s-blossom05
Quiz by , created more than 1 year ago

Lessons 6 - 8, 10 - 14

623
0
0
s-blossom05
Created by s-blossom05 over 8 years ago
Close

Windows Client - Test 2

Question 1 of 94

1

What is the maximum number of Windows 8 devices on which you can install a Windows app?

Select one or more of the following:

  • 1

  • 3

  • 5

  • 10

Explanation

Question 2 of 94

1

Which of the following can be use to turn off automatic download of updates from the Windows store on a Windows 8 computer? (Select all that apply)

Select one or more of the following:

  • Windows Store > Settings > App Updates > Move slider to No

  • gpedit.msc

  • gpmc.msc

  • AppLocker

Explanation

Question 3 of 94

1

Which of the following rule collections is used to configure an AppLocker rule for a packaged app?

Select one or more of the following:

  • Executable files

  • Scripts

  • Appx

  • Windows Installer files

Explanation

Question 4 of 94

1

To create rules for multiple packaged apps in a single step, which wizard would you use with AppLocker?

Select one or more of the following:

  • Create New Rule

  • Create Default Rules

  • Automatically Generate Rules

  • Create Multiple Rules

Explanation

Question 5 of 94

1

Where can you obtain a sideloading product activation key to sideload an app on a Windows 8 Professional computer?

Select one or more of the following:

  • Microsoft TechNet

  • Volume Service Center

  • Volume Licensing Service Center

  • Running sideloadkey.exe from a command prompt

Explanation

Question 6 of 94

1

Which option represents the order of precedence for GPOs starting from first to last?

Select one or more of the following:

  • Local Group Policy, Site GPO, Domain GPO, Organizational Unit GPO

  • Site GPO, Domain GPO, Organizational Unit GPO, Local Group Group Policy

  • Site GPO, Domain GPO, Local Group Policy, Organizational Unit GPO

  • Organizational Unit, Site GPO, Domain GPO, Domain GPO, Local Group Policy

Explanation

Question 7 of 94

1

Which represents the correct path for disabling the "Turn off the Store application" using the Local Group Policy editor?

Select one or more of the following:

  • Computer Configuration > Windows Components > Store

  • Computer Configuration > Administrative Templates > Windows Store

  • Computer Configuration > Administrative Templates > Windows Components > Store

  • Computer Configuration > Administrative Templates > Windows Components > Windows Store

Explanation

Question 8 of 94

1

Which command can be used to add a sideloading product activation key?

Select one or more of the following:

  • slmgr /ipk <sideloading product key>

  • slmgr /pk <sideloading product key>

  • slmgr /ato <sideloading product key>

  • slmgr /ato ec67814b-30e6-4a50-bf7b-d55daf729dle

Explanation

Question 9 of 94

1

To create a single rule that allows the Everyone group to run packaged apps that are signed, which wizard would you use in AppLocker?

Select one or more of the following:

  • Automatically Generate Rules

  • Create Default Rules

  • Create New Rule

  • Create Default Rule

Explanation

Question 10 of 94

1

Which of the following are true regarding updating Windows apps from the Windows Store?

Select one or more of the following:

  • Only the user can update the apps, but they can be downloaded automatically in the background.

  • A number indicator appears on the Store icon that will inform you of the number of updates available.

  • Free Windows apps cannot be updated.

  • The updates are downloaded and installed in the background.

Explanation

Question 11 of 94

1

You have 25 Windows 8 computers in a Windows Active Directory domain named "contoso.com". Which of the following tools should be used to disable the automatic download of updates from the Windows Store on all of them with the least amount of administrative effort?

Select one of the following:

  • Local Group Policy editor

  • Group Policy Management console

  • Turn off via App Updates in the Windows Store

  • Delete the automatic updates registry key

Explanation

Question 12 of 94

1

To set up an AppLocker rule that disables access to Windows apps, which of the following rule collections would you create the rule from?

Select one of the following:

  • Scripts

  • Windows Installer files

  • Executable files

  • Appx

Explanation

Question 13 of 94

1

To uninstall a Windows app that you recently purchased on one of your Windows 8 devices last week but now would like to reinstall, which of the following options best describes the process to reinstall it?

Select one of the following:

  • Visit the Windows Store, browse through the categories to find the app, and reinstall it at no charge.

  • Visit the Windows Store, browse through the categories to find the app, and pay for the app to reinstall it.

  • Visit the Windows Store, access Your Apps, and click Apps not installed on this PC. Select and install.

  • Remove the app from one of your other Windows 8 devices, access Your Apps, and click Apps not installed on this PC. Select and install.

Explanation

Question 14 of 94

1

As the administrator for a network that has 50 Windows 8 client computers, which of the following approaches can be used to initiate Windows app updates on the users' machines?

Select one of the following:

  • Configure a Group Policy.

  • Configure a Local Policy.

  • Turn on automatic download/install of Windows Apps.

  • Ask users to perform updates when they see the indicator on their Store tile.

Explanation

Question 15 of 94

1

You have a Windows 8 computer set up with the 20 Windows Apps that you want everyone to have access to. Which of the following AppLocker wizards will create all the rules in a single step?

