Question: From which of the following groups does a standard user account inherit its privileges from? a. The local Users group b. The Device Owners group
From which of the following groups does a standard user account inherit its privileges from?
a. The local Users group
b. The Device Owners group
c. The Administrators group
d. The Power Users group
How can you install an MSIX app if it is not available on the Microsoft Store?
a. By installing the app by a single click
b. By enabling sideloading in Windows 10 settings
c. By packaging the app as an MSI file
d. By using the system.exe file included in the app
Where are the configuration changes made to an application stored on Windows 10?
a. The registry
b. The Documents folder
c. The Windows API
d. The Microsoft Store
Chao, an accountant, uses Windows 10 on his work laptop. He installs the latest version of Microsoft Edge in February 2020 on his laptop.
Which of the following is true of this scenario?
a. The laptop is running Windows 10 version 2004 or later.
b. Chao most likely installed a version 45 or an earlier edition of the Edge browser.
c. The new browser is based on the open source Chromium browser.
d. Chao will be able to run legacy applications that use ActiveX on the new browser.
Mei is using an SSL VPN on her Windows 10 computer to access a remote access server.
Which of the following ports is used by the SSL VPN on Mei's computer?
a. UDP port 4500
b. TCP port 443
c. UDP port 500
d. TCP port 1723
In the context of the methods for purchasing Windows 10 licenses, which of the following is true of volume licensing?
a. It is purchased by organizations to obtain software directly from Microsoft.
b. It is a type of licensing enabled by signing in to Microsoft Azure AD.
c. It is the license included in a new computer with preinstalled Windows 10.
d. It is a type of license that is tied to a computer and cannot be reused if a new computer is purchased.
All the computers in the laboratory of a local university are connected to a domain. A domain policy configures the computer to display a specific wallpaper on the desktop when the computers are booted. One of the students with administrative access applies a GPO that allows the students to change the wallpaper to their liking. However, they are not able to do so.
What do you think is the issue here?
a. The students have signed in using local accounts instead of domain accounts.
b. The settings in the computer and user policies are the same.
c. Domain policies take precedence over local policy settings.
d. More than one Group Policy was applied to the computers.
A user is facing an issue with a particular application on their system. From the description of the issue, you realize that the issue can be resolved using the Registry Editor.
Which of the following is true of using Registry Editor in this scenario?
a. You can connect remotely while the user is signed in and working on their system.
b. The user will be able to see the actions that you are performing on their system.
c. The user will be prompted to accept the connection.
d. You will be signed in using your user account and the user at the console will be disconnected.
Anita, a network administrator, is troubleshooting a connectivity issue on a colleague's computer. The computer was receiving lookup responses that the services it was trying to connect to were not available. The computer was trying to send requests to the corporate DNS server. However, other employees in the organization were able to access the services.
Which of the following issues could have likely caused the connectivity issue?
a. The default gateway that the computer was accessing was incorrect.
b. The computer had multiple DNS server configurations, including that of the ISP.
c. The computer was facing network connectivity issues and could not reach the corporate DNS server.
d. The IP address being used was IPv6 instead of IPv4.
Ria and Olivia own and run a startup, a marketing agency. Olivia is working on the creatives for an upcoming ad campaign for a client. On the day of the campaign launch, Olivia has a family emergency that requires her to travel to a remote location. She sends Ria a text message, but she forgets to send the final creatives or leave her laptop password so that Ria can access the files. Ria tries reaching Olivia but cannot contact her.
If Olivia's laptop is unencrypted and accessible, what is Ria's best option to extract the files that she needs for the ad campaign?
a. Start Olivia's laptop by booting it from a USB drive and run Linux with an NTFS driver
b. Reset the Windows 10 laptop using the Keep My Files option
c. Connect Olivia's laptop to the same network as her laptop is connected to and access these files over the network
d. Reinstall the operating system on the partition that does not contain the ad campaign files
Shirley builds a desktop computer with various components sourced from vendors. She has a 64-bit 2.4 GHz processor, 2 GB RAM, 256 GB SSD, and a DirectX 9 graphical processor. Shirley installs the 64-bit Windows 10 Home edition on this computer and notices that the performance of the computer is sluggish.
If Shirley wants a satisfactory user experience, which of the following changes should she make?
a. Replace the SSD with a hard disk drive
b. Replace the processor with a 32-bit processor
c. Increase the RAM to 8 GB
d. Remove the video card driver
Ashwin signs into his Windows 10 laptop using his user account. The OneDrive client is installed with the OS. However, he is unable to use the OneDrive node in File Explorer to save files to OneDrive.
Which of the following, if true, would resolve this issue?
a. Ashwin has an external storage device that offers more storage than OneDrive.
b. Ashwin can use the web interface to access OneDrive.
c. Ashwin's laptop does not have the latest Windows 10 update.
d. Ashwin can sign in to his laptop using his Microsoft account.
A hacker finds a flaw in Windows that compromises a popular browser. Instead of reporting the flaw directly to Microsoft, the hacker posts a detailed blog about the flaw. A malware developer creates malware that can exploit this flaw. Rihanna receives a notice from Microsoft that asks all Windows users to stop using this browser until a security fix is issued. After a few days, Microsoft issues a security fix.
In which of the following instances is Rihanna's computer least likely to be infected by malware?
a. Rihanna installs the update immediately after it is issued by Microsoft.
b. Rihanna disables Windows Defender Antivirus on her computer until the fix is announced.
c. Rihanna continues using the browser until a fix is issued.
d. Rihanna disables automatic Windows Updates on her computer.
Rizwan, Tina, and George are using the same Windows 10 computer in shifts. They need to be able to share files with each other and work on common files, although not simultaneously.
What is the easiest method of enabling this?
a. Setting up a file server and allowing them to access the files from there
b. Asking them to use the Share tab in File Explorer and sharing files with each other
c. Turning on sharing for the folder so that anyone in the organization can access the folder
d. Placing the common files in the Public folder and asking them to use that folder
Your computer is running out of storage, and you decide to remove files that are no longer necessary. Which of the following administrative tools will help you identify such files?
a. Disk Cleanup
b. Recovery Drive
c. Computer Management
d. Defragment and Optimize Drives
Samantha uses facial recognition to sign in to her Windows 10 laptop. She uses the same Microsoft account on different devices. She changes the password for her Microsoft account on her laptop. She can sign in to another device without having to enter the password manually.
Identify the advanced authentication method used in this scenario.
a. Windows Hello for Business
b. Username and password
c. Windows Hello biometric authentication
d. Picture password
Which wireless standard has a maximum data throughput of 54 MBps?
a. IEEE 802.11a
b. IEEE 802.11ax
c. IEEE 802.11b
d. IEEE 802.11ac
You prepare a source system for imaging by installing the necessary applications and configuring the operating system settings. Next, you run the Sysprep utility.
What will this utility do?
a. It will remove system-specific data from the source workstation.
b. It will capture the image from the source workstation.
c. It will apply the image to the destination workstation.
d. It will connect to the distribution share or external storage.
Darwish configures File History on his computer. The backup files and folders are stored on an external hard drive. He opens a file from the Documents folder, makes a few changes, and saves it.
Where will the modified file be backed up on the external drive?
a. In the same folder, rewriting the older file
b. In a new folder at the root of the external hard drive
c. In the same backup folder as the previous version
d. In a subfolder called Backup within the Documents folder
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
