a network, including when connecting to a domain, you should be aware of two security principles. One of those principles is authentication; what is the other?

A. Accessibility


B. User rights assignments


C. Authorization


D. Inheritance

C. Authentication is used to identify a user, and authorization is used to control access of the user.
6. You are an administrator of your company network. You use the Computer Management Console to modify authentication groups. Which group provides complete control to all computers in a domain?

A. Administrators


B. Domain Admins


C. Enterprise Admins


D. Power Users

B. Members of the Domain Administrators group have complete and unrestricted access to computers in the domain. The domain administrator account, the Domain Admins group, and the Enterprise Admins group are all members of the domain Administrators group by default.
7. Windows supports two types of networks: domain and workgroup. Which type of network provides single sign-on capabilities so that users can use the same username and password regardless of the computer they use?

A. Workgroup


B. Domain


C. Both A and B


D. None of the above

B. An important benefit of a domain is that it provides single sign-on capabilities. In a domain, each user has one account that they can use to log on to almost any computer in the domain. In a workgroup, users need a separate account for each computer.
8. The GPO scope refers to where it is applied. Which of the following scopes applies only to a single GPO?

A. Multiple GPOs


B. Domain OU


C. Local Computer Policy


D. Both B and C

C. A Local Computer Policy applies to only a single GPO, but other GPOs can apply to many users and computers in the organization.
9. When Group Policies are used to configure settings in a domain, typically the last GPO applied is the setting that is applied. You can, however, override this behavior using one of the following Group Policy settings—which one?

A. Block Inheritance


B. Loopback Processing


C. Computer GPO


D. Enforced

D. Very often you’ll want to configure settings and ensure that they are not overwritten or blocked. Normally, the last GPO applied wins, but you can use the Enforced setting to override this default behavior.
10. When referring to authorization, which of the following statements is true?

A. Users are granted rights and permissions based on the user accounts that authenticate them.


B. Local administrator accounts are not available in a domain.


C. Rights identify the resources a user can access.


D. All of these statements are true.

A. Users are granted rights and permissions based on the user accounts that authenticate them. If users log on with the local administrator account, they are able to perform any action and access any of the resources on the system.
11. You have a Windows 8.1 user who installed a special printer on his computer. The computer is part of the Accounting group. In order for all members of the Accounting group to print to the printer, what permission must you give to the Accounting group?

A. Print


B. Manage Printer


C. Manage Spooler


D. Manage Print Queue

A. Groups are granted rights and permissions based on the user needs that are members of the group. All permissions granted to a group are conferred to the members of the group. To allow printing, apply the Print permission.
12. Which node in the Group Policy Editor would you use to deploy software to users?

A. Software Settings


B. Software Deployment


C. Software Services


D. Software Distribution

A. The Software Settings node can be used to deploy software to clients. Software deployed with Group Policy can be automatically installed on computers or installed based on a user’s action. For example, a Group Policy–deployed application can appear on a user’s Start menu and be installed when the user first selects it or deployed to a computer and installed the next time the computer restarts.
13. Your company upgraded to Windows 8.1 to ensure a more secure computing environment. You must now configure all client computers to require two-factor authentication. One of the authentication factors requires more than four characters or gestures. Which two authentication methods must you choose?

A. Picture Password


B. Microsoft account


C. Biometric authentication


D. PIN

B and C. Authentication is used to identify a user, and authorization is used to control access of the user. When two authentication factors are required it means that the two methods must be from two of the following categories:
14. As part of a rollout of Windows 8.1 computers, all users are required to use a new timesheet application that is accessible in Windows Store. To ensure that all users can log in and use the timesheet app, what should you do?

A. Take a credit card from each user and charge them for using the app.


B. Install the app on every computer.


C. Load the app activation key in the GPO for the app.


D. Create a Microsoft user account to access the app.

D. Users are granted rights and permissions according to their user accounts and the groups of which they are members.
15. You received a request from the Director of Operations saying that his Windows 8.1 users are unable to download tools onto their workstations, and he asked you to make the users members of their local Administrators group to do this. However, a new security policy prevents you from making all the users administrators of their machines for the purpose of downloading tools. What should you do?

A. Install all the tools yourself.


B. Make all users members of the local Administrator Group, but keep it quiet.


C. Set the Internet Zone Security to Medium.


D. Change the setting in Group Policy.

D.Group Policy settings can be configured using the Group Policy Management Console in a domain.
16. You are in charge of 1,000 Windows 8.1 workstations in the main office of your company. Something is causing all the machines to lock out their users with the message that they don’t have sufficient rights to log on. To avoid the company shutting down, what should you do?

A. Disconnect everyone from the network.


B. Create a GPO to block inheritance to determine if a GPO is causing the problem.


C. Move everyone to a group not affected by Group Policy.


D. Link a GPO to the OU that contains the computers you need to manage after hours.

B. It’s possible to block the inheritance of all GPOs for an OU. For example, you could create an OU for testing purposes and decide that you don’t want to allow GPOs from the domain or parent OUs to apply. You can enable the Block Inheritance setting on the OU.
17. The security manager has issued a directive that new users not be allowed to download documents from any corporate machine to a removable storage device, such as a USB “thumb” drive. Existing users should still be able to do so. What’s the best way to do this using Group Policy?

A. Create a GPO and set Allow Save To External Devices to Disabled.


B. Create a GPO and set Enable External Devices to False.


C. Create a GPO and set Prevent Installation Of Removable Devices to Enabled.


D. Create a GPO and set Allow Administrators To Override Device Installation Restrictions Policies to Enabled.

C. Group Policy settings can be configured using the Group Policy Management Console in a domain. The Prevent Installation Of Removable Devices prevents the use of any new removable devices. It will only affect new devices that are added.
18. What is the default setting for how often a computer checks for Group Policy settings?

A. Every 90–120 minutes (90 minutes with a random offset of 30 minutes)


B. Every 60–120 minutes (90 minutes with a random offset of 30 minutes)


C. Every 60–90 minutes (90 minutes with a random offset of 60 minutes)


D. None of the statements is true.

A. A computer will check for updates or changes to computer Group Policy settings every 90–120 minutes (90 minutes with a random offset of 30 minutes).

19. You created a folder on the corporate file server and shared it for a certain group of users. You have one set of users in the group that need only read permission; a second set needs full access to the files and you need to make sure that no user can delete the folder. How can you configure permissions to protect the share?


A. Assign a group named Read and give the group Read permissions only and create a group name Owner and assign the Owner group the Full Control permission and use special permission to remove the Delete permission.


B. Assign the Read group Read permissions and give the latter group Full Control.


C. Assign the Read group Read And Modify and the latter group the Delete permission.


D. The folder should be set to Not Shared.

A. By using special permissions, you can give the Owner group Full Control except for deleting.

20. You installed and allocated 20 Windows 8.1 tablets to the night nursing staff. You need to force the tablets to sleep when users press the power button. What should you do?


A. In Power Settings, enable Sleep When Not In Use.


B. Enable Sleep When Not Active in the tablet’s BIOS. Administrator accounts are not available in a domain.


C. Create a GPO to configure Power Options.


D. Create a GPO to configure Button Options.

D. Button options control the action that takes place when you use a particular button, such as the Power button. Using a GPO will allow you to set this for all users