Select one of the following:

  • Create New Rule

  • Create Default Rules

  • Automatically Generate Rules

  • Create Custom Rule

Explanation

Question 16 of 94

1

Match the following terms with the corresponding definitions:

a) - A service that is required by AppLocker to verify the identity of an app.
b) - Used to configure Group Policy across your entire enterprise.
c) - Apps that are unique to the main business of the company.
d) - Controls which applications and files users can run on their Windows 8 computer.
e) - Used to modify local security settings on your computer (secpol.msc)
f) - Used to bypass the Windows Store and load LOB apps.
g) - Also known as as "packaged apps".
h) - Central location for distributing and purchasing apps.
i) - Includes executables files, scripts, Windows installer files, and Appx.
j) - Can be associated with a selected Active Directory container.

Drag and drop to complete the text.

    Application Identity service
    Group Policy Management console
    Line of Business (LOB) apps
    AppLocker
    Local Security Policy Editor
    sideloading
    Windows Apps
    Windows Store
    rule collections
    Group Policy Object

Explanation

Question 17 of 94

1

Select from the dropdown lists to complete the text.

In order of first to last, specify the order of precedence for processing Group Policy objects.

( 1, 2, 3, 4 ) Group Policies linked to the Site container
( 1, 2, 3, 4 ) Group Policies linked to the Organizational Unit
( 1, 2, 3, 4 ) Local Group Policy object
( 1, 2, 3, 4 ) Group Policies linked to the Domain container

Explanation

Question 18 of 94

1

Select from the dropdown lists to complete the text.

After deleting a Windows App that is installed on four other Windows 8 devices, specify the correct order of steps required to reinstall the Windows app.

( 1, 2, 3, 4, 5 ) Click Apps not installed on this PC.
( 1, 2, 3, 4, 5 ) Select the Windows logo key to open the Windows Start menu and select the Store tile.
( 1, 2, 3, 4, 5 ) Select the app you want to install.
( 1, 2, 3, 4, 5 ) Right-click and select Your Apps.
( 1, 2, 3, 4, 5 ) Click Install.

Explanation

Question 19 of 94

1

Select from the dropdown lists to complete the text.

In order of first to last, specify the tasks that must be completed to disable access to the Windows Store using the Local Group Policy editor.

( 1, 2, 3, 4, 5 ) Click Computer Configuration > Administrative Templates > Windows Components > Store.
( 1, 2, 3, 4, 5 ) Click Enabled and then click OK.
( 1, 2, 3, 4, 5 ) Press the Windows logo key + r.
( 1, 2, 3, 4, 5 ) Double-click Turn off the Store application.
( 1, 2, 3, 4, 5 ) In the Run dialog box, type gpedit.msc.

Explanation

Question 20 of 94

1

Lee Jensen, owner of a large manufacturing company on the West Coast, recently approved the purchase and installation of 50 Windows 8 Enterprise desktops for his organization. A month earlier, the company installed 25 Windows 8 Professional client computers. All the computers are part of the Windows 2012 Active Directory domain named jensenmfg.com. The company has a Line of Business app called jenMax it would like to make available to its internal employees via the Windows Store. He has asked you to research the process and requirements and report back. What are the potential issues/recommendations you should bring to his attention?

Distributing your LOB app via the Windows Store requires that you go through a certification process with Microsoft. Once your app is accepted, it will be made available via the Windows Store to the general public. LOB apps are usually designed for internal use only; therefore, making them available to the public is not the best approach. Instead, the solution is to use a process called sideloading. The Windows 8 Enterprise client computers are enabled for sideloading by joining them to the domain. The Windows 8 Professional client computers need to have the sideloading product activation key installed and activated for them to work correctly.

Select one of the following:

  • True
  • False

Explanation

Question 21 of 94

1

You have 50 Windows 8 Enterprise client computers on your network that are joined to the company’s Active Directory domain. You have several Group Policy objects linked to the domain including one GPO that has the “Turn off Automatic Download of updates" option set to Enabled. You open the Local Group Policy editor on one of the Windows 8 Enterprise client computers, navigate to the “Turn off Automatic Download of updates” option, and set it to Disabled. What would happen if you made this change?

The order of precedence determines which Group Policy settings are applied to a Windows 8 client computer that is a member of a domain. Because the Local Group Policy setting is applied first, policies at the Site, Domain, and Organizational Unit level will overwrite it if there is a conflict. In this scenario, the GPO linked to the domain has turned off automatic updates from the Windows Store; therefore, it will be applied after the local policy.

Select one of the following:

  • True
  • False

Explanation

Question 22 of 94

1

What is one way that you can open the Search function?

Select one of the following:

  • Win + Q

  • Win + S

  • Win + F

  • Win + O

Explanation

Question 23 of 94

1

How often does Microsoft check for app updates?

Select one of the following:

  • hourly

  • daily

  • weekly

  • bi-weekly

Explanation

Question 24 of 94

1

Updates are downloaded and installed automatically.

Select one of the following:

  • True
  • False

Explanation

Question 25 of 94

1

Which of the following software restriction policy rule types takes the highest precedence?

