Strayer CIS 329 Week 6 Quiz 2 Updated
To purchase this material click below link
http://www.homeworkrank.com/cis-329-strayer/cis-329-week-6-quiz-2-updated
For more classes visit
www.homeworkrank.com
CIS 329 Week 6 Quiz 2 Updated
• Question 1
When considering an upgrade to Windows 8, several critical questions must be considered. Which of the following is not one of these questions to consider?
• Question 2
Which edition of Windows 8 includes Office 2013 installed already but does not offer a choice of 32-bit or 64-bit versions?
• Question 3
What are the buttons called in the Windows 8 edge UI that provide access to common operating system functions such as Search and Settings?
• Question 4
Which of the following should be used to locate hardware inadequacies in the computer that might prevent a successful upgrade to Windows 8?
• Question 5
What name is given to a Windows PE installation on a computer with Windows 8 already installed?
• Question 6
During what phase of the Windows 8 startup process is the Local Security Authority loaded?
• Question 7
Computers running Windows PE will automatically shut down and reboot after how long?
• Question 8
What is the name of the USMT application that is used to save user profile data for a migration?
• Question 9
In the scenario where you are installing Windows 8 on a new computer and plan to dispose of an old computer running Windows XP, which Windows Easy Transfer method would be most appropriate to use?
• Question 10
Your organization currently uses roaming profiles for all users. All users use Windows 7 computers. Windows 8 will be introduced shortly in your organization. Given the information presented, what issue should you be aware of?
• Question 11
To communicate with the operating system running on the computer, each device also requires a software element known as what?
• Question 12
What is the value of a protected checksum dependent upon?
• Question 13
You have opened the Properties dialog box for an installed printer on your computer system. On what tab will you find information that is specific to this piece of installed hardware on your computer system?
• Question 14
You have PhotoShop Elements installed on your Windows 8 computer. You want PhotoShop Elements to automatically be launched every time you plug in a memory card that contains photos. What setting do you need modify?
• Question 15
Windows Installer uses what file format for single package application installations?
• Question 16
What is the name of the Remote Desktop Services feature that enables clients to run Remote Desktop server applications within an individual window?
• Question 17
What PowerShell cmdlet would you need to use to install a critical Line of Business (LOB) Windows App that has been created within your organization?
• Question 18
When you create your first new rule in AppLocker, what will happen if you do not have the default rules in place?
• Question 19
By default, Windows 8 is configured to check for updates for installed apps _________ and then _________ the needed updates.
• Question 20
Which of the following is not one of the methods that the SmartScreen Filter uses to identify potential phishing web sites?
• Question 21
When you click the down arrow next to the Print button on the IE 10 toolbar, you can choose from all of the following options except
which one?
• Question 22
What new standard defines a protocol that allows clients and servers to exchange data immediately as it becomes available without the overhead created by HTTP and TCP?
• Question 23
What PowerShell cmdlet can you use to enable Client Hyper-V?
• Question 24
Snapshot data files are stored using what file format?
• Question 25
What Hyper-V feature helps you use physical memory more efficiently for your VMs?
• Question 1
What is the largest danger that high-capacity removable storage devices pose to an enterprise network?
• Question 2
0 out of 2 points
When none of your configured Software Restriction Policies are matched, what happens?
• Question 3
When using the Allow/Prevent installation of devices that match any of these device IDs setting in the Device Installation Restrictions folder of a GPO, what other setting must you ensure you also configure to provide the intended results?
• Question 4
In order to use the Custom Classes: Deny read/write access setting of the Removable Storage Access policy settings, what will you need to know about each device to which you wish to allow read or write access?
• Question 5
Software restriction policies can work in three ways, based on the settings you choose for each of the rules. Which of the following is not one of the settings to choose from?
• Question 6
The process of applying a header and footer to a data packet is known as what?
• Question 7
0 out of 2 points
What protocol is responsible for the end-to-end transmission of a packet, to its final destination on a network?
• Question 8
In the OSI model, which layer is at the bottom and represents the hardware that forms the network?
• Question 9
0 out of 2 points
Most cabled networks today use what type of cabling?
• Question 10
What protocol do most devices currently use at the Network layer?
• Question 11
0 out of 2 points
What type of attack is occurring when attackers gain access to otherwise restricted network resources, using a wireless network?
• Question 12
A 2×2 MIMO device has how many total transceivers?
• Question 13
Why should you not deploy a wireless network using WEP for security?
• Question 14
802.11n wireless networking equipment uses two, three, or more different frequencies for transmission and the subsequent receiving of traffic. The sending system splits its data into multiple signals for transmission, and the receiving device reassembles the signals into a single data stream. What is the name of this process?
• Question 15
What command can you issue from the command line to view all configured wireless networks on your Windows 8 computer?
• Question 16
0 out of 2 points
When do data protection technologies such as the Windows 8 Encrypting File System (EFS) and BitLocker protect data?
• Question 17
What term is given to software that includes viruses, Trojan horses, worms, spyware, and adware?
• Question 18
When using the Windows Firewall with Advanced Security console, you will see three distinct network locations that impact the behavior of the Windows Firewall. Which of the following is not one of these network locations used by the Windows Firewall?
• Question 19
Which of the following is not an item that can be used when building Windows Firewall rules?
• Question 20
Which of the following items is not found in the Security section of the Windows 8 Action Center?
• Question 21
Remote Assistance offers several methods to send the invitation for assistance. Which of the following is not one of those options?
• Question 22
Remote Assistance requires that access to what port be available on the requesting client?
• Question 23
What is the name of the feature that enables an administrator, trainer, or technical specialist at one location to connect to a distant user’s computer, chat with the user, and either view all the user’s activities or take complete control of the system?
• Question 24
Why do some snap-ins, such as the Active Directory Domain Services consoles, not provide a means to redirect the console to another computer?
• Question 25
What makes connecting to a remote computer by redirecting an existing console an inefficient method over time?