Exam 6: Windows 10 Security Features
Exam 1: Introduction to Windows 1028 Questions
Exam 2: Using the System Utilities32 Questions
Exam 3: User Management28 Questions
Exam 4: Networking28 Questions
Exam 5: Managing Disks and File Systems38 Questions
Exam 6: Windows 10 Security Features31 Questions
Exam 7: User Productivity Tools30 Questions
Exam 8: Windows 10 Application Support37 Questions
Exam 9: Performance Tuning and System Recovery31 Questions
Exam 10: Enterprise Computing31 Questions
Exam 11: Managing Enterprise Clients33 Questions
Exam 12: Automating Windows 10 Deployment35 Questions
Select questions type
Jimmy downloaded a game from the Internet and installed it on his Windows 10 system. A couple of days after the installation, his computer's performance degraded drastically. Assuming that the game had slowed it down, he uninstalled the game and used software to get rid of residual files. Despite this, his computer's performance did not improve. Inspecting the Resource Monitor revealed that the Memory and CPU were running close to 100% capacity. He suspects that the computer is infected with malware.
Which of the following scans would you recommend to Jimmy?
Free
(Multiple Choice)
4.9/5
(29)
Correct Answer:
B
Guillaume has a Windows 10 personal laptop. He wants to ensure that the Microsoft Store apps on his computer are kept updated.
What can Guillaume do to ensure this?
Free
(Multiple Choice)
4.7/5
(35)
Correct Answer:
B
Which of the following do newer Windows applications use to describe the structure of an application?
Free
(Multiple Choice)
4.8/5
(25)
Correct Answer:
A
Oluseyi receives a link to a free download of a premium application in his email. He clicks the link and the application downloads. Before installing it, he wants to verify the authenticity of the download. He verifies the MD5 value of the downloaded application against the MD5 value listed for the application on the original website. The MD5 values do not match.
Which of the following is true in this scenario?
(Multiple Choice)
4.7/5
(37)
Shawn signs into a Windows 10 system with administrative user privileges. The system has UAC enabled. Shawn accidently launches a malicious application that is infected with malware.
If the malware is able to access and corrupt the system files, which of the following must be true?
(Multiple Choice)
4.9/5
(38)
Yixuan, a system administrator, configures Windows Update for Business in her organization to control updates for Windows 10 systems. The settings are configured such that a test system first receives any new Windows update and other Windows systems receive the update after two weeks. Being a small organization, Yixuan wants to reduce bandwidth consumption during the organization-wide update.
Which of the following options should Yixuan use in this scenario?
(Multiple Choice)
4.8/5
(34)
Dorothy, a system administrator, uses BitLocker To Go to protect USB drives that are used in the organization. She chooses the Use a password to unlock the drive option when picking between unlocking options. Warren wants to print some files, so he copies these files from his work laptop onto a USB drive. Next, he plugs in this drive on a computer that is connected to a printer.
If Warren is able to print the files on the USB drive successfully without entering any password, which of the following must be true of the computer connected to the printer?
(Multiple Choice)
4.8/5
(26)
An application installed on a Windows 10 system requires access to restricted areas on the system to place user data. However, this application is not UAC compliant.
To enable this application to run properly, which of the following UAC options should be enabled?
(Multiple Choice)
4.9/5
(35)
Which of the following is a method for protecting data on removable storage, such as USB drives?
(Multiple Choice)
4.8/5
(39)
Oshane is configuring security settings on his computer. Recently, his friend's computer was attacked by malware that encrypted data on all the hard disks and demanded a cryptocurrency ransom to decrypt this data.
Which of the following options in Windows 10 is the best option to help Oshane avoid a similar situation?
(Multiple Choice)
4.8/5
(27)
Joanna, a graphic designer at ChromaStage, has an application installed on her UAC-enabled Windows 10 system that was designed for an older version of Windows. Some of the application's features require administrative privileges. When she tries running the application, the application fails to run and generates an error instead.
If Joanna's account already has administrative privileges, what can she do to resolve this issue?
(Multiple Choice)
4.9/5
(34)
Vishal is considering switching to BitLocker Drive Encryption because of the inefficiencies of EFS. When he tries to use this encryption feature on Windows 10 Professional, he is unsuccessful.
Which of the following is the most likely reason?
(Multiple Choice)
4.8/5
(38)
Macy works as a system administrator at an accounting firm. Sensitive data is stored on all Windows 10 client systems. She wants to audit all access to files on these systems, so she decides to edit the Global Object Access Auditing category.
In order to complete this task, which of the following conditions should be met?
(Multiple Choice)
4.8/5
(40)
TropicMaze is a manufacturer of processed foods. The packaging at the plant is automated by machines that are controlled by a Windows 10 computer.
Which of the following indicates that this computer receives updates using Long Term Servicing Branch?
(Multiple Choice)
4.9/5
(36)
Veronica copies an unencrypted file from one partition on her hard drive to an encrypted folder on another partition. From there, she moves the file to a folder on a flash drive.
If the file on the flash drive is encrypted, which of the following must be true?
(Multiple Choice)
4.7/5
(43)
Hannah, a system administrator, wants to use Windows Update for Business in her organization to control updates for Windows 10 systems. While she is able to use Group Policy to apply these settings to most computers, she is unable to apply these settings to some computers.
Which of the following is the most likely reason that Hannah is not able to apply the Windows Update for Business settings to these computers?
(Multiple Choice)
4.8/5
(35)
Kesha spends time analyzing datasets that are larger than 1 TB in job as a data scientist. This data is stored in databases on her Windows 10 system. While running an analysis on these databases, she does not want her code to be slowed down because of real-time scanning by Windows Defender.
Which of the following settings should Kesha modify to solve this problem?
(Multiple Choice)
4.8/5
(36)
Raphael, a system administrator, is setting up the password policy for local user accounts. He allows users to reuse a password after they have used 4 different passwords. He also modifies the policy to force users to change their old passwords every 60 days. After some time, he notices that users are modifying their passwords 4 times in a short time span and continuing to use their old passwords. This defeats the purpose of setting up the password restrictions.
Which of the following settings should Raphael modify to control this behavior?
(Multiple Choice)
4.9/5
(47)
Hang owns a Windows 10 laptop that does not have any issues. She is configuring Windows Update settings on this laptop.
Which of the following settings should Hang leave turned on?
(Multiple Choice)
4.9/5
(23)
Which policy allows you to configure an account to be temporarily disabled after a number of incorrect sign-in attempts?
(Multiple Choice)
4.9/5
(38)
Showing 1 - 20 of 31
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)