Microsoft Windows Basics Quiz

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Rayandlisaj
R
Rayandlisaj
Community Contributor
Quizzes Created: 5 | Total Attempts: 2,416
| Attempts: 479
SettingsSettings
Please wait...
  • 1/157 Questions

    Which command-line command displays the IP configuration of a computer’s interfaces?

    • Ping
    • Tracert
    • Ipconfig
    • Netstat
Please wait...
About This Quiz

Explore the essentials of Microsoft Windows through a focused quiz on installation and configuration. Assess skills in using tools like Diskpart, WDS, and understanding multi-boot setups with various Windows versions. Ideal for learners preparing for IT certifications.

Microsoft Windows Basics Quiz - Quiz

Quiz Preview

  • 2. 

    What is the minimum number of volumes that a computer running Windows XP should have if you want to support dual-booting with Windows 7?

    • 1

    • 2

    • 3

    • 4

    Correct Answer
    A. 2
    Explanation
    A. Incorrect: Two volumes are the minimum number required to support dual-booting between Windows XP and Windows 7.
    B. Correct: Two volumes are the minimum number required to support dual- booting between Windows XP and Windows 7. The Windows 7 installation routine creates an extra 200-MB system volume on one of these volumes when you install Windows 7, but two volumes is the minimum number required on a Windows XP computer prior to attempting to install Windows 7 for dual-boot confi guration.
    C. Incorrect: Two volumes are the minimum number required to support dual- booting between Windows XP and Windows 7.
    D. Incorrect: Two volumes are the minimum number required to support dual- booting between Windows XP and Windows 7.

    Rate this question:

  • 3. 

    You want to deploy a new computer for software compatibility testing. This computer needs to be able to boot into the Windows 7, Windows XP, and Windows Vista operating systems. In which order should you install the operating systems to meet this objective without having to edit boot entries using Bcdedit?

    • Windows 7, Windows XP, and then Windows Vista

    • Windows Vista, Windows 7, and then Windows XP

    • Windows XP, Windows 7, and then Windows Vista

    • Windows XP, Windows Vista, and then Windows 7

    Correct Answer
    A. Windows XP, Windows Vista, and then Windows 7
    Explanation
    A. Incorrect: You need to install the operating systems in the order that they were released by Microsoft. Later operating systems are designed to detect existing installations of earlier operating systems, but earlier operating systems cannot detect the installation of
    later operating systems.
    B. Incorrect: You need to install the operating systems in the order in which they were released. Later operating systems are designed to detect existing installations of earlier operating systems, but earlier operating systems cannot detect the installation of later operating systems.
    C. Incorrect: You need to install the operating systems in the order in which they were released. Later operating systems are designed to detect existing installations of earlier operating systems, but earlier operating systems cannot detect the installation of later operating systems.
    D. Correct: You need to install Windows XP fi rst, Windows Vista, and then Windows 7 because that is the order that Microsoft released them. This allows you to boot among
    the three operating systems.

    Rate this question:

  • 4. 

    Which of the following tools can you use to determine if the applications installed on your computer running Windows Vista are known to have problems with Windows 7?

    • Windows 7 Upgrade Advisor

    • Sysprep

    • USMT

    • Windows PE

    Correct Answer
    A. Windows 7 Upgrade Advisor
    Explanation
    A. Correct: The Windows 7 Upgrade Advisor can examine the confi guration of a computer running Windows Vista to determine if any of the applications installed on that computer are known to have compatibility problems with Windows 7.
    B. Incorrect: Sysprep is used to prepare a computer for imaging. It cannot report whether particular applications have compatibility problems with Windows 7.
    C. Incorrect: The USMT is used to migrate user profi le data from one computer to another. It cannot report whether particular applications have compatibility problems with
    Windows 7.
    D. Incorrect: Windows PE is a minimal operating system that is used for maintenance tasks. It cannot report whether particular applications have compatibility problems with
    Windows 7.

    Rate this question:

  • 5. 

    You want to use WDS to perform a network installation of Windows 7. Which of the following hardware devices must the computer have, assuming that you are not booting the computer from a WDS discover image?

    • A DVD-ROM drive

    • A PXE-compliant network adapter

    • A USB 2.0 slot

    • An HDMI port

    Correct Answer
    A. A PXE-compliant network adapter
    Explanation
    To perform a network installation of Windows 7 using WDS (Windows Deployment Services), the computer must have a PXE-compliant network adapter. PXE (Preboot Execution Environment) allows the computer to boot from the network and receive the necessary installation files from the WDS server. A DVD-ROM drive, USB 2.0 slot, or HDMI port are not required for a network installation using WDS.

    Rate this question:

  • 6. 

    A user has a home computer with a cable Internet connection and no other computers on his home network. Which of the following methods can this person use to upgrade from Windows 7 Home Premium to Windows 7 Ultimate?  

    • Sysprep

    • Windows PE

    • WDS

    • Windows Anytime Upgrade

    Correct Answer
    A. Windows Anytime Upgrade
    Explanation
    A. Incorrect: Sysprep cannot be used to upgrade between editions of Windows 7.
    B. Incorrect: You cannot use Windows PE to upgrade between editions of Windows 7.
    C. Incorrect: WDS requires a server with WDS installed. The question specifi es that there are no other computers on the home network.
    D. Correct: A user can utilize Windows Anytime Upgrade with a home Internet connection to upgrade from Windows 7 Home Premium to Windows 7 Ultimate.

    Rate this question:

  • 7. 

    You want to prohibit read, write, and execute access to all types of external storage devices. What computer policy setting do you enable?

    • All Removable Storage: Allow Direct Access In Remote Sessions

    • All Removable Storage Classes: Deny All Access

    • Removable Disks: Deny Read Access

    • Removable Disks: Deny Write Access

    Correct Answer
    A. All Removable Storage Classes: Deny All Access
    Explanation
    A. Incorrect: Enabling this policy permits remote users to access removable storage devices in remote sessions. It does not deny all access to all types of external storage devices.
    B. Correct: Enabling this policy denies all access to all types of external storage devices. It overrides any access rights granted by other policies.
    C. Incorrect: Enabling this policy denies read access to USB removable disks, portable media players, and cellular phones. It does not deny all access to all types of external
    storage devices.
    D. Incorrect: Enabling this policy denies write access to USB removable disks, portable media players, and cellular phones. It does not deny all access to all types of external
    storage devices.

    Rate this question:

  • 8. 

