+ All Categories
Home > Documents > windows 7 chap 6-14

windows 7 chap 6-14

Date post: 09-Apr-2018
Category:
Upload: robert-olson
View: 216 times
Download: 0 times
Share this document with a friend

of 22

Transcript
  • 8/7/2019 windows 7 chap 6-14

    1/22

    chapter 6

    1. How can you enable remote desktopHow can you enable remote desktop rules if you reset the

    Windows Firewall? (Choose 2)

    Student Response Value Correct Answer Feedback

    1. Resetting firewall does not disable rules2. Re-enable manually 50%3. Disable and enable Remote Desktop 50%4. Must Reboot

    Score: 10/10Comments:

    2. You can disable the Windows 7You can disable the Windows 7 stealth feature.

    Student Response Value Correct AnswerTrue 0% False

    Score: 0/10Comments:

    3. You have to be running whatYou have to be running what protocol to use Easy Connect?

    Student Response Value Correct Answer Feedback1. Peer Protocol2. Peer Name Resolution Protocol 100%

    3. Remote Desktop Protocol4. Advanced Remote Protocol

    Score: 10/10Comments:

    4. Choose two (2) items you canChoose two (2) items you can create rules for Windows 7 firewall?

    Student Response Value Correct Answer Feedback1. Port addresses

    2. Programs 50%3. Services4. Features 50%

    Score: 10/10Comments:

    5. What is the bad result of RemoteWhat is the bad result of Remote Desktop?

    Student Response Value Correct Answer Feedback1. Desktop support is easier

    2. Desktop support technician gets little or no exercise doing the job. 100%

    3. Its faster

  • 8/7/2019 windows 7 chap 6-14

    2/22

    4. Its quicker

    Score: 10/10Comments:

    6. You can talk to a user using Remote

    You can talk to a user using Remote Assistance with a voice client in Windows7

    Student Response Value Correct AnswerFalse 100% False

    Score: 10/10Comments:

    7. What new feature in Windows 7 preventsWhat new feature in Windows 7 prevents attackers from accessing your system wh

    ile the network interface is becoming active?

    Student Response Value Correct Answer Feedback1. Port filtering2. OS Fingerprinting3. Boot Time filtering 100%4. Constant Filtering

    Score: 10/10Comments:

    8. What is the ICMP protocol

    What is the ICMP protocol mainly used to do?

    Student Response Value Correct Answer Feedback1. Broadcast2. Multicast3. Data4. Diagnostics 100%

    Score: 10/10Comments:

    9. Using Remote Assistance requiresUsing Remote Assistance requires you provide a password.

    Student Response Value Correct AnswerTrue 100% True

    Score: 10/10Comments:

    10. You can make a Remote Desktop connectionYou can make a Remote Desktop connection to which editions of Windows 7 (Choos

    e 2)

    Student Response Value Correct Answer Feedback1. Ultimate 50%

  • 8/7/2019 windows 7 chap 6-14

    3/22

    2. Starter3. Home Premium4. Professional 50%

    Score: 10/10Comments:

    chapter 7

    1. How can you enable remote desktopHow can you enable remote desktop rules if you reset the

    Windows Firewall? (Choose 2)

    Student Response Value Correct Answer Feedback1. Resetting firewall does not disable rules2. Re-enable manually 50%3. Disable and enable Remote Desktop 50%

    4. Must Reboot

    Score: 10/10Comments:

    2. You can disable the Windows 7You can disable the Windows 7 stealth feature.

    Student Response Value Correct AnswerTrue 0% False is correctScore: 0/10

    Comments:

    3. You have to be running whatYou have to be running what protocol to use Easy Connect?

    Student Response Value Correct Answer Feedback1. Peer Protocol2. Peer Name Resolution Protocol 100%3. Remote Desktop Protocol4. Advanced Remote Protocol

    Score: 10/10Comments:

    4. Choose two (2) items you canChoose two (2) items you can create rules for Windows 7 firewall?

    Student Response Value Correct Answer Feedback1. Port addresses2. Programs 50%3. Services4. Features 50%

