• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/115

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

115 Cards in this Set

  • Front
  • Back
Name the configuration Passes for each answer file.

................................................................................
Configuration Pass
Answer File Name
[a]
Autounattend.xml
[b]
Autounattend.xml
[c]
Unattend.xml
[d]
Unattend.xml
[e]
Unattend.xml
[f]
Unattend.xml
[g]
Unattend.xml
a windowsPE
b offlineServicing
c Specialize
d Generalize
e AuditSystem
f AuditUser
g oobeSystem
A(n) ____ installation requires computers to be booted into Windows PE from removable storage and then run the Windows 7 installation from a distribution share.
distribution share
____________________ multitasking allows a single process to be interrupted by another process, even if the first process has not completed.
Preemptive
An ____ installation requires you to manually start and perform the installation.
attended
Images can be mounted to a folder in a(n) ____ partition for modification.
NTFS
A(n) ____ installation requires computers to be booted into Windows PE from removable storage and then run the Windows 7 installation from a distribution share.
distribution share
____________________ is a process put in place by Microsoft to reduce piracy
Product activation
____ systems have more than one physical CPU.
Multiprocessor
____ technology assumes that hardware components can be connected or activated at any time while the operating system is running.
Plug and Play
When two operating systems are installed on the same computer and you can switch between them, it is referred to as a(n) ____________________ installation.
dual boot
What are the four mainstream versions of Windows 7?
• Windows 7 Home Premium
• Windows 7 Professional
• Windows 7 Enterprise
• Windows 7 Ultimate
Windows 7 supports the ___________________________________ architecture that replaces the older Windows Driver Model (WDM) common to earlier Windows operating systems.
Windows Driver Foundation (WDF)
Windows PE includes networking components and allows you to use current Windows drivers for network connectivity
True
____ adds the ability to securely encrypt the hard drive’s contents at a hardware level.
BitLocker Drive Encryption
For security reasons, Windows 7 is less modular than previous versions of Windows
False
____ CPUs have extra hardware built in to allow more than one thread to be processed at the same time on a single CPU.
Hyper-Threading
A ____ is a collection of computers and users that are identified by a common security database.
domain
When ImageX is combined with ____, you can completely automate the deployment process to include partitioning and formatting hard drives
Windows Deployment Services (WDS
____ is a graphical utility suitable for migrating user settings and files from one computer at a time
Windows Easy Transfer
When you are using ImageX to deploy images with operating systems and applications, you must boot using ____ and connect to the distribution share holding the image file
WindowsPE
Windows 7 includes a speech recognition system to add an input method beyond the keyboard and mouse
True
____ is a limited and non-GUI version of Windows based on Windows 7 technologies that can be used for installing, troubleshooting, and repairing Windows 7.
Windows PE
____ is included as part of the WAIK to create, modify, and apply workstation images
ImageX
If you do not specify an answer file, then Sysprep will search for ____ to use as an answer file.
unattend.xml
____ adds the ability to securely encrypt the hard drive’s contents at a hardware level.
BitLocker Drive Encryption
In a corporate environment the most common use for Sysprep is preparing workstations to capture an image. This process is known as ____.
generalization
Briefly describe the overall steps of the imaging process
The overall imaging process is as follows:
1. Install and configure Windows 7 and applications on a source workstation.
2. Use Sysprep to generalize the source workstation for imaging.
3. Boot the source workstation using Windows PE.
4. Use ImageX to capture the image from the source workstation and store it in a distribution share.
5. On the destination workstation, use Windows PE to connect to the distribution share.
6. Use ImageX to apply the image in the distribution share to the destination workstation
The path to the distribution share should always be referred to by the ____ path to ensure that it can be accessed over the network during unattended installations
Universal Naming Convention (UNC)
What are the differences between kernel mode drivers and user mode drivers?
Kernel mode drivers have direct access to all hardware and memory. Most hardware drivers for older Windows operating systems are kernel mode drivers. A kernel mode driver has the ability to corrupt memory and disable hardware, completely crashing the operating system.