    Which utility can you use to prepare a USB storage device so that you can boot from it to install Windows 7 on a laptop computer that does not have a DVD-ROM drive?  

    • LoadState.exe

    • ScanState.exe

    • Diskpart

    • Bcdedit

    Correct Answer
    A. Diskpart
    Explanation
    A. Incorrect: LoadState.exe is part of the User State Migration Tool (USMT) utility and cannot be used to prepare a USB storage device as a Windows 7 installation source.
    B. Incorrect: ScanState.exe is part of USMT and cannot be used to prepare a USB storage device as a Windows 7 installation source.
    C. Correct: You can use the Diskpart utility to prepare a USB storage device so you can boot from it to install Windows 7.
    D. Incorrect: Bcdedit is used to modify boot confi guration, but it cannot be used to prepare a USB storage device so that it is possible to boot from it to install Windows 7.

    Rate this question:

  • 9. 

    Which XML file is used with ScanState to specify information about user profile data that should be migrated?

    • MigDocs.xml

    • MigUser.xml

    • MigApp.xm

    • Config.xml

    Correct Answer
    A. MigUser.xml
    Explanation
    A. Incorrect: MigDocs.xml contains rules about locating user documents.
    B. Correct: MigUser.xml contains rules about migrating user profiles and user data.
    C. Incorrect: MigApp.xml contains rules about the migration of application settings.
    D. Incorrect: Config.xml contains information about what features to exclude from a migration.

    Rate this question:

  • 10. 

    Which Windows Setup configuration pass applies settings to Windows 7 before Windows Welcome starts?

    • OobeSystem

    • AuditSystem

    • Specialize

    • Offl ineServicing

    Correct Answer
    A. OobeSystem
    Explanation
    A. Correct: The oobeSystem Windows Setup configuration pass applies settings to Windows 7 before Windows Welcome starts.
    B. Incorrect: The auditSystem Windows Setup confi guration pass processes unattended Setup settings while Windows 7 is running in system context before a user logs on to
    the computer in Audit mode. It does not apply settings to Windows 7 before Windows Welcome starts.
    C. Incorrect: The specialize Windows Setup confi guration pass creates and applies system-specific information such as network settings, international settings, and domain
    information. It does not apply settings to Windows 7 before Windows Welcome starts.
    D. Incorrect: The offl ineServicing Windows Setup configuration pass applies updates to a Windows image. It also applies packages, including software fixes, language packs, and other security updates. During this pass, you can add drivers to a Windows 7 image before that image is installed. It does not apply settings to Windows 7 before Windows Welcome starts.

    Rate this question:

  • 11. 

    You want to ensure that users of stand-alone clients running Windows 7 in your organization change their passwords every three weeks. Which of the following policies should you configure on each computer to accomplish this goal?

    • Enforce Password History

    • Minimum Password Length

    • Minimum Password Length

    • Maximum Password Age

    Correct Answer
    A. Maximum Password Age
    Explanation
    A. Incorrect: The Enforce Password History policy ensures that a user is unable to use a recently used password when changing his password. It does not ensure that a user
    must change his password after a certain amount of time.
    B. Incorrect: The Minimum Password Length policy ensures that a user’s password meets a minimum length requirement. It does not ensure that a user must change his password
    after a certain amount of time.
    C. Incorrect: The Minimum Password Age policy stops a user changing his password for a minimum amount of time after the most recent password change. It does not ensure
    that a user changes his password after a certain amount of time.
    D. Correct: The Maximum Password Age policy ensures that a user must change his password after a certain amount of time has expired. In this case, you would set the policy to 21 days.

    Rate this question:

  • 12. 

    To which of the following editions and versions of Windows 7 can you upgrade a computer running Windows 7 Home Premium (x86)? (Choose all that apply.)

    • Windows 7 Professional (x86)

    • Windows 7 Professional (x64)

    • Windows 7 Ultimate (x86)

    • Windows 7 Enterprise (x64)

    Correct Answer(s)
    A. Windows 7 Professional (x86)
    A. Windows 7 Ultimate (x86)
    Explanation
    A. Correct: You can upgrade Windows 7 Home Premium (x86) to Windows 7 Professional (x86).
    B. Incorrect: You cannot upgrade an x86 version of Windows 7 to an x64 version of Windows 7.
    C. Correct: You can upgrade from Windows 7 Home Premium (x86) to Windows 7 Ultimate (x86).
    D. Incorrect: You cannot upgrade an x86 version of Windows 7 to an x64 version of Windows 7.

    Rate this question:

  • 13. 

    You are planning to migrate all the computers in your organization to Windows 7 Professional. Your organization has several applications that are installed on computers running Windows XP Professional. You are unable to install these applications on computers running Windows 7 due to compatibility problems. You are unable to configure a custom compatibility mode to support these applications using the ACT. Which of the following solutions could you implement to deploy these mission-critical applications on the computers running Windows 7?

    • Install the Window XP Mode feature. Install the application under Windows XP.

    • Create a custom compatibility fix for the application using the ACT.

    • Create a shim for the application using the ACT.

    • Confi gure the application installer to run in Windows XP Professional SP2 compatibility mode.

    Correct Answer
    A. Install the Window XP Mode feature. Install the application under Windows XP.
    Explanation
    A. Correct: You should install the Windows XP Mode feature and install the application under Windows XP. Windows XP Mode runs a fully virtualized copy of Windows XP on a computer that has the Windows 7 Professional, Enterprise, or Ultimate operating system installed. Applications that work on Windows XP and that have compatibility problems that cannot be resolved using the ACT function in Windows XP Mode.
    B. Incorrect: You should not create a custom compatibility fix because the question already indicates that you have been unsuccessful in configuring a custom compatibility mode, which is a collection of such fixes.
    C. Incorrect: A shim is the previous name for a custom compatibility fix. The question text already indicates that you have been unsuccessful in configuring a custom compatibility mode, which is a collection of these fixes.
    D. Incorrect: You should not configure the application installer to run in Windows XP Professional SP2 mode because you have already found that you are unable to get

    Rate this question:

  • 14. 

    What type of AppLocker rule should you create to block all applications that are created by a specific software vendor?

    • Publisher rules

    • Path rules

    • Hash Rules

    Correct Answer
    A. Publisher rules
    Explanation
    A. Correct: Publisher rules allow you to block applications based on which software vendor wrote the application.
    B. Incorrect: Path rules do not allow you to block applications based on which software vendor wrote the application, as the question stipulates; they allow you to block an executable fi le based on its location.
    C. Incorrect: Hash rules do not allow you to block pplications based on which software vendor wrote the application, as the question stipulates; they allow you to block a specific executable file based on a hash value generated from that file.