    Score: 10/10Comments:

  • 8/7/2019 windows 7 chap 6-14

    4/22

    5. What is the bad result of RemoteWhat is the bad result of Remote Desktop?

    Student Response Value Correct Answer Feedback1. Desktop support is easier2. Desktop support technician gets little or no exercise doing the job. 100%

    3. Its faster4. Its quicker

    Score: 10/10Comments:

    6. You can talk to a user using RemoteYou can talk to a user using Remote Assistance with a voice client in Windows

    7

    Student Response Value Correct AnswerFalse 100% False

    Score: 10/10Comments:

    7. What new feature in Windows 7 preventsWhat new feature in Windows 7 prevents attackers from accessing your system wh

    ile the network interface is becoming active?

    Student Response Value Correct Answer Feedback1. Port filtering

    2. OS Fingerprinting3. Boot Time filtering 100%4. Constant Filtering

    Score: 10/10Comments:

    8. What is the ICMP protocolWhat is the ICMP protocol mainly used to do?

    Student Response Value Correct Answer Feedback1. Broadcast2. Multicast3. Data4. Diagnostics 100%

    Score: 10/10Comments:

    9. Using Remote Assistance requiresUsing Remote Assistance requires you provide a password.

    Student Response Value Correct Answer

    True 100% True

    Score: 10/10

  • 8/7/2019 windows 7 chap 6-14

    5/22

    Comments:

    10. You can make a Remote Desktop connectionYou can make a Remote Desktop connection to which editions of Windows 7 (Choos

    e 2)

    Student Response Value Correct Answer Feedback1. Ultimate 50%2. Starter3. Home Premium4. Professional 50%

    Score: 10/10Comments:

    chapter 8

    1. What can you use to determineWhat can you use to determine what network you are currently joined?

    Student Response Value Correct Answer Feedback1. Network Center2. Network Location3. Network and Sharing Center 100%4. Sharing Center

    Score: 6.25/6.25Comments:

    2. You can cofigure BranchCacheYou can cofigure BranchCache from the command line using?

    Student Response Value Correct Answer Feedback1. Net Cache2. Net Share3. Net use4. Netsh 100%

    Score: 6.25/6.25Comments:

    3. You can share folders by right clickingYou can share folders by right clicking the folder then selecting either of tw

    o of the following:

    Student Response Value Correct Answer Feedback1. Security2. Customize3. Share 50%4. Advanced Sharing 50%

    Score: 6.25/6.25

    Comments:

  • 8/7/2019 windows 7 chap 6-14

    6/22

    4. Newly created files inherit whatNewly created files inherit what permissions?

    Student Response Value Correct Answer Feedback1. None2. Folder Permissions 100%3. All Permissions

    4. Read only

    Score: 6.25/6.25Comments:

    5. The Net Share command canThe Net Share command can be used to do all of the following except:

    Student Response Value Correct Answer Feedback1. Share folder2. Delete folder 100%

    3. Assign Permissions4. Configure Caching options

    Score: 6.25/6.25Comments:

    6. How many standard file and folderHow many standard file and folder permissions are avaailable?

    Student Response Value Correct Answer Feedback1. 22. 4

    3. 54. 6 100%

    Score: 6.25/6.25Comments:

    7. Sharing options in Windows 7Sharing options in Windows 7 apply to what?

    Student Response Value Correct Answer Feedback1. Per interface basis 100%2. Per use basis3. Per internet basis4. Per computer basis

    Score: 6.25/6.25Comments:

    8. Robocopy.exe works just like copy andRobocopy.exe works just like copy and move in GUI.

    Student Response Value Correct AnswerFalse 100% False

    Score: 6.25/6.25Comments:

  • 8/7/2019 windows 7 chap 6-14

    7/22

    9. Copy and move permissions of aCopy and move permissions of a file are always the same no matter where copied

    .

