click below
click below
Normal Size Small Size show me how
IT-205 Midterm
Windows Client IT-205 Midterm Study Questions
| Question | Answer |
|---|---|
| Which of the following are the minimum requirements necessary to run the 32-bit version of Windows 10 ? | 1 GHz processor, 1 GB of memory, and 16 GB of free disk space |
| Which of the following are the minimum requirements necessary to run the 64-bit version of Windows 10? | 2 GHz processor, 2 GB of memory, and 20 GB of free disk space |
| Which software allows the operating system to communicate with a specific hardware device? a. Private catalog b. BranchCache c. BitLocker d. Device driver | d. Device driver |
| Which type of installation should be used when you want to keep the program and data files that already exist on an earlier version of Windows? a. A clean installation b. An upgrade c. A refresh installation d. A rebuild installation | b. An upgrade |
| You manage a system running Windows 7 Home Basic. Which version of Windows 10 can you upgrade to? a. Windows 10 Home b. Windows 10 Pro c. Windows 10 Enterprise d. Windows 10 Education | a. Windows 10 Home |
| Which Windows deployment strategy takes most amount of time and is meant for a small number of hosts? a. High Touch with Retail Media b. Lite-Touch, High-Volume Deployment c. Zero-Touch, High-Volume Deployment d. Script-Based Deployment | a. High Touch with Retail Media |
| Which type of installation erases data from the disk before installing Windows 10? a. A clean installation b. An upgrade c. A sweep installation d. A high-touch installation | a. A clean installation |
| The User State Migration Tool uses three XML files to perform targeted migrations. Which of the following files is not used by the User State Migration Tool? a. MigApp.xml b. MigSettings.xml c. MigDocs.xml d. MigUser.xml | b. MigSettings.xml |
| Which of the following is the name of the User State Migration Tool that is used to restore files and settings on the target computer? a. LoadState.exe b. SaveState.exe c. ScanState.exe d. UsmtUtilis.exe | a. LoadState.exe |
| Which USMT component is used to copy the user files and settings into a centralized storage area? a. LoadState b. ScanState c. UsmtUtils d. CopyState | b. ScanState |
| How many bits in length is an IPv4 address? a. 16 bits b. 32 bits c. 64 bits d. 128 bits | b. 32 bits |
| Which of the following is the correct binary representation of the IP address 192.168.0.2? | 11000000.10100000.00000000.00000010 |
| Which IPv4 IP class provides for 126 unique networks, each having up to 16,777,214 hosts? a. Class A b. Class B c. Class C d. Class D | a. Class A |
| The Windows operating system supports three name-resolution systems. Which of the following is not a name-resolution system? | Address Resolution Protocol |
| Which of the following would be considered a second-level domain? a. .com b. microsoft.com c. data.contoso.com d. east.microsoft.com | b. microsoft.com |
| By default, after how much time has elapsed in a client’s DHCP lease will the client attempt to renew the lease? a. 4 days b. 50 percent of the lease time c. 8 days d. 75 percent of the lease time | b. 50 percent of the lease time |
| Which command is used to determine the route a packet takes? a. nslookup b. route c. tracert d. ping | c. tracert |
| Which of the following represent valid IPv6 addresses? (Choose all that apply) | FDC0:0:0:02BD:FF:BECB:FEF4:961D FDC0:0000:0000:02BD:00FF:BECB:FEF4:961D FDC0::02BD:FF:BECB:FEF4:961D |
| In which of the following Windows 10 network locations is network discovery enabled by default? (Choose all that apply) a. The home network b. The work network c. The public network d. The domain network | a. The home network b. The work network d. The domain network |
| Which IPv6 address type can be used to communicate with any IPv6 device? a. Unique local unicast b. Node local unicast c. Global unicast d. Site local unicast | c. Global unicast |
| Digital certificates, smart cards, picture passwords, and biometrics are used to perform which of the following actions? a. Integrity b. Confidentiality c. Authorization d. Authentication | d. Authentication |
| Generally speaking, which of the following password conditions is not considered to be part of a strong password for a corporation? | Is also used for online accounts |
| Where are user accounts stored for computers that are in a workgroup? a. Accounts Manager Datastore b. Security Accounts Manager c. Directory Information Tree d. Local Security Authority | b. Security Accounts Manager |
| Which term refers to a method used to provide proof that a security principal is the source of data, an action, or a communication? a. Authorization b. Integrity c. Nonrepudiation d. Confidentiality | c. Nonrepudiation |
| Which term refers to the ability to guarantee that the information has not been arbitrarily changed? a. Authorization b. Integrity c. Nonrepudiation d. Confidentiality | b. Integrity |
| Which of the following statements are true concerning share permissions? (Choose all that apply) | For drives formatted with the FAT/FAT32 file system, share permissions are the only option available. They determine the type of access that others will have to the folder when they connect to it over the network. |
| Which of the following best describes how to turn on Public folder sharing? | Enable the feature by opening the Network and Sharing Center and then enabling the appropriate feature in Advanced Sharing Settings. |
| The hardware that actually produces hard-copy documents is called a _____. a. Printer b. Print device c. Print server d. Print driver | b. Print device |
| In Windows, a _________ is the software interface through which a computer communicates with a print device. a. Printer b. Printing device c. Print device d. Print driver | a. Printer |
| Which basic printer permission should be granted to a user to be able to pause, resume, restart, and cancel his own print jobs as well as the print jobs of others? a. Print b. Manage this printer c. Manage documents d. Manage print jobs | c. Manage documents |