    Rate this question:

  • 15. 

    You are examining a DNS forward lookup zone to investigate problems with name resolution. What type of resource record enables DNS to resolve a host name to an IPv6 address?

    • PTR

    • A

    • AAAA

    • Host

    Correct Answer
    A. AAAA
    Explanation
    A. Incorrect: A PTR resource record performs a reverse lookup and resolves an IPv4 or IPv6 address (depending on the reverse lookup zone specified) to a host name.
    B. Incorrect: An A (address) resource record resolves a host name to an IPv4 address.
    C. Correct: An AAAA (quad-A) resource record resolves a host name to an IPv6 address.
    D. Incorrect: A host resource record is another name for an A record. It resolves a host name to an IPv4 address.

    Rate this question:

  • 16. 

    You want to create a 20-GB native VHD called Systemvhd in a folder called Windows 7 on an external USB hard disk with the drive designation G:. Which command do you use?

    • Create vdisk file=g:\windows7\systemvhd maximum=20000

    • Create vdisk file=g:\windows7\systemvhd.vhd maximum=20000

    • Create vdisk file=g:\windows7\systemvhd.vhd maximum=20

    • Create vdisk file=g:\windows7\systemvhd maximum=20

    Correct Answer
    A. Create vdisk file=g:\windows7\systemvhd.vhd maximum=20000
    Explanation
    A. Incorrect: A VHD is created as a file with a .vhd extension. You need to specify the file name Systemvhd.vhd.
    B. Correct: This creates the VHD file as specified.
    790 Answers C. Incorrect: The size (or maximum size) of the VHD is specified in megabytes, not gigabytes. Therefore it needs to be 20000, not 20.
    D. Incorrect: A VHD is created as a file with a .vhd extension. You need to specify the file name Systemvhd.vhd. Also, the size (or maximum size) of the VHD is specified in
    megabytes, not gigabytes. Therefore it needs to be 20000, not 20.

    Rate this question:

  • 17. 

    Kim Akers has set the file Brisbane.doc (which is hosted on an office file server) to be available offline using her portable computer running Windows 7. Kim goes home for the weekend and works on Brisbane.doc. Same Abolrous comes into the office on the weekend and works on the copy of Brisbane.doc stored on the office file server. Which of the following tools can Kim use to resolve the conflict that occurs when she connects her computer to the office network?

    • Credential Manager

    • The Sync Center control panel

    • HomeGroup

    • Network And Sharing Center

    Correct Answer
    A. The Sync Center control panel
    Explanation
    A. Incorrect: Credential Manager is used to manage stored authentication credentials. You cannot use Credential Manager to resolve offl ine file sync conflicts.
    B. Correct: The Sync Center control panel can be used to resolve offline fi le sync conflicts.
    C. Incorrect: HomeGroup is used to manage HomeGroup settings. HomeGroup cannot be used to resolve offline file sync conflicts.
    D. Incorrect: Network And Sharing Center cannot be used to resolve offline file sync conflicts. Network And Sharing Center is used to manage network configuration.

    Rate this question:

  • 18. 

    Which of the following types of USMT migration store types minimizes hard disk space used when performing a wipe-and-load migration?

    • Uncompressed

    • Compressed

    • Hard-link

    Correct Answer
    A. Hard-link
    Explanation
    A. Incorrect: Uncompressed migration stores use the most hard disk space as it creates a copy of the data being migrated in a separate directory structure.
    B. Incorrect: Compressed migration stores create a compressed copy of the data being migrated in a separate directory structure.
    C. Correct: Hard-link migration stores create a set of hard links to all data that will be migrated in a separate location but do not actually duplicate that data on the volume.

    Rate this question:

  • 19. 

    You want to ensure that offline VHD files that contain installations of Windows 7 are kept up to date with service packs and software updates. Which tool should you use?

    • MDT 2010

    • Offline Virtual Machine Servicing Tool

    • BCDEdit

    • Configuration Manager 2007 R2

    Correct Answer
    A. Offline Virtual Machine Servicing Tool
    Explanation
    A. Incorrect: MDT 2010 can add updates, applications, and language packs to a WIM system image that can then be installed on client computers and VHDs. However, it does
    not update VHDs directly.
    B. Correct: You can use the Offline Virtual Machine Servicing Tool to keep offl ine VHD files that contain installations of Windows 7 up to date with service packs and software updates.
    C. Incorrect: You can use the BCDEdit command-line tool to add a boot entry for a VHD. The tool does not update VHDs.
    D. Incorrect: You can use the Offline Virtual Machine Servicing Tool with VMM 2007 and either WSUS 3.0, SCCM 2007, or Configuration Manager 2007 R2. However, Configuration Manager 2007 R2 does not update VHDs directly.

    Rate this question:

  • 20. 

    Which Diskpart command converts an MBR disk to a GPT disk?

    • Convert gpt

    • Convert mbr

    • Convert basic

    • Convert dynamic

    Correct Answer
    A. Convert gpt
    Explanation
    A. Correct: This Diskpart command converts the selected disk to a GPT disk.
    B. Incorrect: This Diskpart command converts the selected disk to an MBR disk.
    C. Incorrect: This Diskpart command converts a selected dynamic disk to a static disk.
    D. Incorrect: This Diskpart command converts a selected static disk to a dynamic disk.

    Rate this question:

  • 21. 

    Which of the following must you download from Microsoft’s Web site to obtain USMT 4.0?

    • Windows Anytime Upgrade

    • Windows Upgrade Advisor

    • WAIK

    • Microsoft Application Compatibility Toolkit

    Correct Answer
    A. WAIK
    Explanation
    A. Incorrect: Windows Anytime Upgrade is a tool used to upgrade from one edition of Windows 7 to another. It does not contain USMT 4.0
    B. Incorrect: Windows Upgrade Advisor is a tool that advises you whether hardware and software used with a computer running Windows Vista is compatible with Windows 7.
    C. Correct: The WAIK contains USMT 4.0.
    D. Incorrect: The Microsoft Application Compatibility Toolkit does not include USMT 4.0.

    Rate this question:

  • 22. 

    You administer a network in which all the client computers run Windows 7 Ultimate. You have created bootable VHDs on all your clients to provide failover protection. However, because the VHDs are normally offline, the images they hold do not receive all the latest security updates. You want to boot the clients from their VHDs automatically every Saturday at 11:30 P.M. just long enough for them to receive updates from your WSUS server. What tool do you use to do this?