    Student Response Value Correct Answer

    False 100% False

    Score: 6.25/6.25Comments:

    10. Which additional permissions areWhich additional permissions are applied when you assign modofy permission? (c

    hoose 2)

    Student Response Value Correct Answer Feedback1. Read 50%

    2. Deny3. Create4. Execute 50%

    Score: 6.25/6.25Comments:

    11. File sharing encryption can use all ofFile sharing encryption can use all of the following except:

    Student Response Value Correct Answer Feedback1. 40-bit

    2. 56-bit3. 64-bit 100%4. 128-bit

    Score: 6.25/6.25Comments:

    12. What new feature is includedWhat new feature is included in Windows 7 that simplifies the process of shari

    ng files on a small network?

    Student Response Value Correct Answer Feedback1. Shared folders2. HomeGroups 100%3. NetworkGroups4. PeerGroup

    Score: 6.25/6.25Comments:

    13. What file type can you set file andWhat file type can you set file and folder permissions?

    Student Response Value Correct Answer Feedback1. FAT2. NTFS 100%

  • 8/7/2019 windows 7 chap 6-14

    8/22

    3. Fat324. Fat16

    Score: 6.25/6.25Comments:

    14. You can create a HomeGroupYou can create a HomeGroup on a domain network.

    ans.

    Student Response Value Correct AnswerFalse 100% False

    Score: 6.25/6.25Comments:

    15. What can you use to tell how many

    What can you use to tell how many and who are connected to your shared folders?

    Student Response Value Correct Answer Feedback1. Shares node2. Open Files node3. Performance4. Sessions node 100%

    Score: 6.25/6.25Comments:

    16. What is a library?What is a library?

    Student Response Value Correct Answer Feedback1. Folders2. Collection3. Virtualized Collection of Folders 100%4. Books on a shelf

    Score: 6.25/6.25Comments:

    chapter 9

    1. What can you require toWhat can you require to logon to ensure security? (Choose 2)

    Student Response Value Correct Answer Feedback1. Strong Password 50%2. Logon3. Smart Card 50%4. Credit Card

    Score: 10/10Comments:

  • 8/7/2019 windows 7 chap 6-14

    9/22

    2. Promping for credentials requirePromping for credentials requires administrator to?

    Student Response Value Correct Answer Feedback1. Consent2. Consider

    3. Reply4. Enter Password 100%

    Score: 10/10Comments:

    3. Where does the Windows 7 CredentialWhere does the Windows 7 Credential Manager store passwords?

    Student Response Value Correct Answer Feedback1. Security Access Manager (SAM)

    2. On Credential Manager Server3. Windows Vault 100%4. In System Restore

    Score: 10/10Comments:

    4. How many settings are available for UAC?How many settings are available for UAC?

    Student Response Value Correct Answer Feedback1. 2

    2. 33. 4 100%4. 5

    Score: 10/10Comments:

    5. How many policies are availableHow many policies are available in the User Rights Assignment node of group po

    licy?

    Student Response Value Correct Answer Feedback1. 42. 44 100%3. 84. 24

    Score: 10/10Comments:

    6. You can create a user resetYou can create a user reset password to a ?

    Student Response Value Correct Answer Feedback1. Floppy Disk2. Restore partition

  • 8/7/2019 windows 7 chap 6-14

    10/22

    3. USB Drive 100%4. New partition

    Score: 10/10Comments:

    7. The Runas allows a user to?The Runas allows a user to?

    Student Response Value Correct Answer Feedback1. Run a program with a different account 100%2. Run all programs3. Run instead of execute4. No change when using Runas

    Score: 10/10Comments:

    8. Complexity of password requiresComplexity of password requires at least __ of the following: lowercase, upper

    case, numbers, symbols.