Select one or more of the following:

  • Certificate rules

  • Hash rules

  • Default rules

  • Zone rules

Explanation

Question 26 of 94

1

Which of the following types of rules can be manually created in AppLocker?

Select one or more of the following:

  • Publisher rules

  • Certificate rules

  • Path rules

  • File hash rules

Explanation

Question 27 of 94

1

Which of the following Windows versions support AppLocker policies? (Choose all that apply.)

Select one or more of the following:

  • Windows 8

  • Windows Vista

  • Windows Server 2003

  • Windows Server 2008 SP2

Explanation

Question 28 of 94

1

When you enable the Prevent installation of removable devices policy in a GPO and link that GPO to a domain, what is the effect on the devices already installed on computers in that domain?

Select one or more of the following:

  • The policy has no effect on removable devices that have already been installed.

  • The policy causes already installed removable devices to be uninstalled.

  • The policy allows already installed removable devices to function, but prevents their drivers from being updated.

  • The policy disables already installed removable devices, but does not uninstall them.

Explanation

Question 29 of 94

1

Which of the following rule types cannot be used to create software restriction policies?

Select one or more of the following:

  • hash rules

  • certificate rules

  • path rules

  • code rules

Explanation

Question 30 of 94

1

When creating an AppLocker rules manually, which of the following is NOT information the wizard prompts you to supply?

Select one or more of the following:

  • Conditions

  • User or group

  • Function

  • Action

Explanation

Question 31 of 94

1

Which of the following is NOT a setting for software restriction policies?

Select one or more of the following:

  • Basic user

  • Disallowed

  • Advanced user

  • Unrestricted

Explanation

Question 32 of 94

1

Which of the following statements is the primary reason why AppLocker is an improvement over software restriction policies?

Select one of the following:

  • AppLocker has more rule types than software restriction policies.

  • AppLocker can generate its own rules automatically.

  • AppLocker can be deployed in Group Policy objects in Active Directory.

  • AppLocker requires the Application Identity service to be running.

Explanation

Question 33 of 94

1

2. Which of the following statements is the primary reason why you must start the Application Identity service manually before using AppLocker?

Select one of the following:

  • Because AppLocker needs the Application Identity service to be running in order to function

  • Because the Application Identity service will hang the system if it starts with Windows.

  • Because requiring the manual start prevents improperly configured AppLocker rules from permanently hanging the system

  • Because Windows 8 does not support starting the Application Identity service automatically.

Explanation

Question 34 of 94

1

Complete the following exercise by matching the terms with their corresponding definitions:

a) - Applies to applications with a specific file or folder name
b) - Applies to packages with .msi and .msp extensions
c) - Applies to digitally signed applications
d) - Applies to files with .exe and .com extensions
e) - Applies to applications with a digital fingerprint
f) - Applies to Windows Store purchases
g) - Applies to applications that do not match any other rule type
h) - Applies to packages downloaded with Internet Explorer
i) - Applies to files with .psl, .bat, .cmd, . vbs, and .js extensions
j) - Applies to libraries, as well as executables

Drag and drop to complete the text.

    Path rules
    Windows Installer rules
    Certificate rules
    Executable rules
    Hash rules
    Packaged app rules
    Default rule
    Network zone rules
    Script rules
    DLL rules

Explanation

Question 35 of 94

1

Sophie is planning on using AppLocker to control access to applications on a new network she has constructed for the Research and Development department at a major aerospace firm. The software developers in the department have recently deployed a new application called Virtual Wind Tunnel, which is based on government project research and is therefore classified. All of the full-time personnel have sufficient clearance to use the application, but the interns in the department do not. Sophie has placed the user accounts for everyone in the department into a security group called ResDev. The interns are also members of a group called RDint.

How can Sophie use AppLocker to provide everyone in the department with access to the Virtual Wind Tunnel application without changing the group memberships and without having to apply policies to individual users?

Sophie has to create two rules, an allow rule that grants the ResDev group access to the application, and a deny rule that applies only to the RDint group. Because deny rules take precedence over allow rules in AppLocker, the interns will not be able to access the application.

Select one of the following:

  • True
  • False

Explanation

Question 36 of 94

1

What are the names of the two security zones in Internet Explorer that have no sites in them by default? (Choose all that apply.)

Select one or more of the following:

  • Internet

  • Local intranet

  • Trusted sites

  • Restricted sites

Explanation

Question 37 of 94

1

Which of the following is NOT one of the add-on types supported by Internet Explorer 8?

Select one or more of the following:

  • Toolbars and Extensions

  • Search Providers

  • Accelerators

  • SmartScreen Filtering

Explanation

Question 38 of 94

1

What does a broken window icon in the Internet Explorer 8 address bar indicate?

Select one or more of the following:

  • A failure to successfully download a certificate from the website

  • A web page that is incompatible with Internet Explorer 8

  • A failure to update a subscribed RSS feed

  • A failure to print a document from Internet Explorer

Explanation

Question 39 of 94

1

Which of the following can be used to highlight content in a browser window instead of typing content directly into the browser’s search box?

Select one or more of the following:

  • Accelerator

  • Search Provider

  • RSS Feed

  • Toolbars and Extensions

Explanation

Question 40 of 94

1

When you subscribe to an RSS Feed in Internet Explorer, the content is updated how frequently by default?