    • Offline Virtual Machine Servicing Tool

    • SCVMM

    • Windows Deployment Services MMC snap-in

    • WDSUTIL

    Correct Answer
    A. Offline Virtual Machine Servicing Tool
    Explanation
    A. Correct: The Offline Virtual Machine Servicing Tool works with the SCVMM. Its main function is to create and implement a scheduled task that brings VHDs and virtual
    machines online for just long enough for them to obtain updates to their system images, typically from a WSUS server.
    B. Incorrect: The SCVMM is a prerequisite for installing and running the Offl ine Virtual Machine Servicing Tool. However, it is the latter tool that implements scheduled boots from VHDs that are normally offl ine.
    C. Incorrect: The Windows Deployment Services MMC snap-in is a GUI tool that is available when you install the WDS server role. It enables you to create, modify, and export disk images. It cannot implement scheduled boots from VHDs that are normally offl ine.
    D. Incorrect: WDSUTIL is a command-line tool that is available when you install the WDS server role. It enables you to create, modify, and export disk images and to pre-stage client
    computers. It cannot implement scheduled boots from VHDs that are normally offl ine.

    Rate this question:

  • 23. 

    Don Hall has set up a wireless network at home. He is pleased with the ease with which he set up her third-party WAP by clicking a single button in the Web interface. However, his next door neighbor tells him that she can access his network from her home computer. What should Don do?

    • Enable Windows Firewall

    • Change the security settings of his WAP

    • Change the channel his WAP uses

    • Implement ICS

    Correct Answer
    A. Change the security settings of his WAP
    Explanation
    A. Incorrect: Windows Firewall protects Don’s computer and is enabled by default. His neighbor is accessing his WAP, not his computer.
    B. Correct: Don found the WAP setup easy because he accepted all the defaults and did not set up any security. He needs to change his SSID from its default value. He should also configure encryption and set up a passphrase. He should change the access password. He should consider restricting access by MAC address.
    C. Incorrect: Changing the WAP channel can solve problems related to interference from mobile phones or microwave ovens (for example). It does not affect access to a network.
    D. Incorrect: ICS enables other computers to obtain their IPv4 configuration from the ICS computer. Unless Don has non-wireless computers connected through a wired interface
    to his wireless computer, he does not need to set up ICS. Additional wireless computers obtain their configurations directly from the WAP. This has no bearing on whether his
    neighbor can access his network.

    Rate this question:

  • 24. 

    Which of the following DISM options can you run against an online, running operating system?

    • /set-syslocale

    • /set-userlocale

    • /set-inputlocale

    • /get-intl

    Correct Answer
    A. /get-intl
    Explanation
    A. Incorrect: The /set-syslocale option sets the language for non-Unicode programs (also called the system locale) and the font settings. You can do this only in an offline-mounted image.
    B. Incorrect: The /set-userlocale option configures a per-user setting that determines the default sort order and the default settings for formatting dates, times, currency, and
    numbers. You can do this only in an offline-mounted image.
    C. Incorrect: The /set-inputlocale option sets the input locale and keyboard layout. You can do this only in an offline-mounted image.
    D. Correct: In an online working operating system, you can query international settings but not configure them.

    Rate this question:

  • 25. 

    An application used by the administrators in your organization is not configured to prompt for elevation when it is run. Which of the following compatibility options could you configure for the application to ensure that users with administrative privileges are always prompted when they execute the application?

    • Configure the application to run in Windows XP (Service Pack 3) compatibility mode.

    • Enable the Run In 256 Colors compatibility option.

    • Enable the Run This Program As An Administrator compatibility option.

    • Enable the Disable Desktop Composition compatibility option.

    Correct Answer
    A. Enable the Run This Program As An Administrator compatibility option.
    Explanation
    A. Incorrect: You should not configure the application to run in Windows XP (Service Pack 3) compatibility mode because the problem is that the application does not prompt
    for elevation. The program will still be unable to prompt for elevation when running in this compatibility mode.
    B. Incorrect: You should not configure the application to run in 256-color mode. This compatibility option should be used only when the application has display problems.
    C. Correct: You should enable the Run This Program As An Administrator compatibility option if the application is not confi gured to prompt for elevation when administrative
    800 Answers privileges are required. This will allow the program to run with administrative privileges once the user responds to a User Account Control prompt.
    D. Incorrect: You should not enable the Disable Desktop Composition compatibility option. You should enable this option when you need the Aero interface disabled when the
    application executes.

    Rate this question:

  • 26. 

    Your computer is configured to dual-boot between Windows Vista Professional and Windows 7 Enterprise. Currently, it boots into Windows Vista by default. You want to specify Windows 7 as the startup default operating system and configure how Windows 7 reacts in the event of a system failure. You boot the computer into Windows 7. What tool do you use to accomplish your goal?

    • The Services console

    • Performance Options

    • Task Manager

    • System Configuration

    Correct Answer
    A. System Configuration
    Explanation
    A. Incorrect: The Services console lists the services available on a computer, provides information about each service, and offers service management options. For example,
    the Services console tells you the service startup type and the logon details. It does not enable you to specify the startup operating system in a dual-boot configuration or to
    confi gure how Windows 7 reacts to a system failure.
    B. Incorrect: The Performance Options tool enables you to confi gure visual effects, to maximize performance for applications or background services, and to configure DEP
    settings. It does not enable you to specify the startup operating system in a dual-boot configuration or to configure how Windows 7 reacts to a system failure.
    C. Incorrect: Task Manager gives you a snapshot of resource usage and enables you to stop crashed applications, to stop and start services, and to set process priority and affi nity. It does not enable you to specify the startup operating system in a dual-boot configuration or to confi gure how Windows 7 reacts to a system failure.
    D. Correct: System Confi guration (Msconfig) enables you to specify the startup operating system in a dual-boot configuration and confi gure how Windows 7 reacts to a system failure.

    Rate this question:

  • 27. 

    You need to find out the amount of writeable space available on a Windows PE system volume when booted in RAMdisk mode. The PE image is mounted in the folder D:\PEMount. What command would you use?