    Student Response Value Correct Answer Feedback1. 42. 3 100%3. 24. 1

    Score: 10/10Comments:

    9. Which of the following tools can usersWhich of the following tools can users use to back up EFS certificates createdwhen they encrypt a file on a stand-alone computer running Windows 7? (Choose all that apply)

    Student Response Value Correct Answer Feedback1. Credential Manager2. Manage File Encryption tool 34%3. Certificate Manager Console 33%4. Cipher.exe 33%

    Score: 10/10Comments:

    10. What group cannot be used to assignWhat group cannot be used to assign specific rights in Group Policy in the bui

    lt-in groups of Windows 7?

    Student Response Value Correct Answer Feedback1. Replicator2. Power Users3. Event Log Readers

    4. Guest user 100%

    Score: 10/10

  • 8/7/2019 windows 7 chap 6-14

    11/22

    chapter 10

    1. Which of the following is not a VPNWhich of the following is not a VPN solution in use today prior to Windows 7?

    Student Response Value Correct Answer Feedback1. Point-to-Point Tunneling Protocol2. Layer 2 Tunneling Protocol3. Direct Access 100%4. Secure Socket Tunneling

    Score: 10/10Comments:

    2. Which Direct Access connection providesWhich Direct Access connection provides the poorest performance?

    Student Response Value Correct Answer Feedback1. IP-HTTPS 100%2. Teredo3. 6 to 44. Public IPv6 address

    Score: 10/10Comments:

    3. You know you have made a successfulYou know you have made a successful Direct Access connection by clicking on th

    e Network Access icon and it says?

    Student Response Value Correct Answer Feedback1. Local and Internet Access2. Local Access3. Internet and Corporate Access 100%4. Internet Access

    Score: 10/10Comments:

    4. Not all editions of Windows 7 supports VPNNot all editions of Windows 7 supports VPN

    Student Response Value Correct AnswerFalse 100% False

    Score: 10/10Comments:

    5. The most secure protocol for VPN

    The most secure protocol for VPN is?

    Student Response Value Correct Answer Feedback

  • 8/7/2019 windows 7 chap 6-14

    12/22

    1. PPTP2. SSTP3. L2TP/IPsec4. IKEv2 100%

    Score: 10/10Comments:

    6. Which of the following authenticationWhich of the following authentication protocols can you use to connect to an I

    KEv2 VPN? (Choose 3)

    Student Response Value Correct Answer Feedback1. PEAP 33%2. EAP-MSCHAPv2 34%3. Microsoft Smart Card or Certificate 33%4. CHAP

    Score: 10/10Comments:

    7. Which of the following is not a requiremenWhich of the following is not a requirement for Direct Access?

    Student Response Value Correct Answer Feedback1. Server must have two NIC's2. Must have a direct connection to the internet3. Must have a direct connection to corporate intranet4. Must have hardware firewall 100%

    Score: 10/10Comments:

    8. Direct Access is configured throughDirect Access is configured through?

    Student Response Value Correct Answer Feedback1. Automatic Configuration2. Group Policy 100%3. Manual Configuration4. Connection manager kit

    Score: 10/10Comments:

    9. NAP restricts access based on allNAP restricts access based on all of the following except

    Student Response Value Correct Answer Feedback1. Anti virus up to date2. No firewall enabled 100%3. Automatic updates enabled4. Anti spyware up to date

    Score: 10/10Comments:

  • 8/7/2019 windows 7 chap 6-14

    13/22

    10. Direct Access is automaticDirect Access is automatic

    Student Response Value Correct AnswerTrue 100% True

    Score: 10/10Comments:

    chapter 11

    1. Kim_Akers has an user account runningKim_Akers has an user account running on Windows 7. The account is not a membe

    r of the administrators group. Which of the following power settings ca Kim perform? (Choose 3)

    Student Response Value Correct Answer Feedback1. Choose a different power plan 33%2. Create a new power plan 34%3. Change what the power buttons do 33%4. Change the Require A Password On Wakeup Setting

    Score: 10/10Comments:

    2. Which of the following BitLocker policiesWhich of the following BitLocker policies should you configure to ensure that

    BitLocker To Go Reader is available on all FAT-formatted removable devices protected with BitLocker?

