Chapter 4 Performing Post-Installation Configuration

11 September 2022
4.7 (114 reviews)
26 test answers

Unlock all answers in this set

Unlock answers (22)
question
Which of the following tools can be located among Administrative Tools? (Choose all that apply.) a. Print Management b. System Information c. Computer Management d. Event Viewer e. Windows Update
answer
a. Print Management b. System Information c. Computer Management d. Event Viewer
question
When changing the desktop appearance, the changes are written to which of the following? a. A DLL file b. A INI file c. A GPO d. The Registry
answer
d. The Registry
question
The personal assistant used in Windows 10 to find things on a PC is known as which of the following? a. Indexer b. Clippy c. Siri d. Cortana
answer
d. Cortana
question
Which of the following tools allows the user to see the edition and version of Windows 10 and how much memory is used by Windows 10? a. System Configuration b. Event Viewer c. Windows Memory Diagnostic d. System
answer
d. System
question
Which of the following is not a basic type of add-on? a. Toolbar and Extensions b. Search Providers c. Privacy Plug-in d. Accelerators
answer
c. Privacy Plug-in
question
When an ActiveX component needs to be approved, a(n) _______ bar will appear. a. orange b. red c. yellow d. blue
answer
c. yellow
question
Which of the following content zones automatically uses your user name and password to access websites that are assigned to the zone? a. Internet zone b. Local intranet zone c. Trusted sites zone d. Restricted sites zone
answer
b. Local intranet zone
question
Which of the following technologies is used to protect against phishing? a. InPrivate Browsing b. InPrivate Filtering c. SmartScreen d. SSL
answer
c. SmartScreen
question
When using SSL, the public key is found in a _______. a. digital certificate b. cookie c. smartfilter d. accelerator
answer
a. digital certificate
question
How can a virtual switch be created for the purpose of isolating virtual machines (VMs) from the external network and the host operating system? a. An external virtual switch can be created. b. An internal virtual switch can be created. c. A private virtual switch can be created. d. VMs cannot be isolated from the external network.
answer
c. A private virtual switch can be created.
question
1.Which of the following programs should be used to make items larger on the desktop? a. Settings b. Control Panel c. Device Manager d. System Configuration
answer
a. Settings
question
An administrator needs to connect a virtual hard disk with a virtual machine (VM). Which disk format should he choose and why? a. VHDX because it's the only one available when creating a new disk b. VHD or VHDX if using an existing virtual hard disk c. VHD with an existing hard disk and a Type II hypervisor product d. Either one is possible and applicable
answer
a. VHDX because it's the only one available when creating a new disk
question
Which of the following is the key benefit for creating a virtual switch? a. Virtual switches enable virtual machines (VMs) to participate on the networks to which the physical adapters are connected. b. Virtual switches require no physical space in the rack. c. Virtual switches enable the Hyper-V server to participate on the networks to which the physical adapters are connected. d. Virtual switches have unlimited ports, freeing network administrators from connecting physical switches by uplinks or crossover circuits.
answer
a. Virtual switches enable virtual machines (VMs) to participate on the networks to which the physical adapters are connected.
question
Which of the following network communication occurs after creating a private virtual switch? a. The VM on the parent partition can communicate with the physical network. b. VMs on both the parent and child partitions can communicate with each other. c. VMs on the child partitions can communicate with each other only. d. VMs on child partitions and the parent partition cannot communicate with each other.
answer
c. VMs on the child partitions can communicate with each other only.
question
In Windows 10, Internet Explorer runs in protected mode. Which of the following best describes the capabilities of Internet Explorer when running in this mode? a. Internet Explorer can write to the Temporary Internet files folder. b. Internet Explorer can write to the Temporary Internet files and the History folders. c. Internet Explorer can write to the Temporary Internet files, History, and Cookies folders. d. Internet Explorer can write to the Temporary Internet files, History, Cookies, and Favorites folder.
answer
d. Internet Explorer can write to the Temporary Internet files, History, Cookies, and Favorites folder.
question
Add-ons
answer
Software components that interact with the basic functions of the web browser
question
RSS Feeds
answer
A push technology that simplifies the process of delivering updated content to designated users
question
Social engineering
answer
Describes any attempt to penetrate the security of a system by convincing people to disclose secret information
question
Security zones
answer
Used by Internet Explorer to divide websites and assign different sets of privileges to each
question
Accelerators
answer
Enable users to highlight content in a browser window instead of using the search box
question
SmartScreen Filter
answer
Examines traffic for evidence of phishing activity
question
WebSockets
answer
Enables clients and servers to exchange data immediately
question
Protected mode
answer
Provides a way to run Internet Explorer with highly reduced privileges
question
InPrivate Mode
answer
Enables surfing the Internet without leaving any record of your activities
question
Compatibility View
answer
Enables browser to display older pages properly
question
Specify the correct order of the steps necessary to create a virtual machine. a. From Server Manager's Tools menu, select Hyper-V Manager. b. Specify the Name and Location of the virtual machine files. c. Log on to the server with administrative privileges. d. Select a Hyper-V server and, from the Action menu, choose New Virtual Machine. e. Specify the Startup memory and Network Connections. f. Decide whether to install the new OS now or later.
answer
C Log on to the server with administrative privileges. A From Server Manager's Tools menu, select Hyper-V Manager. D Select a Hyper-V server and, from the Action menu, choose New Virtual Machine. B Specify the Name and Location of the virtual machine files. E Specify the Startup memory and Network Connections. F Decide whether to install the new OS now or later.