    • Dism /image:d:\pemount /get-scratchspace

    • Dism /image: d:\pemount /get-targetpath

    • Dism /image: d:\pemount /get-profiling

    • Dism /image: d:\pemount /enable-profiling

    Correct Answer
    A. Dism /image:d:\pemount /get-scratchspace
    Explanation
    A. Correct: The amount of writeable space available on a Windows PE system volume when booted in RAMdisk mode is known as the Windows PE system volume scratch space. You
    can use the /get-scratchspace DISM option to obtain a value for this.
    B. Incorrect: This command returns the path to the root of the Windows PE image at boot time, known as the target path.
    C. Incorrect: This command determines whether the Windows PE profi ling tool is enabled or disabled.
    D. Incorrect: Profiling (fi le logging) is disabled by default. This command enables it. However, the command does not return the amount of writeable space available on
    a Windows PE system volume when booted in RAMdisk mode.

    Rate this question:

  • 28. 

    Which of the following compatibility modes would you configure for an application that works on computers running Microsoft Windows 2000 Professional but does not work on computers running Windows XP?  

    • Windows 98 / Windows Me

    • Windows NT 4.0 (Service Pack 5)

    • Windows XP (Service Pack 2)

    • Windows 2000

    Correct Answer
    A. Windows 2000
    Explanation
    A. Incorrect: Although the application may function in the Windows 98/Windows Me compatibility mode, you only have evidence that the application functions on the Windows 2000 operating system, so you should use this compatibility mode fi rst and try others only if the Windows 2000 mode is unsuccessful.
    B. Incorrect: Although the application may function in the Windows NT 4.0 (Service Pack 5) compatibility mode, you only have evidence that the application functions on the
    Windows 2000 operating system, so you should use this compatibility mode fi rst and try others only if the Windows 2000 mode is unsuccessful.
    C. Incorrect: You should not configure the application to run under Windows XP (Service Pack 2) compatibility mode because you have evidence that the application does not
    function on computers running Windows XP.
    D. Correct: You should configure the application to run under the Windows 2000 compatibility mode because you know that the application functions on computers with Windows 2000 installed.

    Rate this question:

  • 29. 

    Which of the following file types does the Windows 7 Program Compatibility troubleshooter application work with?

    • .cab files

    • .exe files

    • .msi files

    • .zip files

    Correct Answer
    A. .exe files
    Explanation
    A. Incorrect: You cannot use the compatibility troubleshooter to troubleshoot .cab files. You must extract the contents of the .cab file to find the executable file that contains the application installer.
    B. Correct: The Program Compatibility troubleshooter works only with executable files.
    C. Incorrect: You cannot use the compatibility troubleshooter to troubleshoot .msi installer files. The Program Compatibility troubleshooter only works with executable files that have the .exe extension.
    D. Incorrect: You cannot use the compatibility troubleshooter to troubleshoot .zip files. You
    need to extract the contents of the .zip file to find the executable file that contains the application installer.

    Rate this question:

  • 30. 

    Which of the following policy settings should you configure to ensure that users that are not members of the local Administrators group on a client running Windows 7 are prompted for credentials when they perform an action that requires the elevation of privileges?

    • User Account Control: Behavior Of The Elevation Prompt For Standard Users: Automatically Deny Elevation Requests

    • User Account Control: Behavior Of The Elevation Prompt For Standard Users: Prompt For Credentials

    • User Account Control: Behavior Of The Elevation Prompt For Administrators In Admin Approval Mode: Prompt For Credentials

    • User Account Control: Behavior Of The Elevation Prompt For Administrators In Admin Approval Mode: Prompt For Consent

    Correct Answer
    A. User Account Control: Behavior Of The Elevation Prompt For Standard Users: Prompt For Credentials
    Explanation
    A. Incorrect: You should not configure the User Account Control: Behavior Of The Elevation Prompt For Standard Users: Automatically Deny Elevation Requests policy. When this policy is configured, standard users receive no prompt when they perform a task that requires elevation, and the elevation attempt automatically fails.
    B. Correct: You should configure the User Account Control: Behavior Of The Elevation Prompt For Standard Users: Prompt For Credentials policy. This ensures that a standard
    user is prompted for credentials when an attempt is made at elevation.
    C. Incorrect: You should not configure the User Account Control: Behavior Of The Elevation Prompt For Administrators In Admin Approval Mode: Prompt For Credentials because this policy relates to approval for administrator accounts rather than standard user accounts.
    D. Incorrect: You should not configure the User Account Control: Behavior Of The Elevation Prompt For Administrators In Admin Approval Mode: Prompt For Consent because this policy relates to approval for administrator accounts rather than standard user accounts. This policy also provides a prompt for consent rather than a prompt for credentials.

    Rate this question:

  • 31. 

    You are troubleshooting instability problems on a computer running Windows 7 Ultimate and suspect that they might be related to hardware faults in RAM. You access the System Recovery options. Which option is most likely to help you diagnose the problem?

    • Windows Memory Diagnostic

    • Startup Repair

    • System Restore

    • System Image Recovery

    Correct Answer
    A. Windows Memory Diagnostic
    Explanation
    A. Correct: Windows Memory Diagnostic analyses the computer memory (RAM) for hardware problems.
    B. Incorrect: Startup Repair automatically fixes problems that prevent Windows from starting. It is unlikely to help you diagnose hardware problems associated with RAM.
    C. Incorrect: System Restore restores system files and settings to the last restore point. It is used when a system change such as installing an application or a driver causes problems. It cannot help resolve hardware problems.
    D. Incorrect: System Image Recovery restores your system confi guration from a System Image backup you made previously. You would typically choose this option if your hard disk failed or needed to be wiped. System Image Recovery cannot help resolve hardware problems.

    Rate this question:

  • 32. 

    You want to ensure that only certain designated wireless laptops can connect to your network. What do you need to enable?

    • MAC address control

    • IPv4 address control

    • WEP

    • WPA

    Correct Answer
    A. MAC address control
    Explanation
    A. Correct: The MAC address is unique to an interface and does not change. MAC ensures that only computers whose wireless interfaces have one of the listed MAC addresses can
    access a wireless network. Be aware that if a new computer needs to access the network, or if you replace the wireless adapter in a computer, you need to register the new MAC
    address in the WAP.
    B. Incorrect: Most networks are confi gured by using DHCP so IPv4 addresses can change. Even in networks where IPv4 addresses are statically confi gured, it is unlikely that the WAP supports IPv4 address control. 806 Answers
    C. Incorrect: WEP is an encryption method that ensures that third parties cannot read messages if they intercept them. It does not determine which computers can access a network.
    D. Incorrect: Like WEP, WPA is an encryption method and does not determine which computers can access a network.

    Rate this question:

  • 33. 

