Exam 7: Securing and Sharing Windows Resources
Exam 1: Windows Versions and Customer Service25 Questions
Exam 2: Installing Windows24 Questions
Exam 3: Setting up a Local Network31 Questions
Exam 4: Maintaining Windows24 Questions
Exam 5: Troubleshooting Windows After Startup24 Questions
Exam 6: Troubleshooting Windows Startup24 Questions
Exam 7: Securing and Sharing Windows Resources25 Questions
Exam 8: Security Strategies and Documentation71 Questions
Exam 9: Supporting Mobile Devices58 Questions
Exam 10: Macos, Linux, and Scripting24 Questions
Exam 11: Appendix: Asafety Procedures and Environmental Concerns8 Questions
Select questions type
You recently created several new user accounts in the Sales OU and configured them with the appropriate group membership, logon scripts, and printer access. Except for one new sales employee, all employees are actively using the account. The remaining employee will be using the account within the next two weeks.
What is best practice for the remaining unused account?
Free
(Multiple Choice)
4.8/5
(34)
Correct Answer:
D
An administrator is assigning Windows user accounts to user groups based on the user's role and notices the built-in Power Users group.
What is the purpose of the Power Users group in Windows 7 and later?
Free
(Multiple Choice)
4.9/5
(40)
Correct Answer:
D
A Windows user called the help desk to request that her local user account password be reset on her computer. The help desk technician connected to the computer using RDC and reset the password using the Network Places Wizard. After the password was reset, the user lost access to all the data files on the local HDD.
Which of the following describes the most likely reason for the lost data files?
Free
(Multiple Choice)
4.8/5
(40)
Correct Answer:
C
The users in the sales department need a central location on the network to share data files. All the client computers in the organization are running Windows 10 and have network and Internet connectivity. The file server that hosts the network drive for the sales department is running Windows Server 2016.
Which of the following is the first step in implementing this data share?
(Multiple Choice)
4.9/5
(42)
A Windows 10 Home user is attempting to encrypt the contents of a folder on a volume formatted with NTFS. The user contacted you to ask why the option to encrypt the folder is disabled.
What is the most likely reason the encryption option is disabled?
(Multiple Choice)
4.8/5
(39)
You have received several trouble tickets from the employees in the warehouse for the stand-alone computers used to control various shipping machines because the computers are not booting when powered. Each time a technician resolves the booting issue the boot order is changed in the firmware. Each computer is required to have the USB ports disabled in the firmware to keep employees from connecting rogue devices.
Which of the following steps should be taken to eliminate these trouble tickets?
(Multiple Choice)
5.0/5
(24)
You are having difficulty changing permissions for a folder on an NTFS volume that was created by another user.
How can you best solve this issue without losing data in the folder?
(Multiple Choice)
4.7/5
(34)
Which of the following security settings can best help minimize brute force attacks on local user account passwords?
(Multiple Choice)
4.9/5
(30)
You need to secure your Windows 7 computer in a way that prevents access to the entire HDD even if the drive is moved to another system.
Which solution will you implement?
(Multiple Choice)
4.8/5
(33)
A technician is using the Security tab in the Properties dialog box in an attempt to remove the inherited status from a file's permissions but cannot locate where to make the change.
Which of the following steps should the technician take to make this change?
(Multiple Choice)
4.9/5
(35)
While performing disk and file maintenance on the company file server, you determine a user in the accounting department has been accidentally saving documents to all shared folders on the file server. The user's computer was recently passed to her from another user in the company, and according to company policy, the user should have access only to the accounting share.
Which of the following best describes this situation?
(Multiple Choice)
4.8/5
(31)
Which of the following best meets the requirements of a strong password?
(Multiple Choice)
4.8/5
(33)
A technician, who was signed in to a Windows 10 computer as local administrator, accessed the Local Security Policy console and changed the Lock Screen timeout from 10 minutes to 60 minutes. After the technician completed the change, the user signed in to AD and discovered that the setting had reverted to 10 minutes.
What can the technician do to keep the setting from reverting from 60 minutes to 10 minutes?
(Multiple Choice)
4.7/5
(40)
A technician wants to limit access to a group of folders and is using Group Policy to prevent the users in the sales department from accessing folders assigned to the accounting department. The technician is having difficulty achieving acceptable results.
Which of the following is the most likely reason the technician is having difficulties?
(Multiple Choice)
4.8/5
(39)
A company asked you help mitigate the brute force attacks carried out against its users' Windows account passwords. You successfully removed the malware responsible for the attacks and need to better secure the passwords assigned to the user accounts without limiting the system's usability.
Which of the following should be included in securing the user accounts? (Select THREE.)
(Multiple Choice)
4.7/5
(41)
You have been tasked with training end users in security best practices and have observed a trend among users in which many are writing down their passwords.
Which of the following procedures can be implemented to provide enough security to protect resources while minimizing the need for users to write down their passwords?
(Multiple Choice)
4.8/5
(25)
Your computer has a single HDD formatted with NTFS with the following data folders:
C:\Documents
C:\Pictures
You create a new child folder under the C:\Documents folder.
What term describes the permissions the new folder automatically attains from the C:\Documents folder?
(Multiple Choice)
4.9/5
(46)
Several computers in your organization are being used from within the building after hours when the company is closed. Your manager has asked you to configure the computers to limit access to business hours.
Which of the following steps can be taken to limit access to the computers?
(Multiple Choice)
4.8/5
(30)
A coworker asks your opinion about how to minimize ActiveX attacks while she browses the Internet using Internet Explorer. The coworker recalls there is a setting in the Internet Options dialog box to prompt the user before downloading ActiveX controls, but can't remember which tab to use.
Which of the following tabs will you suggest to the coworker?
(Multiple Choice)
4.8/5
(41)
A technician is configuring the Windows computers on a network to print to a printer that is directly connected to the network via UTP cable.
What term best describes this method of printer connectivity?
(Multiple Choice)
4.8/5
(34)
Showing 1 - 20 of 25
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)