Select one or more of the following:

  • Weekly

  • Daily

  • Hourly

  • Monthly

Explanation

Question 41 of 94

1

When downloading a file from a website in Internet Explorer 10, the browser’s built-in download manager manages the process. Which of the following are valid options from within the download manager? (Choose all that apply.)

Select one or more of the following:

  • Download and run the selected file.

  • Download and save the selected file into the program's default folder.

  • Download and save the selected file to another folder.

  • Cancel the download.

Explanation

Question 42 of 94

1

Which of the following best describes the role of a WebSocket? (Choose all that apply.)

Select one or more of the following:

  • Establishing a three-way handshake between the sending and receiving computer.

  • Application layer protocol that uses TCP's transport service

  • Allows clients and servers to exchange data immediately as it becomes available.

  • An open connection between client and server that remains open as long as the systems have data to exchange.

Explanation

Question 43 of 94

1

Which of the following are true regarding Internet Explorer in Windows 8 and the use of mandatory integrity control? (Choose all that apply.)

Select one or more of the following:

  • IE runs at a low integrity access level

  • IE runs at a medium access integrity level

  • IE can write to the History, Cookies, and Favourites folders

  • IE runs at a high integrity access level

Explanation

Question 44 of 94

1

By default, there are no sites included in which of these Internet Explorer security zones; you must add them manually. (Choose all that apply.)

Select one or more of the following:

  • Trusted sites

  • Restricted sites

  • Local Intranet

  • Internet

Explanation

Question 45 of 94

1

Which of the following represent techniques used by Internet Explorer to identify potential phishing websites? (Choose all that apply.)

Select one or more of the following:

  • Online lookup of phishing sites

  • Onsite analysis

  • Online lookup of downloaded sites

  • Offline lookup of download sites

Explanation

Question 46 of 94

1

The company is designing a new web-based application that is likely to require extensive access to system resources. Users will connect to it over their local network segment. To make sure the application works as planned, in which security zone should the website be placed to allow it to function at its full capability?

Select one of the following:

  • Trusted Sites zone

  • Internet zone

  • Local Intranet zone

  • Restricted Sites zone

Explanation

Question 47 of 94

1

A new company has just installed Windows 8 on their computers. They want to be able to protect themselves against phishing attacks. Which of these combinations will ensure they are using the best approach to defend against these types of attacks?

Select one of the following:

  • Prevent browsing to any sites that are not included in the Trusted Sites zone

  • Educate users on how to recognize phishing attacks and use SmartScreen Filter to display warnings if the site is suspicious

  • Prevent browsing to any sites that are not included in the Local Intranet zone

  • Place a list of known phishing sites into each user’s Restricted Sites zone

Explanation

Question 48 of 94

1

Several users on the network do sensitive research for the company using Internet Explorer on 50 Windows 8 computers. They do not want IE to maintain a permanent record of their activities during their browser sessions? What is the best approach to use to address their need?

Select one of the following:

  • Configure InPrivate Browsing on each of the computers.

  • Configure InPrivate Browsing on a subset of the computers and direct the users to only browse when working at those computers.

  • Configure InPrivate Browsing using Group Policy and apply it to the users’ computers.

  • Configure InPrivate Browsing using Group Policy and apply it to a subset of the computers; ask users to work on those computers only.

Explanation

Question 49 of 94

1

In Windows 8, Internet Explorer runs in protected mode. Which of the following best describes the capabilities of IE when running in this mode?

Select one of the following:

  • IE can write to the Temporary Internet files folder

  • IE can write to the Temporary Internet files and the History folders.

  • IE can write to the Temporary Internet files, History, and Cookies folders.

  • IE can write to the Temporary Internet files, History, Cookies, and Favorites folder.

Explanation

Question 50 of 94

1

The company is considering upgrading to Windows 8 but is concerned that some of their web-based applications may not be compatible. What is the best way to test for incompatibilities?

Select one of the following:

  • Upgrade a few computers to Windows 8 and ask users to report any problems they have to the help desk.

  • Upgrade all computers to Windows 8 and ask users to report any problems they have to the help desk.

  • Upgrade a subset of computers that use all the web-based applications and turn on Compatibility Logging via the Local Group policy.

  • Upgrade a subset of computers that use all the web-based applications. Ask users to report any problems. If problems are found, clear the Enable Protected Mode checkbox in the Local Intranet zone.

Explanation

Question 51 of 94

1

Complete the following exercise by matching the terms with their corresponding definitions:

a) - Software components that interact with the basic functions of the web browser.
b) - A push technology that simplifies the process of delivery updated content to designated users.
c) - Describes any attempt to penetrate the security of a system by convincing people to disclose secret information.
d) - Used by Internet Explorer to divide websites and assign different sets of privileges to each.
e) - Enable users to highlight content in a browser window instead of using the search box.
f) - Examines traffic for evidence of phishing activity.
g) - Enables clients and servers to exchange data immediately.
h) - Provides a way to run Internet Explorer with highly reduced privileges.
i) - Enables surfing the Internet without leaving any record of your activities.
j) - Enables browser to display older pages properly.

Drag and drop to complete the text.