    You have used Runas with the /savecred option to save the credentials of an administrator account on a client running Windows 7. You have finished performing the tasks that you needed to and now want to remove those credentials from the computer. Which of the following tools could you use to do this?

    • Runas

    • Credential Manager

    • The Certificates console

    • UAC settings

    Correct Answer
    A. Credential Manager
    Explanation
    A. Incorrect: You cannot remove saved Runas credentials using the Runas command. You must use the Credential Manager.
    B. Correct: You can use the Credential Manager to remove credentials saved using the Runas command.
    C. Incorrect: You cannot use the Certificates console to remove credentials saved using the Runas command. The Certifi cates console is used to manage certificates.
    D. Incorrect: You cannot use UAC settings to remove credentials saved using the Runas command. The User Account Control settings dialog box is used to change which
    situations trigger UAC prompts.

    Rate this question:

  • 34. 

    What command-line utility can you use in Windows 7 to edit boot options?

    • Bootmgr.exe

    • Winload.exe

    • Bcdedit.exe

    • Winresume.exe

    Correct Answer
    A. Bcdedit.exe
    Explanation
    A. Incorrect: Bootmgr.exe is the Windows Boot Manager. It runs the boot process, but you cannot use it to edit boot options.
    B. Incorrect: Winload.exe is the Windows operating system loader. It loads the selected operating system, but you cannot use it to edit boot options.
    C. Correct: You use Bcdedit.exe to edit boot options. You can also use the utility to manage BCD remotely and manage BCD when the system boots from media other than the
    media on which the BCD store resides.
    D. Incorrect: Windows 7 uses the Winresume.exe utility to resume from hibernation. You cannot use this utility to edit boot options.

    Rate this question:

  • 35. 

    A user has forgotten the password to the stand-alone desktop computer running Windows 7 that she uses at your organization. The user does not have a reset disk. You have an account on this computer that is a member of the local Administrators group. Which of the following steps can you take to resolve this user’s authentication problem?

    • Unlock her account

    • Reset her password

    • Create a password reset disk for her account

    • Create a password reset disk for your account

    Correct Answer
    A. Reset her password
    Explanation
    A. Incorrect: The question does not state that the account has been locked; it says that the user has forgotten her password. Unlocking an account works only if a user knows her password. It does not reset her password.
    B. Correct: You need to reset her password. The user loses access to encrypted files if she has not backed up her EFS key. The user also loses access to any saved credentials stored in Windows Vault.
    C. Incorrect: You can create a password reset disk for an account only if you know the account password. You cannot create a password reset disk for another user account or
    for one where the user has forgotten her password.
    D. Incorrect: You should not create a password reset disk for your own account because this does not help resolve the user’s problem.

    Rate this question:

  • 36. 

    Your client running Windows 7 is connected to a hotel network, has an address on the 192.168.10.0 /24 network, and is located behind a Network Address Translation (NAT) device. The network blocks all outbound traffic except that on ports 80 and 443. You want the address of the DirectAccess IP-HTTPS server to be set correctly. Which of the following commands could you use?

    • Ipconfig

    • Netsh interface 6to4 show relay

    • Netsh interface ipv6 show teredo

    • Netsh interface httpstunnel show interfaces

    Correct Answer
    A. Netsh interface httpstunnel show interfaces
    Explanation
    A. Incorrect: The ipconfig command displays IP address confi guration. It does not display information about DirectAccess IP-HTTPS server confi guration.
    B. Incorrect: The netsh interface 6to4 show relay command displays 6to4 information. 6to4 can be used when a computer is assigned a public address, rather than a private one, and
    is not behind a NAT device.
    C. Incorrect: The netsh interface ipv6 show teredo command displays Teredo information. Teredo cannot be used if a hotel network firewall blocks all traffi c except that on port 80 and 443.
    D. Correct: The netsh interface httpstunnel show interfaces command shows information related to the DirectAccess IP-HTTPS configuration.

    Rate this question:

  • 37. 

    You have upgraded the hardware on a computer so that it can run an application that requires a large amount of processor resource. You use the Windows Experience Index tool to generate a new base score. The subscores for each feature are as follows: ·       Processor 5.1 ·       Physical Memory (RAM) 3.3 ·       Graphics 3.6 ·       Gaming Graphics 2.3 ·       Primary Hard Disk 5.3 Based on these figures, what is the Windows Experience Index base score?

    • 2.3

    • 3.9

    • 5.1

    • 4.4

    Correct Answer
    A. 2.3
    Explanation
    A. Correct: The lowest subscore determines the base score, even though this computer is not primarily used for three-dimensional graphics and gaming.
    B. Incorrect: 3.9 is the average of the subscores. However, the lowest subscore determines the base score, not the average.
    C. Incorrect: 5.1 is a significant score because the computer is used for processor-intensive operations. However, the question asks for the base score, and the lowest subscore determines the base score.
    D. Incorrect: 5.3 is the highest subscore. The lowest subscore determines the base score, not the highest.

    Rate this question:

  • 38. 

    You are creating a WIM system image of a Windows 7 installation on a reference computer. What operating system should you boot to, and what Windows AIK tool should you use?

    • Boot to Windows 7 and use Windows SIM.

    • Boot to Windows 7 and use DISM.

    • Boot to Windows PE and use ImageX.

    • Boot to Windows PE and use Windows SIM.

    • Boot to Windows PE and use DISM.

    Correct Answer
    A. Boot to Windows PE and use ImageX.
    Explanation
    A. Incorrect: To capture a Windows 7 WIM image, you need to boot to Windows PE 3.0 (Windows PE). Also, the Windows SIM tool opens Windows images, creates answer fi les, and manages distribution shares and configuration sets. It does not create WIM images.
    B. Incorrect: To capture a Windows 7 WIM image, you need to boot to Windows PE 3.0 (Windows PE). Also, the DISM tool applies updates, drivers, and language packs to a Windows image. It does not create WIM images.
    C. Correct: To capture a Windows 7 WIM image, you boot to Windows PE 3.0 (Windows PE) and use the ImageX tool.
    D. Incorrect: The Windows SIM tool opens Windows images, creates answer files, and manages distribution shares and confi guration sets. It does not create WIM images.
    E. Incorrect: The DISM tool applies updates, drivers, and language packs to a Windows image. It does not create WIM images.

    Rate this question:

  • 39. 

    You have used the ImageX tool to install a WIM system image on a VHD and added a boot entry for that VHD using the BCDEdit tool. The bootable VHD has been designated with the drive letter W:. The variable is replaced by the GUID of the VHD.

