Question 1
2 out of 2 points
What are the buttons called in the Windows 8 edge UI that provide access to common operating system functions such as Search and Settings?
Answer
| |||||
Question 2
2 out of 2 points
If you are currently running Windows 8 on your computer, what is the easiest way to upgrade to Windows 8 Professional?
Answer
| |||||
Question 3
2 out of 2 points
Which of the following methods is not a way to close unused apps that are still running on a Windows 8 computer?
Answer
| |||||
Question 4
2 out of 2 points
Computers running Windows PE will automatically shut down and reboot after how long?
Answer
| |||||
Question 5
2 out of 2 points
During what phase of the Windows 8 startup process is the Local Security Authority loaded?
Answer
| |||||
Question 6
2 out of 2 points
Before performing an upgrade to Windows 8, several tasks should be performed to ensure the procedure goes smoothly. Which of the following is not one of these tasks?
Answer
| |||||
Question 7
2 out of 2 points
What name is given to a Windows PE installation on a computer with Windows 8 already installed?
Answer
| |||||
Question 8
2 out of 2 points
Your organization currently uses roaming profiles for all users. All users use Windows 7 computers. Windows 8 will be introduced shortly in your organization. Given the information presented, what issue should you be aware of?
Answer
| |||||
Question 9
2 out of 2 points
You have a small number of Windows XP computers in your organization. You need to manually move as much data from the user profile locations for these computers as possible to the new Windows 8 computers these users will be receiving shortly. Where in the file system would you find the profile information?
Answer
| |||||
Question 10
2 out of 2 points
The User State Migration Tool uses several files to control the migration process. What is the file format of these files?
Answer
| |||||
Question 11
2 out of 2 points
What should you enter into the Run dialog box to open the Device Manager console?
Answer
| |||||
Question 12
2 out of 2 points
What is the value of a protected checksum dependent upon?
Answer
| |||||
Question 13
0 out of 2 points
On which tab of a driver’s properties dialog box will you find information about any conflicts the driver may be experiencing?
Answer
| |||||
Question 14
2 out of 2 points
What Windows 8 feature assigns one of four integrity levels to running processes?
Answer
| |||||
Question 15
2 out of 2 points
What is the executable file name for the Windows Installer application on a Windows 8 computer?
Answer
| |||||
Question 16
2 out of 2 points
What Windows 8 feature prevents applications from executing code in prohibited areas?
Answer
| |||||
Question 17
2 out of 2 points
Using a single Microsoft account, on how many Windows 8 devices can you install a specific Windows app?
Answer
| |||||
Question 18
2 out of 2 points
Which of the following is not an AppLocker rule collection type available for usage when creating AppLocker rules?
Answer
| |||||
Question 19
2 out of 2 points
What PowerShell cmdlet would you need to use to install a critical Line of Business (LOB) Windows App that has been created within your organization?
Answer
| |||||
Question 20
2 out of 2 points
When you click the down arrow next to the Print button on the IE 10 toolbar, you can choose from all of the following options except
which one?
Answer
| |||||
Question 21
2 out of 2 points
What new standard defines a protocol that allows clients and servers to exchange data immediately as it becomes available without the overhead created by HTTP and TCP?
Answer
| |||||
Question 22
2 out of 2 points
By default, IE 10 is granted access to which area of the computer?
Answer
| |||||
Question 23
2 out of 2 points
Which Hyper-V virtual switch feature provides protection against a malicious virtual machine attempting to steal IP addresses from other virtual machines?
Answer
| ||||

Комментариев нет:
Отправить комментарий