среда, 11 ноября 2015 г.

CIS 329 QUIZ


Question 1
2 out of 2 points
  
 
What are the buttons called in the Windows 8 edge UI that provide access to common operating system functions such as Search and Settings?
Answer
   

 
   
Question 2
2 out of 2 points
  
 
If you are currently running Windows 8 on your computer, what is the easiest way to upgrade to Windows 8 Professional?
Answer
   

 
   
Question 3
2 out of 2 points
  
 
Which of the following methods is not a way to close unused apps that are still running on a Windows 8 computer?
Answer
   

 
   
Question 4
2 out of 2 points
  
 
Computers running Windows PE will automatically shut down and reboot after how long?
Answer
   

 
   
Question 5
2 out of 2 points
  
 
During what phase of the Windows 8 startup process is the Local Security Authority loaded?
Answer
   

 
   
Question 6
2 out of 2 points
  
 
Before performing an upgrade to Windows 8, several tasks should be performed to ensure the procedure goes smoothly. Which of the following is not one of these tasks?
Answer
   

 
   
Question 7
2 out of 2 points
  
 
What name is given to a Windows PE installation on a computer with Windows 8 already installed?
Answer
   

 
   
Question 8
2 out of 2 points
  
 
Your organization currently uses roaming profiles for all users. All users use Windows 7 computers.  Windows 8 will be introduced shortly in your organization. Given the information presented, what issue should you be aware of?
Answer
   

 
   
Question 9
2 out of 2 points
  
 
You have a small number of Windows XP computers in your organization. You need to manually move as much data from the user profile locations for these computers as possible to the new Windows 8 computers these users will be receiving shortly. Where in the file system would you find the profile information?
Answer
   

 
   
Question 10
2 out of 2 points
  
 
The User State Migration Tool uses several files to control the migration process. What is the file format of these files?
Answer
   

 
   
Question 11
2 out of 2 points
  
 
What should you enter into the Run dialog box to open the Device Manager console?
Answer
   

 
   
Question 12
2 out of 2 points
  
 
What is the value of a protected checksum dependent upon?
Answer
   

 
   
Question 13
0 out of 2 points
  
 
On which tab of a driver’s properties dialog box will you find information about any conflicts the driver may be experiencing?
Answer
   

 
   
Question 14
2 out of 2 points
  
 
What Windows 8 feature assigns one of four integrity levels to running processes?
Answer
   

 
   
Question 15
2 out of 2 points
  
 
What is the executable file name for the Windows Installer application on a Windows 8 computer?
Answer
   

 
   
Question 16
2 out of 2 points
  
 
What Windows 8 feature prevents applications from executing code in prohibited areas?
Answer
   

 
   
Question 17
2 out of 2 points
  
 
Using a single Microsoft account, on how many Windows 8 devices can you install a specific Windows app?
Answer
   

 
   
Question 18
2 out of 2 points
  
 
Which of the following is not an AppLocker rule collection type available for usage when creating AppLocker rules?
Answer
   

 
   
Question 19
2 out of 2 points
  
 
What PowerShell cmdlet would you need to use to install a critical Line of Business (LOB) Windows App that has been created within your organization?
Answer
   

 
   
Question 20
2 out of 2 points
  
 
When you click the down arrow next to the Print button on the IE 10 toolbar, you can choose from all of the following options except
which one?
Answer
   

 
   
Question 21
2 out of 2 points
  
 
What new standard defines a protocol that allows clients and servers to exchange data immediately as it becomes available without the overhead created by HTTP and TCP?
Answer
   

 
   
Question 22
2 out of 2 points
  
 
By default, IE 10 is granted access to which area of the computer?
Answer
   

 
   
Question 23
2 out of 2 points
  
 
Which Hyper-V virtual switch feature provides protection against a malicious virtual machine attempting to steal IP addresses from other virtual machines?
Answer

Комментариев нет:

Отправить комментарий