    • Bcdedit /set detecthal on

    • Bcdedit /delete /cleanup

    • Bcdedit /v

    • Bcdedit /copy {current} /d “My New VHD”

    Correct Answer
    A. Bcdedit /v
    Explanation
    A. Incorrect: This command forces Windows 7 to automatically detect the HAL when creating the boot entry.
    B. Incorrect: This deletes a VHD entry from the Boot menu.
    C. Correct: This tests if the boot entry has been created successfully.
    D. Incorrect: This returns the GUID of the specified VHD.

    Rate this question:

  • 40. 

    What does the command netsh advfirewall firewall add rule name=”CustomRule” profile=domain protocol=TCP dir=in localport=80 action=allow do when executed from an elevated command prompt?

    • Creates an inbound rule that applies only in the Domain profile that blocks traffic on port 80

    • Creates an outbound rule that applies only in the Domain profile that blocks traffic on port 80

    • Creates an inbound rule that applies only in the Domain profile that llows traffic on port 80

    • Creates an outbound rule that applies only in the Domain profile that allows traffic on port 80

    Correct Answer
    A. Creates an inbound rule that applies only in the Domain profile that llows traffic on port 80
    Explanation
    A. Incorrect: The rule in the question allows traffic rather than blocks traffic.
    B. Incorrect: The rule in the question applies to inbound traffic rather than outbound traffic.
    C. Correct: This rule, called CustomRule, applies in the domain profile and allows inbound TCP traffic on port 80. You can create WFAS rules using Netsh in the advfirewall context.
    D. Incorrect: The rule in the question is an inbound rule rather than an outbound rule.

    Rate this question:

  • 41. 

    You want to have a record of which user accounts are used to access documents in a sensitive folder on a computer running Windows 7 Enterprise. Which of the following should you do to accomplish this goal?

    • Configure EFS

    • Configure auditing

    • Configure NTFS permissions

    • Configure BranchCache

    Correct Answer
    A. Configure auditing
    Explanation
    A. Incorrect: EFS can be used to limit which users can access a document by encrypting it only to certain user accounts, but it cannot be used to track which user accounts have been used to access files.
    B. Correct: Auditing allows you to track which user accounts are used to access files and folders. You can confi gure auditing to track successful and failed attempts to use any of the special permissions.
    C. Incorrect: You cannot use NTFS permissions to record which user accounts are used to access documents; you can only use NTFS permissions to restrict which user accounts are used to access documents.
    D. Incorrect: BranchCache is used to speed up access to files across the wide area network (WAN); it cannot be used to record which user accounts access documents in a sensitive folder.

    Rate this question:

  • 42. 

    Which policy setting should you configure to ensure that the Windows 7 built-in Administrator account must respond to a UAC prompt before elevating privileges?

    • UAC: Behavior Of The Elevation Prompt For Administrators In Admin Approval Mode: Elevate Without Prompting

    • UAC: Admin Approval Mode For The Built-In Administrator Account: Enabled

    • UAC: Admin Approval Mode For The Built-In Administrator Account: Disabled

    • UAC: Behavior Of The Elevation Prompt For Administrators In Admin Approval Mode: Prompt For Consent For Non-Windows Binaries

    Correct Answer
    A. UAC: Admin Approval Mode For The Built-In Administrator Account: Enabled
    Explanation
    A. Incorrect: You should not configure the policy UAC: Behavior Of The Elevation Prompt For Administrators In Admin Approval Mode: Elevate Without Prompting. This policy
    relates to all administrator accounts except the built-in administrator account, which must be managed with other policies.
    B. Correct: You should configure the UAC: Admin Approval Mode For The Built-In Administrator Account policy to Enabled. This ensures that the built-in administrator
    account must respond to a UAC prompt when performing a task that requires elevated privileges.
    C. Incorrect: You should not configure the UAC: Admin Approval Mode For The Built-In Administrator account policy to Disabled. This policy setting disables the UAC prompt for
    the built-in administrator account.
    D. Incorrect: You should not configure the policy UAC: Behavior Of The Elevation Prompt For Administrators In Admin Approval Mode: Prompt For Consent For Non-Windows
    Binaries. This policy relates to all administrator accounts except the built-in administrator account, which must be managed with other policies.

    Rate this question:

  • 43. 

    Which of the following versions and editions of Windows 7 can you install to take advantage of the hardware resources on a computer that has 16 GB of RAM? (Choose all that apply.)

    • Windows 7 Ultimate x86

    • Windows 7 Professional x64

    • Windows 7 Enterprise x86

    • Windows 7 Home Premium x64

    Correct Answer(s)
    A. Windows 7 Professional x64
    A. Windows 7 Home Premium x64
    Explanation
    A. Incorrect: An x86 version of Windows 7 can utilize a maximum of 4 GB of RAM.
    B. Correct: An x64 versions of Windows 7 can utilize more than 4 GB of RAM.
    C. Incorrect: An x86 version of Windows 7 can utilize a maximum of 4 GB of RAM.
    D. Correct: An x64 versions of Windows 7 can utilize more than 4 GB of RAM.

    Rate this question:

  • 44. 

    You are configuring static IPv4 addresses for two computers, Perth and Brisbane, on an isolated private wired subnet. You configure Perth with the IPv4 address 172.16.10. 140 and the subnet mask 255.255.255.0. You configure Brisbane with the IPv4 address 172.16.10. 210 and the subnet mask 255.255.255.0. You enter ping 172.16.10.140 on Brisbane, but the command times out. Similarly, entering ping 172.16.0.210 on Perth fails to locate the Brisbane computer’s IPv4 address. What is the likely reason for this lack of connectivity?

    • DNS service is not available on the subnet.

    • The computers should have different subnet masks.

    • You have not specified a default gateway.

    • You need to permit ICMPv4 traffic through the fi rewalls of both computers.

    Correct Answer
    A. You need to permit ICMPv4 traffic through the fi rewalls of both computers.
    Explanation
    A. Incorrect: DNS resolves computer names to IP addresses. You are pinging the computers by their IPv4 addresses, not their computer names, and a DNS service is not required for
    the commands to succeed.
    B. Incorrect: All computers on the same subnet must have the same subnet mask.
    C. Incorrect: The subnet is isolated and no gateway is required to send traffic to other networks. You do not need to defi ne a gateway to implement connectivity between two computers within the same subnet.
    D. Correct: By default Windows Firewall blocks the Ping command. You need to enable ICMPv4 traffi c at both firewalls. At an elevated command prompt on both computers,
    enter netsh advfi rewall firewall add rule name=”ICMPv4”.

