Filters
Question type

Which of the following do newer Windows applications use to describe the structure of an application?


A) Manifest
B) Log
C) Record
D) Hash

E) B) and C)
F) C) and D)

Correct Answer

verifed

verified

A

Hang owns a Windows 10 laptop that does not have any issues. She is configuring Windows Update settings on this laptop. Which of the following settings should Hang leave turned on?


A) Receive updates for other Microsoft products when you update Windows
B) Pause updates
C) Restart this device as soon as possible when a restart is required to install an update
D) Download updates over metered connections

E) A) and D)
F) All of the above

Correct Answer

verifed

verified

Yixuan, a system administrator, configures Windows Update for Business in her organization to control updates for Windows 10 systems. The settings are configured such that a test system first receives any new Windows update and other Windows systems receive the update after two weeks. Being a small organization, Yixuan wants to reduce bandwidth consumption during the organization-wide update. Which of the following options should Yixuan use in this scenario?


A) Pause updates
B) Delivery optimization
C) Change active hours
D) Update notification

E) None of the above
F) All of the above

Correct Answer

verifed

verified

TropicMaze is a manufacturer of processed foods. The packaging at the plant is automated by machines that are controlled by a Windows 10 computer. Which of the following indicates that this computer receives updates using Long Term Servicing Branch?


A) The computer receives Windows Updates at irregular intervals.
B) The computer receives the latest feature updates from Microsoft every six months.
C) The operating system on the computer will receive Windows Updates for 10 years.
D) The updates applied to the operating system come with version numbers such as 1909.

E) A) and C)
F) B) and D)

Correct Answer

verifed

verified

Shawn signs into a Windows 10 system with administrative user privileges. The system has UAC enabled. Shawn accidently launches a malicious application that is infected with malware. If the malware is able to access and corrupt the system files, which of the following must be true?


A) The Application Information Service has stopped or is set to start manually.
B) The application launched with standard user privileges, the same as the Windows 10 interface.
C) On a prompt to continue or cancel running the program, Shawn selected to continue.
D) Shawn entered the credentials of a user with administrative privileges after opening the application.

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

Kesha spends time analyzing datasets that are larger than 1 TB in job as a data scientist. This data is stored in databases on her Windows 10 system. While running an analysis on these databases, she does not want her code to be slowed down because of real-time scanning by Windows Defender. Which of the following settings should Kesha modify to solve this problem?


A) Exclusions
B) Tamper protection
C) Notifications
D) Cloud-based protection

E) A) and C)
F) B) and C)

Correct Answer

verifed

verified

Macy works as a system administrator at an accounting firm. Sensitive data is stored on all Windows 10 client systems. She wants to audit all access to files on these systems, so she decides to edit the Global Object Access Auditing category. In order to complete this task, which of the following conditions should be met?


A) The files and folders must be on NTFS-formatted volumes.
B) This category must be edited using auditpol.exe.
C) Macy must first edit the settings under the Privilege Use category.
D) Macy must configure auditing at the individual file and folder level.

E) B) and C)
F) B) and D)

Correct Answer

verifed

verified

Which policy allows you to configure an account to be temporarily disabled after a number of incorrect sign-in attempts?


A) Domain
B) Group
C) Account Lockout
D) Password

E) B) and C)
F) C) and D)

Correct Answer

verifed

verified

Jimmy downloaded a game from the Internet and installed it on his Windows 10 system. A couple of days after the installation, his computer's performance degraded drastically. Assuming that the game had slowed it down, he uninstalled the game and used software to get rid of residual files. Despite this, his computer's performance did not improve. Inspecting the Resource Monitor revealed that the Memory and CPU were running close to 100% capacity. He suspects that the computer is infected with malware. Which of the following scans would you recommend to Jimmy?


A) Real-time scanning
B) A full scan
C) A quick scan
D) A custom scan

E) B) and C)
F) C) and D)

Correct Answer

verifed

verified

B

An application installed on a Windows 10 system requires access to restricted areas on the system to place user data. However, this application is not UAC compliant. To enable this application to run properly, which of the following UAC options should be enabled?


A) Run all administrators in Admin Approval Mode
B) Switch to the secure desktop when prompting for elevation
C) Detect application installations and prompt for elevation
D) Virtualize file and registry write failures to per-user locations

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

Hannah, a system administrator, wants to use Windows Update for Business in her organization to control updates for Windows 10 systems. While she is able to use Group Policy to apply these settings to most computers, she is unable to apply these settings to some computers. Which of the following is the most likely reason that Hannah is not able to apply the Windows Update for Business settings to these computers?