    Student Response Value Correct Answer Feedback1. Configure Use of Passwords for Removable Data Drives2. Allow access to BitLocker-Protected Removable Data Drives from earlier versions of Windows 100%3. Choose How BitLocker-Protected Removable Drives can be Recovered4. Control use of BitLocker on Removable Drives

    Score: 10/10Comments:

    3. Which of the following policies shouldWhich of the following policies should you configure to allow a computer witho

    ut a TPM chip that is running Windows 7 Enterprise to utilize BitLocker to protect its hard drive?

    Student Response Value Correct Answer Feedback1. Require Additional Authentication at startup2. Allow Enhanced PINs for startup 100%3. Configure TPM Platform Validation Profile4. Configure Minimum PIN Length for startup

    Score: 10/10Comments:

  • 8/7/2019 windows 7 chap 6-14

    14/22

    4. Transparent Caching is the sameTransparent Caching is the same as BranchCache

    Student Response Value Correct AnswerFalse 100% False

    Score: 10/10Comments:

    5. BitLocker is to protect computersBitLocker is to protect computers running Windows 7 from online attacks

    Student Response Value Correct AnswerFalse 100% False

    Score: 10/10Comments:

    6. Which of the following is not a benefitWhich of the following is not a benefit of BitLocker?

    Student Response Value Correct Answer Feedback1. Prevents attacker from recovering data from a stolen computer2. Protects the integrity of the boot environment3. It makes hard disk disposal very difficult 100%4. It simplifies hard disk disposal

    Score: 10/10Comments:

    7. You cannot use BitLocker if you don'tYou cannot use BitLocker if you don't have a TPM module

    Student Response Value Correct AnswerFalse 100% False

    Score: 10/10Comments:

    8. If Bitlocker is working properly thenIf Bitlocker is working properly then all users can read files on the disk if

    not otherwise encrypted

    Student Response Value Correct AnswerTrue 100% True

    Score: 10/10Comments:

    9. Which of the following tools canWhich of the following tools can you use to determine the identification strin

    g assigned to a BitLocker-protected volume

    Student Response Value Correct Answer Feedback

  • 8/7/2019 windows 7 chap 6-14

    15/22

    1. Manage-bde.exe 100%2. Cipher.exe3. Bcdedit.exe4. Sigverif.exe

    Score: 10/10Comments:

    10. Sync Center can be used for allSync Center can be used for all of the following except?

    Student Response Value Correct Answer Feedback1. Disable offline files2. View offline files3. Configure Encryption for offline files4. Compress offline files 100%

    Score: 10/10

    chapter 12

    1. Which policies should you configure ifWhich policies should you configure if you want to use a WSUS server as a sour

    ce instead of Microsoft Update servers?

    Student Response Value Correct Answer Feedback1. Turn off software notification2. Automatic Updates Detection Frequency3. Configure Automatic Updates

    4. Specify Intranet Microsoft Update Service Location 100%

    Score: 10/10Comments:

    2. Internet Explorer Compatibility View canInternet Explorer Compatibility View can be enabled by clicking the broken pag

    e icon.

    Student Response Value Correct AnswerTrue 100% True

    Score: 10/10Comments:

    3. Smart Screen Filter keeps peopleSmart Screen Filter keeps people from viewing your screen except when straighton

    Student Response Value Correct AnswerFalse 100% False

    Score: 10/10

    Comments:

  • 8/7/2019 windows 7 chap 6-14

    16/22

    4. Which of the following actions should youWhich of the following actions should you take , after starting Internet Explo

    rer third party Web sites do not track your browsing session?

    Student Response Value Correct Answer Feedback1. Start InPrivate Browsing session2. Enable InPrivate filtering 100%

    3. Disable Pop-up Blocker4. Disable Smart Screen filter

    Score: 10/10Comments:

    5. Which of the following is not an InternetWhich of the following is not an Internet Explorer security zone?

    Student Response Value Correct Answer Feedback1. Local Internet 100%

    2. Trusted Sites3. Restricted Sites4. Internet

    Score: 10/10Comments:

    6. When Windows 7 is configured accordingWhen Windows 7 is configured according to its default settings, which of the f

    ollowing Tasks can a standard user perform with respect to Windows Update?