    Add-ons
    RSS Feeds
    Social engineering
    Security zones
    Accelerators
    SmartScreen Filter
    WebSockets
    Protected mode
    InPrivate Mode
    Compatibility View

Explanation

Question 52 of 94

1

In order of first to last, specify the correct order of steps to configure a default Search Provider.

On the Start screen, click the Desktop tile.
Click the Tools icon, and from the context menu that appears, select Manage Add-ons.
Select one of the search providers you installed earlier and click Set as default.
Select Search providers in the Add-on types list.
Click Close.
In the taskbar, click the Internet Explorer icon.

Drag and drop to complete the text.

    1
    2
    3
    4
    5
    6

Explanation

Question 53 of 94

1

Specify the correct order of steps to subscribe to an RSS Feed.

Click the Subscribe to this feed link.
On the Start screen, click the Desktop tile.
In the taskbar, click the Internet Explorer icon.
Press the Alt key to display the menu bar and, on the Tools menu, click Feed Discovery. Then click the name of the feed to which you want to subscribe.
In the Name text box, type a name you want to assign to the feed (if it differs from the default).
Select the folder to which you want to add the feed, or click New folder to create one. Then click Subscribe. The feed page changes to indicate that you have successfully subscribed to the feed.

Drag and drop to complete the text.

    1
    2
    3
    4
    5
    6

Explanation

Question 54 of 94

1

Specify the correct order of steps to add a site to a Security Zone.

Click the Tools icon and select Internet Options.
In the taskbar, click the Internet Explorer icon.
Type the URL of the website you want to add to the zone into the Add this website to the zone text box, and then click Add.
Click Sites.
On the Start screen, click the Desktop tile.
Click Close to close the Trusted sites or Restricted sites dialog box.
Select the zone, either Trusted sites or Restricted sites, to which you want to add a site.
Click OK to close the Internet Properties sheet.
Click the Security tab.

Drag and drop to complete the text.

    1
    2
    3
    4
    5
    6
    7
    8
    9

Explanation

Question 55 of 94

1

Several employees at the company you work for have recently been victims of identity theft. These incidents were the result of emails received by the victims requesting that they supply personal bank account information to a website or risk having their accounts closed. The website was, of course, not legitimate, and attackers used the information collected there to transfer funds from the victims’ accounts. The company has recently upgraded all company workstations to Windows 8, and you are examining the capabilities of the SmartScreen Filter in Internet Explorer 8. Your superiors have told you that you can use any of the new IE8 security features for the company workstations, as long as they do not consume any additional Internet bandwidth.

Explain to your supervisor the various methods IE8 uses to protect against phishing attacks, and specify which ones you intend to use for the company workstations.

The SmartScreen Filter in IE8 has three mechanisms for detecting phishing attempts. One is to analyze incoming web pages for patterns and phrases indicative of a phishing attempt. This mechanism uses no additional Internet bandwidth, so you can implement it on the company workstations. The other two mechanisms perform online lookups of phishing sites and down sites, using a database maintained by Microsoft. Because these mechanisms require Internet bandwidth, you cannot use them.

Select one of the following:

  • True
  • False

Explanation

Question 56 of 94

1

A web-based site is needed by all users on the company’s network in order to perform research on the company’s competitors. After installing Windows 8, calls start coming into the help desk indicating there are compatibility problems with the site. What are some techniques that can be tried to address the problem?

You can move the site to the Trusted zone in the users’ browser. Sites in the Trusted zone do not run in protected mode and receive elevated privileges. You could disable protected mode in IE (not recommended) or modify the application which is the most difficult and time-consuming option if the first option does not work.

Select one of the following:

  • True
  • False

Explanation

Question 57 of 94

1

Which of the following mechanisms is used most often used in firewall rules to allow traffic onto the network?

Select one or more of the following:

  • Protocol numbers

  • IP addresses

  • Port numbers

  • Hardware addresses

Explanation

Question 58 of 94

1

Which of the following actions can you NOT perform from the Windows Firewall control panel? (Choose all that apply.)

Select one or more of the following:

  • Turn Windows firewall off for all three profiles.

  • Manage firewall exceptions for the domain profile.

  • Allow a program through the firewall in all three profiles.

  • Create firewall exceptions based on port numbers.

Explanation

Question 59 of 94

1

Connection security rules require that network traffic allowed through the firewall use which of the following security mechanisms?

Select one or more of the following:

  • IPsec

  • EFS

  • UAC

  • PIV

Explanation

Question 60 of 94

1

Windows Firewall uses three profiles to represent the type of network to which the server is connected. What are the three profiles?

Select one or more of the following:

  • Private, Temporary, and Authenticated

  • Public, DMZ, and Private

  • Internet, Secure, and Private

  • Domain, Private, and Public

Explanation

Question 61 of 94

1

When a user attempts to visit an Internet-based web server, what is the default action of the Windows Firewall?

Select one or more of the following:

  • The firewall will not permit the user to visit a non-corporate website.

  • The firewall by default will not block client-initiated network traffic.

  • The firewall will block the web request unless the user is already authenticated.

  • The firewall will block all outbound traffic.

