MCSA Windows 10 Study Guide. Panek William
Чтение книги онлайн.
Читать онлайн книгу MCSA Windows 10 Study Guide - Panek William страница 7
B. From the properties of the D:
volume, modify the Quota settings.
C. From the properties of the D:
volume, modify the Sharing settings.
D. From the Disk Management snap-in, convert the hard disk drive that contains the D:
volume to Dynamic.
29. Which utility is used to upgrade a FAT32 partition to NTFS?
A. UPFS
B. UPGRADE
C. Disk Manager
D. Convert
30. Your organization has created an application for its employees. You need to deploy the internally developed application to all employees while minimizing the costs. What’s the best way to do that?
A. Install the application one system at a time.
B. Enable application sideloading.
C. Purchase System Center and deploy the application.
D. Run the Add-Application PowerShell
cmdlet.
Answers to Assessment Test
1. D. Only members of the Administrators group can manage mandatory profiles. See Chapter 9 for more information.
2. B. When you create a custom console for the MMC, the .msc
filename extension is automatically applied. See Chapter 4 for more information.
3. D. The feature the question is referring to is View Available Networks (VAN). Before Windows 10, when you used a wireless network adapter you would choose the wireless network that you wanted to connect to by using the wireless network adapter properties. In Windows 10, this is built into the operating system. See Chapter 1 for more information.
4. B. You would create a standard user account for the user. Standard users must provide the credentials of an administrator account when prompted by User Account Control (UAC) in order to perform administrative tasks. See Chapter 9 for more information.
5. C. You can use the DISM utility to create an image of a Windows 10 installation. After the image has been created, you can prepare the image with a utility such as the System Preparation Tool (Sysprep). The image can then be used for remote installations of Windows 10. See Chapter 2 for more information.
6. A. The Boot Configuration Data (BCD) store contains boot information parameters that were previously found in Boot.ini
in older versions of Windows. To edit the boot options in the BCD store, use the bcdedit
utility, which can be launched only from a command prompt. See Chapter 1 for more information.
7. D. The Narrator utility uses a sound output device to read onscreen text. See Chapter 5 for more information.
8. B, C. Windows 10 ships with a utility called the User State Migration Tool (USMT) that is used by administrators to migrate users from one computer to another via a command-line utility. The USMT consists of two executable files: ScanState.exe
and LoadState.exe.
See Chapter 2 for more information.
9. B. To get the latest drivers for any piece of hardware, you need to use the Upgrade Drivers button in Device Manager. After the upgrade button is chosen, you can use downloaded drivers or drivers from a new DVD. See Chapter 3 for more information.
10. A. Driver rollback allows you to replace a newly installed driver with the previous driver. You can do the driver rollback using the Device Manager utility. See Chapter 3 for more information.
11. D. The Printbrm.exe
command should be run from a command prompt with administrative permission. This command is the command-line version of the Print Management tool. See Chapter 3 for more information.
12. B. Sleep mode is a combination of standby mode and hibernation mode. When sleep mode is configured, the user’s session is quickly accessible on wakeup, but the data is saved to the hard disk. Sleep mode is the preferred power-saving mode in Windows 10. See Chapter 5 for more information.
13. B. PowerShell commands allow you to run multiple configurations by using scripts or even by using individual commands. See Chapter 4 for more information.
14. D. A subnet mask of 255.255.255.224 equals a CIDR of /27. CIDR is the number of on bits. See Chapter 7 for more information.
15. D. Windows 10 data compression is supported only on NTFS partitions. If you move the file to a FAT32 partition, then it will be stored as uncompressed. See Chapter 4 for more information.
16. C. You should use the subnet mask 255.255.255.0 on your network in this scenario. The IP network address 192.168.10.0 is a Class C address. Class C addresses, by default, use the subnet mask 255.255.255.0. The network portion of the address is 192.168.10, and the host portion of the address can be 1 to 254. See Chapter 7 for more information.
17. A. To enable synchronization of files between your laptop and a network folder, you must first upgrade your laptop to a version of Windows 10 that supports synchronization with network folders, such as Windows 10 Enterprise. Windows Sync Center also supports synchronization of files between computers and mobile devices. See Chapter 1 for more information.
18. B. The ipconfig /flushdns
command is used to purge the DNS Resolver cache. The ipconfig
command displays a computer’s IP configuration. See Chapter 7 for more information.
19. A. The easiest way is to simply rename Rick’s account to John. When you rename Rick’s account to John, John will automatically have all of the rights and permissions to any resource that Rick had access to. See Chapter 6 for more information.
20. A, C. Only administrators can create new groups on a Windows 10 computer. Group names can contain up to 256 characters and can contain spaces. Group names must be unique to the computer, different from all the other usernames and group names that have been specified on that computer. See Chapter 9 for more information.
21. A, C. You can create a spanned volume from free space that exists on a minimum of 2 to a maximum of 32 physical drives. When the spanned volume is initially created in Windows 10,it can be formatted with FAT32 or NTFS. If you extend a volume that already contains data, however, the partition must be NTFS. See Chapter 4 for more information.
22. D. When both NTFS and share permissions have been applied, the system looks at the effective rights for NTFS and share permissions and then applies the most restrictive of the cumulative permissions. If a resource has been shared and you access it from the local computer where the resource resides, then you will be governed only by the NTFS permission. See Chapter 6 for more information.
23. A. Port 25 should be opened on the firewall. SMTP is used for outbound mail and uses port 25. POP3, which is used for receiving inbound mail, uses port 110. See Chapter 7 for more information.
24. B. You should configure the bcdedit
utility to configure your boot order. See Chapter 1 for more information.
25. B, D. You can upgrade Windows 8 Professional and Windows 8 Enterprise to Windows 10 Enterprise edition. See Chapter 1 for more information.
26. A, B, C. Using Parental Controls, you can configure which websites your children can access, when they can use the computer, which games they can play, and which programs they can run, and you can view reports regarding their activity. See Chapter 5 for