User mode drivers have restricted access and must pass a request to the operating system to make a change to hardware. A driver that operates in user mode cannot directly crash the operating system. If a user mode driver crashes, the rest of the operating system is left intact.
____ are software packages containing drivers, service packs, or security updates that are applied to an image during the offlineServicing configuration pass of the installation.
Offline updates
____________________ installation requires the creation of a customized image that you apply to each computer.
Image-based
Which Control Panel applet shows basic information about your computer and provides links to configure system properties?
System
Which of the following accurately describe the Administrative Tools available in Control
Panel? (Choose all that apply.)
Most are MMC consoles


b.
You can schedule tasks


e.
You can manage device drivers.
Which Control Panel applet is a centralized panel to view security and maintenance information
for Windows 7?
Action Center
Which Control Panel applet allows to install and remove optional components of Windows 7?
Programs and Features
A _____ is a type of Windows application that runs in the background without user intervention.
service
Which Control Panel applet lets you control the size of fonts? (Choose all that apply.)
Fonts

Display
The administrative tool that is used to configure data sources for applications that require access to databases is called?
ODBC
Which of the following are found in Administrative Tools? (Choose all that apply.)
Event Viewer



Windows Memory Diagnostic



Computer Management



Task Scheduler
You would like to builid a customize MMC to the console. What will you need to add to the console it?
snap Ins
Which MMC access mode allows users to create new windows, but prevents them from
viewing some of the console tree?
User mode—limited access, multiple window
Which snap-ins are available in Computer Management? (Choose all that apply.)
a.
Task Scheduler


c.
Services


e.
Device Manager
Which tasks can you accomplish using the Services administrative tool? (Choose all that
apply.)
a.
Stop a service


b.
Configure a service to start automatically


d.
Configure the credentials for a service
What software is used to manage communication between hardware components and Windows 7?
device driver
Which task can you perform in Device Manager? (Choose all that apply.)
Determine which devices do not have a driver loaded


b.
Disable devices


d.
View hardware resource configuration


e.
Roll back device driver
With a signed device driver, which of the following can Windows 7 do? (Choose all that apply.)
a.
Determine if a driver has been modified


c.
Determine if the publisher is valid
Which devices are supported in Windows 7?
b.
PCI devices


c.
Plug and play devices


d.
USB devices


e.
Game controllers
Hybrid sleep is a combination of which ACPI power states? (Choose two.)
S3


c.
S4
Which requirements must be met to use the Aero Glass display theme? (Choose all
that apply.)
b.
Support for WDDM


c.
Support for DirectX 9.0c


d.
Do not use Windows 7 Starter Edition
Tom walked away from his computer briefly to get coffe from the break room, But when he returned he noticed his computer was in sleep mode. Once he hit the key board it responded? Which ACPI power state was his Windows 7 computer in at time?
a.
S0
What is the primary purpose of the screen saver in Windows 7 ?
security
A file that is stored in sequential sectors occupies _____ general area of the physical disk.
less
____ partitions are the only type of basic disk partitions designed to store files that are used to load an operating system.
Primary
The ____ volume will stripe data and error-correcting information about the data across each of the dynamic disk members.
Raid 5
____ provides a graphical interface that allows a member of the Administrators group to observe and make changes to the computer’s disk configuration.
disk management
The Disk Management console will report the status of the disk as a(n) ____ when it recognizes that the disk does not belong to that computer.
foreign
A data partition you have recently formatted using FAT32 is larger than required. You decide to decrease the size of the partition by shrinking it. This can be accomplished by ______
backing up the existing files, deleteing the partition, creating a smaller partition using a smaller size, and restoring the file data from backup
A Dynamic volume and basic disk partitions can be shrunk using the following utilities.
b.
diskpart


c.
disk management
Choose the common administrative tasks for partitions and volumes.
a.
shrinking and creating partitions