    Student Response Value Correct Answer Feedback

    1. Uninstall updates2. Install updates 100%3. Change when updates are installed4. Hide updates

    Score: 10/10Comments:

    7. What are the two main sections in the ActionWhat are the two main sections in the Action Center?

    (Choose Two)

    Student Response Value Correct Answer Feedback1. Firewall2. Security 50%3. Maintenance 50%4. Virus Protection

    Score: 10/10Comments:

    8. What tool can you use to to determineWhat tool can you use to to determine if a particular software update is missi

    ng from a client computer?

    Student Response Value Correct Answer Feedback

  • 8/7/2019 windows 7 chap 6-14

    17/22

    1. Microsoft Update2. WSUS3. Group Policy Management4. MBSA 100%

    Score: 10/10Comments:

    9. If Windows 7 updates are set for 3 a.m.If Windows 7 updates are set for 3 a.m. and the computer is off when will upda

    tes occur?

    Student Response Value Correct Answer Feedback1. Never2. 3 a.m.3. 3 p.m.4. When turned on 100%

    Score: 10/10Comments:

    10. What are the three default securityWhat are the three default security levels?

    Student Response Value Correct Answer Feedback1. Medium 33%2. Low 0%3. High 34%4. Medium-High5. Medium-Low

    Score: 6.7/10

    chapter 13

    1. You want use Performance Monitor to displayYou want use Performance Monitor to display performance data captured in a DCS

    . You open the tool and access Performance Monitor Properties dialog box. On which tab can you choose whether to display current activity in real time or log files that you have saved using DCS?

    Student Response Value Correct Answer Feedback1. General2. Source 100%3. Data4. Graph5. Appearance

    Score: 10/10Comments:

    2. You have a dual boot system and wantYou have a dual boot system and want to make Windows 7 the default operating s

  • 8/7/2019 windows 7 chap 6-14

    18/22

    ystem. What tool do you use to accomplish

    Student Response Value Correct Answer Feedback1. Services Console2. Performance Options3. Task Manager4. System Configuration 100%

    Score: 10/10Comments:

    3. You are configuring a client runningYou are configuring a client running Windows 7 named Canberra to retrieve even

    ts from a computer Running Windows 7 named Aberdeen. Both computers are one thesame workgroup. Which of the following commands would you run on the collector computer to configure Event Collector service?

    Student Response Value Correct Answer Feedback

    1. wecutil qc 100%2. winrm qc3. winrm qc -q4. %SystemRoot%\System32\gpedit.msc

    Score: 10/10Comments:

    4. Which Windows Performance AnalysisWhich Windows Performance Analysis tool captures user and kernel traces and ca

    n merge them to form a combined trace?

    Student Response Value Correct Answer Feedback1. Perfomance Analyzer2. On/Off Transition Trace Capture3. Trace Capture, Processing and Command-Line Analysis 100%4. Visual Trace Analysis

    Score: 10/10Comments:

    5. A client running Windows 7 is experiencingA client running Windows 7 is experiencing intermittent performance problems.

    You suspect the problems might be caused by an application that you recently installed but can't remember exactly when. Which tool or feature would you use to determine when the application was installed?

    Student Response Value Correct Answer Feedback1. Reliability Monitor 100%2. Action Center3. DCS's4. Performance Monitor

    Score: 10/10Comments:

    6. Which of the following are built-insWhich of the following are built-ins in DCS's? (Choose 2)

  • 8/7/2019 windows 7 chap 6-14

    19/22

    Student Response Value Correct Answer Feedback

    1. System Reliability2. System Performance 50%3. System Diagnostics 50%4. System Monitor

    Score: 10/10Comments:

    7. What WIM tool do you use to viewWhat WIM tool do you use to view Windows Management-generated events and eventinformation, such as the events date and time, class, point of origin, and description?