A) These computers are part of a domain rather than a workgroup.
B) These computers are running preview builds of Windows 10.
C) These computers are running the Windows 10 Home edition.
D) These computers are designated test computers for new updates.

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Oluseyi receives a link to a free download of a premium application in his email. He clicks the link and the application downloads. Before installing it, he wants to verify the authenticity of the download. He verifies the MD5 value of the downloaded application against the MD5 value listed for the application on the original website. The MD5 values do not match. Which of the following is true in this scenario?


A) The downloaded application has been modified from its original and authentic version.
B) The MD5 value is generated by a symmetric encryption algorithm.
C) The file name of the downloaded application does not match the original file on the website.
D) Oluseyi's email is compromised, and his mailbox is most likely infected by malware.

E) B) and C)
F) A) and C)

Correct Answer

verifed

verified

Raphael, a system administrator, is setting up the password policy for local user accounts. He allows users to reuse a password after they have used 4 different passwords. He also modifies the policy to force users to change their old passwords every 60 days. After some time, he notices that users are modifying their passwords 4 times in a short time span and continuing to use their old passwords. This defeats the purpose of setting up the password restrictions. Which of the following settings should Raphael modify to control this behavior?


A) Raphael should modify the setting to enforce password history.
B) Raphael should set the Minimum password age setting to at least 1 day.
C) Raphael should modify the Maximum password age setting to 60 days.
D) Raphael should set the Minimum password length to 10 characters.

E) A) and D)
F) B) and D)

Correct Answer

verifed

verified

Oshane is configuring security settings on his computer. Recently, his friend's computer was attacked by malware that encrypted data on all the hard disks and demanded a cryptocurrency ransom to decrypt this data. Which of the following options in Windows 10 is the best option to help Oshane avoid a similar situation?


A) Windows Defender Application Guard
B) Windows Defender Smartscreen
C) Controlled folder access
D) Secure boot

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Joanna, a graphic designer at ChromaStage, has an application installed on her UAC-enabled Windows 10 system that was designed for an older version of Windows. Some of the application's features require administrative privileges. When she tries running the application, the application fails to run and generates an error instead. If Joanna's account already has administrative privileges, what can she do to resolve this issue?


A) She should add an entry in the application manifest to trigger the privilege elevation prompt.
B) She should sign in with another user account that has administrative privileges.
C) She should sign in with a user account that has standard user privileges.
D) She should use the Application Compatibility Toolkit to resolve the issue.

E) B) and C)
F) A) and C)

Correct Answer

verifed

verified

Vishal is considering switching to BitLocker Drive Encryption because of the inefficiencies of EFS. When he tries to use this encryption feature on Windows 10 Professional, he is unsuccessful. Which of the following is the most likely reason?


A) The motherboard in the computer does not contain a TPM module.
B) BitLocker Drive Encryption is unavailable on Windows 10 Professional.
C) Vishal encrypted some files and folders using EFS.
D) The hard drive does not contain a system volume.

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Veronica copies an unencrypted file from one partition on her hard drive to an encrypted folder on another partition. From there, she moves the file to a folder on a flash drive. If the file on the flash drive is encrypted, which of the following must be true?


A) The folder on the flash drive is an encrypted folder.
B) Copying the file to the encrypted folder encrypted the file.
C) The flash drive is a FAT32-formatted volume.
D) Moving the file to the flash drive encrypted the file.

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

Which of the following is a method for protecting data on removable storage, such as USB drives?


A) NTFS
B) EFS
C) BitLocker To Go
D) Account Lockout Policy

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

Guillaume has a Windows 10 personal laptop. He wants to ensure that the Microsoft Store apps on his computer are kept updated. What can Guillaume do to ensure this?


A) Use Windows Update to update these apps regularly
B) Turn on automatic updates in the Microsoft Store
C) Use the Get-HotFix cmdlet on command prompt
D) Turn on the Receive updates for other Microsoft products when you update Windows option

E) B) and C)
F) B) and D)

Correct Answer

verifed

verified

B

Dorothy, a system administrator, uses BitLocker To Go to protect USB drives that are used in the organization. She chooses the Use a password to unlock the drive option when picking between unlocking options. Warren wants to print some files, so he copies these files from his work laptop onto a USB drive. Next, he plugs in this drive on a computer that is connected to a printer. If Warren is able to print the files on the USB drive successfully without entering any password, which of the following must be true of the computer connected to the printer?


A) The computer is not running Windows 10 Home.
B) The computer has a smart card reader.
C) The motherboard on the computer has a TPM module.
D) The computer is marked as a trusted environment.

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

Showing 1 - 20 of 31

Related Exams

Show Answer