d.
deleting partitions and volumes
You suspect that the data partition known as drive E: on your system is unhealthy. To check the health of drive E: what should you do next?
Open the properties of drive E:
An existing hard disk contains a second primary partition that is currently used to store data files. You are running out of space and would like to expand the data partition. There is only 8 MB of unpartitioned disk space available on the hard disk. You have added a new hard disk and have verified that the new disk is properly recognized by the operating system. You would like to span the data partition across to the new hard disk. To do this you must first ______
backup the original partition data, create a new dynamic volume that spans the two disks, and restore the data
Upon opening the Disk Management console you notice a disk whose status is reported as Foreign Disk. This is most likely because ______
the disk was moved from another computer
You decide to move a hard disk from your computer to another computer that is also running Windows 7. The disk is currently configured as a dynamic disk. The file data it currently contains must be accessible on the destination computer. Before moving the disk you should ______
backup the disk’s data contents
You are attempting to inspect the partition information for an existing hard disk using DiskPart utility. After issuing the LIST PARTITIONS command you receive an error message stating that no disk is selected for the action. Assuming the disk is the first hard disk in the computer which command should you issue next?
SELECT DISK=0
Your computer currently runs the Windows 7 operating system. You have added a second 20 GB hard disk drive to your computer to hold research data for a project you are working on. You have created a single simple volume on the data hard drive that takes up all the free space on the disk. After formatting the simple volume with the FAT32 file system and copying 10 GB of data to the volume you realize that you need 8 GB of un-partitioned disk space on the data disk drive. The next step you should take to free space on the data disk drive is to ______
delete the existing simple volume and create a new one using the correct size
The maximum number of logical drives that can exist within a single extended partition is ______
only limited by the availability of free space in the extended partition
A mirrored volume is also known as a RAID ___ implementation
1
What is the maximum size partition that can be created with MBR partition style?
2TB
Of the five types of dynamic disk. Which type is fully fault tolerent if failure occurs one disk?
a.
mirrored volume


d.
Raid 5 volume
File throughput performance when reading and writing large files is typically better for striped volumes than simple volumes
True
Using the 8.3 DOS name how many file aliases can exist in the same NTFS
directory?
300 thousand
A 40GB partition can be formatted with which file systems (choose all that apply)?
NTFS
Dynamic disk NTFS partitions are limited to ___________.
16 TB
When the amount of disk space being used by users is restricted what has been
enabled?
Quotas
Which of the following is NOT an advantage of NTFS?
Legacy system support for multi boot environments
A user is given Read permission to a file stored on a NTFS formatted volume. The file is then copied to a folder on the same NTFS formatted volume where the user has been given Full Control permission to that folder. When the user logs on to the computer holding the file and accesses its new location via a drive letter what is the user’s effective permission to the file?
Full Control
Each NTFS file has both DOS based and Unicode file names. What is the limit to
the length of the Unicode file name in characters
255
True or False? EFS is local-access technology; when encrypted files are sent
over the network they are unencrypted.
True
True or False? The transactional NTFS system in Windows Vista and Windows 7
is designed to protect NTFS system files and information as well as the data
stored inside those files and folders.
True
A portable flash memory device with 64 GB of storage is attached to a computer through a USB connection. The device allows the user to store music and other media files in its internal memory by presenting it to the user as a hard disk. Which file system would be appropriate when formatting the device?
exFAT
A 4GB partition can be formatted with which file systems (choose all that apply)?
b.
FAT16


