Configuring Windows 8 Flashcards
(119 cards)
Microsoft has redesigned Windows Backup in Windows 8 and has renamed it. What is it called now?
File History
You have a computer (named X) on your network which is connected to the same network and domain to which your Windows 8 based PC (named B) is a part of. Computer X is a file store for various other computers on the network. You want to configure computer X as an authenticated exception for computer B. Which of the following type of rule will you create in Windows Firewall with Advanced Security to create the exception?
Connection Security Rules
John has just changed all the settings of your Windows 8 PC to match his needs. You want to help make sure that in case something goes wrong in the coming week, John should be able to revert back to the setting that he has just configured. Which of the following will help you achieve this?
Create a System Restore Point
You want to allow one of your shared folders to be available offline on other computers which can view the share. How do you configure this?
Right click the folder, select properties, go to sharing tab and click on the Advanced button. Then enable the share and click on the caching button.
Which of the following does the ‘Sync Center’ feature in Windows 8 depend upon?
Offline Files
You want to boot your Windows 8 PC into safe mode. Which of the following would help you reboot your PC into safe mode?
Go to PC Settings -> General -> Advanced Startup -> Restart now
Which of the following settings cannot be synced with another Windows 8 computer using the Sync options available in the OS?
Applications
Windows 8 requires a graphics card which:
Supports DirectX 9 and with WDDM driver
Which of the following in Group Policy Editor will allow you to disable the feature which allows you to automatically backup different versions of files?
Group Policy Editor -> Computer Configuration -> Administrative Templates -> Windows Components -> File History -> “Turn off File History”
You have a file located in D: drive which is encrypted. You want to allow another user (named Tony) on the same computer to open the file. So you right click file and open file properties. On properties window you click on advanced and then click “Details” button next to “Encrypt Contents to Secure Data’ option. You then click on ‘Add’ button to add another user who can open the file. However the user whom you want to allow the access to is not listed there. What can be the reason?
The user Tony has never encrypted any file
You want to enable location aware printing on your Windows 8 PC. Select the path which will allow you to enable location aware printing.
Control Panel -> Hardware and Sound -> Devices and Printers
Your client recently performed a driver upgrade on your Windows 8 PC and his audio stopped working. Where will you go first to roll back the driver upgrade?
Device Manager
Where would you go if you wanted to allow encryption of only used space on removable drive using Bitlocker?
Local Computer Policy -> Computer Configuration -> Administrative Templates -> Windows Components -> Bitlocker Drive encryption -> Removable Data Drives
Which of the following would be the first step in the process of removing a Metro App from Windows 8?
Right click the App tile on start screen
Your manager says that Remote Desktop sessions pose a threat to privacy of the computer being controlled remotely. Hence it is desirable that a remote desktop connection be automatically disconnected after 10 minutes of inactivity. Which of the tools would you use when the task is assigned to you for a Windows 8 PC?
Group Policy Editor
You want to create a new restore point and exclude the registry changes since last restore point to be excluded during the restore point creation. Which of the following tools will help you?
Local Security Policy Editor Local Group Policy Editor Registry Editor Control Panel =>None of the above
A user named ‘john’ wants to change his password on Windows 8 Pro computer remotely. He has access to the telnet prompt in the name of remote access. The user ‘john’ also has administrative rights on the system. Which of the following commands will get the job done? We assume that the remote system is online and user ‘john’ has already logged in to the remote computer. We also assume that he wants to change his password to ‘mynewpasswrd’
net user john mynewpasswrd
Which of the following is NOT one of the recommended minimum hardware requirements of Windows 8?
16 GB HDD Space for 64-bit system
You do not want the computer to be discovered by other computers when on a private network. Which of the following places will help you achieve this?
Control Panel -> Network and Internet -> Network and Sharing Center -> Advanced sharing settings
Which of the following tools will allow you to configure startup settings?
msconfig.exe
You are responsible for maintaining a network of 78 computers on a network. 77 of the computers are running Windows 8 Pro and the remaining 1 is running Windows server 2012 which also acts as an update server for the intranet to save internet bandwidth. You are asked to configure all Windows 8 PCs to download updates from the intranet server and upload statistics to the same. Where in the Local Group Policy editor will you go?
GPE -> Local Computer Policy -> Computer Configuration -> Administrative Templates -> Windows Components -> Windows Update
You are receiving complaints that a client is not able to view a webpage properly in Internet Explorer. You suggest the person to switch on the compatibility view. The client however says that the problem still persists and the wanted site layout is not well. What do you think would be the problem?
The website is not compatible with Internet Explorer
Which of the following algorithms can be one of the Integrity algorithms for Windows 8 IPSec Policy filter rule?
MD5
You have a situation where you are asked to deny the execution of a set of programs for a particular user of the system which were all installed inside C:\CustomPrograms\ folder in their own individual sub-folders. Which of the following will you use to achieve the goal?
both secpol.msc and gpedit.msc