Explanation

Question 62 of 94

1

In the Windows Firewall with Advanced Security console, while creating a new rule, the Program page specifies whether the ______.

Select one or more of the following:

  • rule applies to all programs, to one specific program

  • rule applies to all users, to one specific user

  • rule applies to all systems, to one specific system

  • rule applies to all programs, to one specific program, or to a specific service

Explanation

Question 63 of 94

1

By exporting the Windows Firewall policy, you have a file with a .wfw extension that contains _____.

Select one or more of the following:

  • all the rules you have created or modified

  • preconfigured rules to be applied to another firewall

  • all its rules, including the preconfigured rules and the ones you have created or modified

  • firewall settings as specified by the Group Policy settings

Explanation

Question 64 of 94

1

Which of the following statements about Windows Defender is true?

Select one or more of the following:

  • Windows Defender uses rules that you create to control its scans.

  • Windows Defender can detect spyware that is already present on the system, but it cannot prevent the infiltration of new spyware.

  • Windows Defender eliminates the need for third-party anti-virus software.

  • Windows Defender requires definition updates that are supplied free with the regularly scheduled Windows Update downloads.

Explanation

Question 65 of 94

1

Which of the following wireless networking standards uses spatial multiplexing to increase bandwidth?

Select one or more of the following:

  • IEEE 802.11b

  • IEEE 802.11g

  • IEEE 802.11n

  • IEEE 802.11X

Explanation

Question 66 of 94

1

Which of the following wireless security protocols is the most secure?

Select one or more of the following:

  • WPA-TKIP

  • WEP (128-bit) with 802.1X authentication

  • WEP (128-bit)

  • WPA-AES

Explanation

Question 67 of 94

1

What is the primary objective of a firewall?

Select one of the following:

  • To permit traffic in and out for legitimate users, and to block the rest

  • To authenticate and authorize users past the network perimeter

  • To compare traffic information against a list of known valid traffic

  • To protect a network by allowing certain types of network traffic in and out of the system

Explanation

Question 68 of 94

1

Windows Firewall Customize Settings contains three profiles (Public, Private, and Domain). What differentiates these profiles from each other?

Select one of the following:

  • Public is for servers accessible to temporary users. Private is for servers on an internal network. Domain is for servers in which users are all authenticated.

  • Public is for servers accessible to unauthenticated users. Private is for inaccessible servers. Domain is for servers accessible only to authenticated users.

  • Public is for servers accessible to temporary users. Private is for servers on an internal network. Domain is for servers across multiple sites.

  • Public is for servers accessible to unauthenticated users. Private is for servers on a private network. Domain is for servers spanning different domain groups.

Explanation

Question 69 of 94

1

Windows Firewall allows you to create inbound, outbound, and connection security rules for individual servers or systems. How can you do this for multiple systems?

Select one of the following:

  • You can delegate to administrators the task of performing the same configuration to their local servers.

  • You can create a new Group Policy object (GPO) and create matching rules to match the desired configuration. Then deploy the GPO to other systems on the network.

  • You can visit individual systems and configure them as you have the initial system.

  • You can create a new GPO and you can import settings from a policy file created earlier. Then deploy the GPO to other systems on the network.

Explanation

Question 70 of 94

1

What is the primary benefit of configuring Windows Firewall through the Windows Firewall with Advanced Security snap-in for the Microsoft Management Console?

Select one of the following:

  • The Microsoft Management Console offers a more familiar interface than the Windows Firewall control panel.

  • The Microsoft Management Console snap-in applies the rules faster than the Windows Firewall control panel.

  • Compared to the Windows Firewall control panel, the Microsoft Management Console can be brought up in fewer clicks.

  • The Microsoft Management Console snap-in offers full access compared to the Windows Firewall control panel.

Explanation

Question 71 of 94

1

When creating a firewall exception, what is the difference between opening a port and allowing an application?

Select one of the following:

  • Opening a port is permanent, and thus is less risky than allowing an application.

  • Allowing an application opens the specified port only while the program is running, and thus is less risky.

  • Both options are available in the Windows Firewall with Advanced Security console.

  • There is no functional difference between opening a port and allowing an application.

Explanation

Question 72 of 94

1

Specify the order of steps for processing an application in Windows Firewall.

Click Allow an app or feature through Windows Firewall. The Allowed Apps dialog box appears.
Scroll down in the Allowed apps and features list and select the check box for the application you want to allow through the firewall.
Log on to Windows 8, using an account with administrator privileges.
5 Click OK to close the Allowed Apps dialog box.
Open the Control Panel and click System and Security > Windows Firewall. The Windows Firewall window appears.

Drag and drop to complete the text.

    1
    2
    3
    4

Explanation

Question 73 of 94

1

In order of first to last, specify the order of steps for creating Windows Firewall rules.

From the Action menu, select Export Policy. The Save As combo box appears.
Log on to Windows 8, using an account with administrator privileges.
Modify the inbound or outbound firewall rules or create new rules as needed.
Open the Control Panel and select System & Security > Administrative Tools > Windows Firewall with Advanced Security. The Windows Firewall with Advanced Security console appears.
In the left pane, select the Windows Firewall with Advanced Security on Local Computer node.
In the File Name text box, type a name for the policy file and click Save.