    Rate this question:

  • 45. 

    You are responsible for managing student laptops that have Windows 7 installed at a small community college. You want to prevent students from uploading files using FTP to FTP sites on the Internet but allow them to send outbound e-mail using the Simple Mail Transfer Protocol (SMTP). Which of the following rules would you configure to accomplish that goal?

    • Inbound rules

    • Outbound rules

    • Isolation rules

    • Authentication exemption rules

    Correct Answer
    A. Outbound rules
    Explanation
    A. Incorrect: Inbound rules are used to block traffic from the network to the computer. You want to block a specific type of network traffic from the computer to the network, which necessitates the use of outbound rules.
    B. Correct: Outbound rules allow you to block and allow traffic that originates on the computer from traveling out to the network. You should configure an outbound rule to
    block students from using FTP to upload fi les to sites on the Internet and an outbound rule to allow students to use SMTP to send e-mail.
    C. Incorrect: Isolation rules are used to limit the hosts that a computer can communicate with to those that meet a specific set of authentication criteria. They cannot be used to block an outbound specifi c protocol.
    D. Incorrect: Authentication exemption rules are used in conjunction with Isolation rule to allow connections to be made without requiring that authentication occur.
    Authentication exemption rules apply to inbound traffic rather than outbound.

    Rate this question:

  • 46. 

    You require fault tolerance for your operating system so that your computer running Windows 7 Home Premium can still boot up if a disk fails. You have two disks and unallocated space on your second disk. What do you do?

    • Create a VHD and install an image of your computer on the VHD. Use BCDEdit to make the VHD bootable.

    • Create a RAID-0 volume.

    • Create a RAID-1 volume.

    • Create a RAID-5 volume.

    Correct Answer
    A. Create a RAID-1 volume.
    Explanation
    A. Incorrect: This is a valid strategy for Windows 7 Enterprise or Ultimate edition, but you cannot make a VHD bootable on a computer running Windows 7 Home Premium.
    B. Incorrect: RAID-0 (disk striping) offers no fault tolerance and you cannot store operating system files on a RAID-0 volume.
    C. Correct: You can use a RAID-1 volume to mirror the disk that holds your operating system and provide fault tolerance.
    D. Incorrect: RAID-0 (disk striping) offers fault tolerance and failover protection. However, you cannot store operating system files on a RAID-5 volume.

    Rate this question:

  • 47. 

    You are examining transition technologies on a network and want to identify the IPv4-to-IPv6 compatibility addresses being used. Which of the following is a Teredo address?

    • 2001::0a0a:1efe:e866:efff:f5ff:ebfe

    • 2002:c058:6301::

    • Fe80::5efe:0a00:028f

    • Fec0:0:0:0:fffe::1

    Correct Answer
    A. 2001::0a0a:1efe:e866:efff:f5ff:ebfe
    Explanation
    A. Correct: This is a Teredo compatibility address. Teredo addresses start with 2001.
    B. Incorrect: This is a 6to4 compatibility address. 6to4 addresses start with 2002.
    C. Incorrect: This is a link-local ISATAP address. Look for 5efe followed by the hexadecimal representation of an IPv4 address, in this case 10.0.2.143.
    D. Incorrect: This is a site-local Ipv6 address. It is not an IPv4-to-IPv6 compatibility address.

    Rate this question:

  • 48. 

    You are logged on to a computer running Windows 7 Enterprise that you share with Jeff Phillips. You want to store some files on an NTFS-formatted USB flash drive that both you and Jeff can access. You want to encrypt these files but do not want to use BitLocker To Go. You are able to encrypt the files, but when you try to add Jeff, you do not see his certificate listed. Which of the following should you do to allow you to use EFS to encrypt files to both your and Jeff’s accounts?

    • Get Jeff to change his password.

    • Get Jeff to encrypt a file on the computer.

    • Give Jeff write permission to the files.

    • Let Jeff take ownership of the files.

    Correct Answer
    A. Get Jeff to encrypt a file on the computer.
    Explanation
    A. Incorrect: Jeff needs an EFS certificate for you to be able to encrypt a file that he can access. Changing a password does not generate an EFS certifi cate.
    B. Correct: If Jeff encrypts a file on the computer, it generates an EFS certificate. You can then use this EFS certifi cate to encrypt the file to his account.
    C. Incorrect: Jeff does not need write access to the file for you to be able to use EFS to encrypt the file to his account. Jeff needs an encryption certificate, which can be
    generated by having Jeff encrypt a file on the computer.
    D. Incorrect: Letting Jeff take ownership of the files does not allow you to use EFS to encrypt the file to his account. Jeff needs an encryption certifi cate, which can be
    generated by having Jeff encrypt a file on the computer.

    Rate this question:

  • 49. 

    You are spending several weeks working as a contractor at Contoso. You attempt to connect using Internet Explorer to the timesheet Web application hosted at https://timesheet.contoso.internal. You receive a message that the Web site certificate has not been issued by a trusted source. Which of the following steps can you take to resolve this problem?

    • Configure the security level of the Intranet Zone.

    • Turn off the Pop-up Blocker.

    • Start InPrivate Browsing and revisit the Web site.

    • Visit the Contoso.internal CA using Internet Explorer and install the CA certificate.

    Correct Answer
    A. Visit the Contoso.internal CA using Internet Explorer and install the CA certificate.
    Explanation
    A. Incorrect: You should not configure the security level of the Intranet Zone. The security level manages how Internet Explorer deals with downloads and cookies. Configuring this setting does not enable Internet Explorer to trust the CA that issued the certifi cate to timesheet.contoso.internal.
    B. Incorrect: Turning off the Pop-Up Blocker allows pop-ups, but does not allow Internet Explorer to trust this Web site certifi cate.
    C. Incorrect: Browsing to the Web site using InPrivate Mode does not allow Internet Explorer to trust the certifi cate issued to the Web site. Using InPrivate Mode stops
    Internet Explorer from recording browser navigation formation.
    D. Correct: Because the Web site’s certificate has been issued by an internal CA and you do not work for the organization directly, Internet Explorer has not been confi gured totrust the internal CA. To trust the internal CA, navigate to its Web site and download and install the CA’s certificate.

    Rate this question:

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jul 06, 2010
    Quiz Created by
    Rayandlisaj
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.