    Student Response Value Correct Answer Feedback1. WMI CIM Studio2. WMI Object Browser

    3. WMI Event Registration Tool4. WMI Event Viewer 100%

    Score: 10/10Comments:

    8. You have upgraded the hardwareYou have upgraded the hardware on a computer. The Windows Experience Index gen

    erates a new experience score. The subscores are as follows: Processpr 5.1, Memory 3.3, Graphics 3.6, Gaming Graphics 2.3, Primary Hard Disk 5.3 What is the Windows Experience Base Score?

    Student Response Value Correct Answer Feedback1. 2.3 100%2. 3.93. 3.34. 4.4

    Score: 10/10Comments:

    9. You have a dual processor computer thatYou have a dual processor computer that is using only one processor. How do yo

    u ensure that these processes use whatever processor is available?

    Student Response Value Correct Answer Feedback1. Configure Process Affinity on the Processes tab of Task Manager 100%

    2. Configure Priority Affinity on the Processes tab of Task Manager3. Select Adjust for Best Performance of Programs on the Advanced tab of the Performance Options tool4. Reconfigure Virtual Memory settings

    Score: 10/10Comments:

    10. Which tool provided by Windows 7 helpsWhich tool provided by Windows 7 helps you determine which applications are re

  • 8/7/2019 windows 7 chap 6-14

    20/22

    sponsible for activity on your hard disk, including which files and folders arebeing accessed?

    Student Response Value Correct Answer Feedback1. Process Explorer2. Resource Monitor 100%3. Task Manager

    4. Windows Experience Index

    Score: 10/10

    chapter 14

    1. How many different Recovery toolsHow many different Recovery tools are available?

    Student Response Value Correct Answer Feedback1. 32. 4

    3. 5 100%4. 6

    Score: 10/10Comments:

    2. What file does Enable Boot LoggingWhat file does Enable Boot Logging create?

    Student Response Value Correct Answer Feedback1. Bootlog.txt2. Ntbtlog.txt 100%

    3. Ntbtlog.doc4. Bootup.log

    Score: 10/10Comments:

    3. Windows 7 backs up files evenWindows 7 backs up files even if they are open

    Student Response Value Correct AnswerTrue 100% True

    Score: 10/10Comments:

    4. Backup and Restore supports whatBackup and Restore supports what kind of backups? (Choose 2)

    Student Response Value Correct Answer Feedback1. Repair disk2. Files and Folders 50%3. System Restore4. System Image 50%

    Score: 10/10Comments:

  • 8/7/2019 windows 7 chap 6-14

    21/22

    5. Advanced Recovery Methods mayAdvanced Recovery Methods may not keep user data.

    Student Response Value Correct AnswerTrue 100% True

    Score: 10/10Comments:

    6. Where do you not want to placeWhere do you not want to place your system backup?

    Student Response Value Correct Answer Feedback1. DVD-ROM2. Network drive3. A separate partition on your drive 100%

    4. External hard drive

    Score: 10/10Comments:

    7. System Restore does not backupSystem Restore does not backup what?

    Student Response Value Correct Answer Feedback1. System Files2. User Files 100%3. Programs

    4. Registry Settings

    Score: 10/10Comments:

    8. Make sure that the Backup destinationMake sure that the Backup destination has BitLocker enabled.

    Student Response Value Correct AnswerFalse 100% False

    Score: 10/10Comments:

    9. What command can you use to disableWhat command can you use to disable kernel debugging?

    Student Response Value Correct Answer Feedback1. bcedit /debug off2. bcdedit /debug off 100%3. bcdedit /debug kernel off4. bcdedit /debug disable

    Score: 10/10Comments:

  • 8/7/2019 windows 7 chap 6-14

    22/22

    10. A System Image is a copy of foldersA System Image is a copy of folders on the system disk.

    Student Response Value Correct AnswerFalse 100% False

    Score: 10/10


Recommended