Drag and drop to complete the text.

    1
    2
    3
    4
    5
    6

Explanation

Question 74 of 94

1

You are a desktop technician in the IT department of a small corporation. Today is the day of the company picnic and, as the junior member of the department, you have been left in charge of the entire corporate network while everyone else is out of the office. Shortly after 2:00 PM, an email arrives from the company’s biggest customer, complaining that they can’t access the web server they use to place their orders. After checking the web server logs, it seems clear that the server is undergoing a denial-of-service attack, because there are suddenly hundreds of Internet computers repeatedly trying to access it. What temporary modifications could you make to Windows Firewall on the Windows 8 computer that stands between the web server and the Internet that would allow customers to access the web server while blocking the attackers?

You could require IPsec authentication for all incoming communications to TCP port 80, the well-known port for web server communications. Customers would then be able to authenticate and access the server, while the random, unauthenticated DoS connection attempts are blocked.

Select one of the following:

  • True
  • False

Explanation

Question 75 of 94

1

Ed is a desktop technician at a large law firm. Ed’s firm is a slow adopter of new technologies, and the organization has, to date, not deployed a wireless network. After bringing up the benefits of wireless networks at a recent meeting with the IT staff, Ed was told that the company will not be deploying a wireless network for several years, if ever.

The lack of an IT-configured wireless network has not entirely stopped their adoption, however. Yesterday, Ed noticed a junior attorney surfing the web with his laptop in the lunch room, without a network cable. When Ed asked the attorney how he was connected to the network, he confessed that he had plugged a consumer WAP into the network port in his office.

Explain the potential risks of having a rogue wireless network in the office.

An attacker with a wireless network card could join their Active Directory Domain Services domain. An attacker could use a wireless network card to capture traffic between two wired network hosts. An attacker could use the company’s Internet connection from the lobby of the building with a wireless-enabled mobile computer.

Select one of the following:

  • True
  • False

Explanation

Question 76 of 94

1

Which of the following is the primary method for transmitting IPv6 traffic over an IPv4 network?

Select one or more of the following:

  • Subnetting

  • Tunneling

  • Supernetting

  • Contracting

Explanation

Question 77 of 94

1

Which of the following is the IPv6 equivalent to a private IPv4 address?

Select one or more of the following:

  • Link-local unicast address

  • Global local unicast address

  • Unique local unicast address

  • Anycast address

Explanation

Question 78 of 94

1

Which of the following is an automatic tunneling protocol used by Windows operating systems that are located behind NAT routers?

Select one or more of the following:

  • Teredo

  • 6to4

  • ISATAP

  • APIPA

Explanation

Question 79 of 94

1

What kind of IP address must a system have to be visible from the Internet?

Select one or more of the following:

  • Registered

  • Binary

  • Class B

  • Subnetted

Explanation

Question 80 of 94

1

What subnet mask would you use when configuring a TCP/IP client with an IPv4 address on the 172.16.32.0/19 network?

Select one or more of the following:

  • 255.224.0.0

  • 255.240.0.0

  • 255.255.224.0

  • 255.255.240.0

  • 255.255.255.240

Explanation

Question 81 of 94

1

Which protocol is responsible for addressing packets at the data-link layer?

Select one or more of the following:

  • Internet Protocol

  • Transmission Control Protocol

  • Ethernet

  • CIDR

Explanation

Question 82 of 94

1

Windows 8 computers can acquire IP addresses in which of the following ways? Select all that apply.

Select one or more of the following:

  • APIPA

  • Manual Configuration

  • DHCP

  • TCP/IP

Explanation

Question 83 of 94

1

Which of the following are true statements regarding IPv4 and IPv6 addressing? Select all that apply.

Select one or more of the following:

  • IPv4 addresses are 32 bits in length.

  • IPv4 addresses are 128 bits in length.

  • IPv6 addresses are 128 bits in length.

  • IPv4 and IPv6 support stateful and stateless configuration.

Explanation

Question 84 of 94

1

Computers with link-local addresses, that do not have access to a DNS server, use which protocol?

Select one or more of the following:

  • Link Local Name Resolution

  • Link Local Multicast Name Resolution

  • Link Local Unicast Name Resolution

  • Link Local Anycast Name Resolution

Explanation

Question 85 of 94

1

In which layer of the OSI model would packet acknowledgment, error correction, and flow control services typically be handled?

Select one or more of the following:

  • Network layer

  • Physical layer

  • Transport layer

  • Data-link layer

Explanation

Question 86 of 94

1

A computer is currently experiencing connectivity problems. The network administrator is unsure whether the source of the problem is the local computer, the remote computer, or one of the routers between the two. Which tool would most likely provide the information needed to answer these questions and pinpoint the location of the problem?

Select one of the following:

  • nslookup

  • ping

  • netstat

  • tracert

Explanation

Question 87 of 94

1

Two computers are configured to communicate on a local network segment 192.168.2.0/24. Computer A is currently assigned 192.168.2.17 and Computer B is assigned 192.168.2.22. A new administrator adds a third computer (Computer C) to the network and forgets to configure its IP address. If the DHCP server were temporarily unavailable, which of the following would most likely be the result?