c.
FAT32


d.
NTFS
How does EFS protect a user’s file from unauthorized access?
From an attacker that physically removed the hard disk
Compression of a file is controlled by____________________.
a.
An attribute of the file
A user has been granted Full Control to a NTFS folder on your computer. The user has created all the documents that exist in the folder. Another administrator accidentally adds a permission setting denying the Write permission to that user. The next time that user logs in and opens the file, when they try to save their changes to the file they will notice?
Access to save the changes is denied
Which command line utility is used to manage the Encrypt attribute flag in
Windows 7?
cipher
A volume or partition can be expanded by creating an empty folder and pointing it to another partition on the computer. What NTFS feature makes this possible?
Volume mount points
A user is given Read permission to a file stored on a NTFS formatted volume. The file is then moved to a different folder on a different NTFS formatted volume where the user has been given Full Control permission to that folder. When the user logs on to the computer holding the file and accesses its new location via a drive letter what is the user’s effective permission to the file?
Full Control
Windows XP, Windows Vista and Windows 7 will only use FAT32 for drives
smaller than __________.
c.
32 GB
A user is assigned Read permission to the NTFS folder C:\ACCOUNTING. They must not have access to C:\ACCOUNTING\ADMIN. This can be accomplished by:
Blocking permission inheritance at C:\ACCOUNTING\ADMIN and not assigning the user any permission to C:\ACCOUNTING\ADMIN
What do the numbers FAT12, FAT16 and FAT32 after the letter FAT represent?
c.
The number of binary bits used in the address of data block
The software designed to perform unauthorized acts on a computer is called?
Malware
The encryption method that uses the same key to encrypt and decrypt the data is called?
Symmetric encryption
Windows 7 auditing can be enabled through which feature? Select all that apply.
c.
Local security policy


d.
Group Policy
Both inbound and outbound network packets can be controlled by enabling Windows 7 ________ feature?
Firewall protection
A roaming profile can be stored on any local device, but not on the network.
False
What is the requirement to make a user profile mandatory? Select all that apply.
b.
Rename the NTUSER.DAT file


e.
Change the user profile name to NTUSER.MAN
Which groups is not a Windows 7 built groups?
c.
NFS Operators


e.
Performance Encryption monitors
What are the naming restrictions imposed by Windows 7? Select all that apply.
a.
User logon names must be unique


b.
User logon name must be 20 characters or less


c.
User logon names cannot contain invalid characters


d.
User logon names are case sensitive
What are the Windows7 logon method configurations? Select all that apply
a.
Standalone


b.
Workgroup member


c.
Domain client
Select which items are built-in groups in Windows 7?
a.
Printer log operators


b.
Guest


c.
IIS_IUSRS


e.
Remote Desktop users
Which account lockout policy setting is used to configure the time frame in which incorrect logon attempts must be conducted before an account is locked out?
Reset account lockout counter after
Evaluating DLL files for software restrictions has a minimal performance impact because of caching.
False
To encrypt a file by using EFS, the file must be stored on an NTFS formatted partition.
True
BitLocker Drive Encryption is user aware and can be used to protect individual files on a shared computer.
False
Which categories of updates can be downloaded and installed automatically by Windows Update?
b.
Important


c.
Recommended


d.
Optional
Because user names are case sensitive, you can use capitalization to ensure that they are unique.
False
Which characteristics apply to the Guest account?
a.
It has a blank password by default


b.
It cannot be deleted


d.
It is disabled by default
The ______ built-in local group has been depreciated and is no longer recommended for use by Microsoft.
Power users
Standard user accounts are more usable in Windows 7 than previous version of Windows because User Account Control elevates privileges as required
True
Which tasks can be performed by using the User Accounts applet in Control Panel?
a.
Change your password


b.
Change your picture


d.
Change your account type


e.
Change your name
Which user management tool is required to assign a logon script to a user?
Local Users and Groups MMC snap-in
In a domain-based network each server authenticates users by using the SAM database
False
Which editions of Windows 7 have the option to use Parental Controls?
a.
Windows 7 Home Premium


c.
Windows 7 Ultimate


d.
Windows 7 Enterprise in a workgroup
Which program or utility do you use to copy an existing user profile to the default user profile?
Sysprep
Each user account is assigned a_____to ensure that security is kept intact if the account is renamed.
SID Security Identifier