Select one of the following:

  • Computer C would be assigned an address automatically.

  • Computer C would be assigned an APIPA address.

  • Computer C would be assigned an APIPA address and not be able to communicate with the other two computers.

  • Computer C would be assigned an APIPA address and not be able to communicate with the other two computers. Once the DHCP server came back online, all computers will be able to communicate.

Explanation

Question 88 of 94

1

The network administrator is currently having problems connecting and gathering information from a Windows 8 computer using telnet. He wants to use telnet on a very limited basis. Which of the following would represent the best approach to solve this problem?

Select one of the following:

  • Turn the Windows Firewall off on the target computer.

  • Disable the Windows Firewall on the target computer temporarily.

  • Configure the target computer’s Windows Firewall to allow traffic directed to port 23, 20, and 21.

  • Configure the target computer’s Windows Firewall to allow traffic directed to port 23; complete the work and then block the port until he needs to connect at a late date/time.

Explanation

Question 89 of 94

1

When troubleshooting computers and networks, it’s wise to use the OSI model as a guide. If a user is experiencing problems with resolving host names to IP addresses, which layer of the OSI model would you focus on to quickly resolve the problem?

Select one of the following:

  • Data-link layer

  • Physical layer

  • Network layer

  • Application layer

Explanation

Question 90 of 94

1

A network administrator is trying to locate where packets are being delayed in transit. She uses the tracert command and receives the following information. Which of these hops would be the source of the delay?

Select one of the following:

  • <100 ms 103 ms <130 ms

  • <210 ms 200 ms <205 ms

  • <250 ms 210 ms <240 ms

  • <375 ms 300 ms <360 ms

Explanation

Question 91 of 94

1

Complete the following exercise by matching the terms with their corresponding definitions.
a. - Used to view the settings assigned to a DHCP-enabled client.
b. - Used to display ports that are currently listening for incoming network connections.
c. - A hardware address used at the data-link layer.
d. - Feature built into routers; substitutes a registered address for the computer’s private address and then forwards to destination.
e. - A protocol that does not perform error detection or correction.
f. - Protocol in which two system establish a connection before they transmit any data.
g. - A connection-oriented protocol found at the Transport layer.
h. - A connectionless protocol found at the Network layer.
i. - Also referred to as a local area network.
j. - Allows computers on networks without DHCP to communicate with each other when not assigned manual IP addresses.

Drag and drop to complete the text.

    ipconfig
    netstat
    media access control address
    network address translation
    connectionless protocol
    connection-oriented protocol
    Transmission Control Protocol
    Internet Protocol
    packet switching network
    Automatic Private IP Addressing (APIPA)

Explanation

Question 92 of 94

1

Select from the dropdown lists to complete the text.

In order of first to last, specify the correct order of steps to view connection status.
( 1, 2, 3, 4, 5 ) Open the Network and Sharing Center.
( 1, 2, 3, 4, 5 ) Click Close to close the Network Connection Details dialog box.
( 1, 2, 3, 4, 5 ) Click Close to close the Local Area Connection Status dialog box
( 1, 2, 3, 4, 5 ) Click Details. The Network Connection Details dialog box appears.
( 1, 2, 3, 4, 5 ) In the View your active networks section, click Ethernet or the name of the connection whose status you want to view.

Explanation

Question 93 of 94

1

Select from the dropdown lists to complete the text.

Specify the correct order of steps to configure IPv4 settings.

( 1, 2, 3, 4, 5, 6, 7, 8 ) Click Change adapter settings.
( 1, 2, 3, 4, 5, 6, 7, 8 ) Select Internet Protocol Version 4 (TCP/IPv4) and then click Properties.
( 1, 2, 3, 4, 5, 6, 7, 8 ) Select the Use The Following DNS Server Addresses option and then enter appropriate values for the following parameters (preferred DNS Server, alternate DNS server.
( 1, 2, 3, 4, 5, 6, 7, 8 ) Right-click the connection you want to manage and, from the context menu, select Properties.
( 1, 2, 3, 4, 5, 6, 7, 8 ) Open the Network and Sharing Center.
( 1, 2, 3, 4, 5, 6, 7, 8 ) Click OK to close the Internet Protocol Version 4 (TCP/IPv4) Properties sheet.
( 1, 2, 3, 4, 5, 6, 7, 8 ) Select the Use The Following IP Address option and then enter appropriate values for IP address, subnet mask, and default gateway).
( 1, 2, 3, 4, 5, 6, 7, 8 ) Click OK to close the connection’s Properties sheet.

Explanation

Question 94 of 94

1

Select from the dropdown list to complete the text.

Specify the correct order of steps to configure Advanced Sharing settings.

( 1, 2, 3, 4, 5 ) Open the Network and Sharing Center.
4 Configure the following settings by selecting from the options provided (Network Discovery, Turn on automatic setup of network connected device, file/printer sharing, public folder sharing, media streaming, file sharing connections, password protected sharing, and HomeGroup connections).
5 Click Save Changes.
3 Click the down arrow for the network location whose settings you want to modify.
2 In the left pane, click Change advanced sharing settings. The Change sharing options for different network profiles dialog box appears.

Explanation