Microsoft client operating systems chapter's 4-7 Flashcards

1
Q

What is the control panel used for

A

You can use the control panel to change settings for windows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the parts of the windows 10 main screen

A

Icons, Taskbar and desktop background

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does Mmc stand for and what is it used for

A

Microsoft management console is a component of Microsoft windows that provides system administrators and advanced users an interface for configuring and monitoring the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are some of the specific settings for the power saver mode

A

Battery saver,change display settings for example set for shorter duration for active display, reduce your displays brightness, change power settings for example set for a shorter duration when your pc sleeps, disconnect from a wifi network when your pc sleeps, put a lid on it.
Change sync setting s for example syne your email less often and syne only the email ,calendars,and contacts you want.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Difference between sleep mode and hibernate

A

Sleep mode is a power saving state that is similar to pausing a dvd movie. All the actions on the computer are stopped, any open documents and applications are put in memory while the computer goes into a low power state. Hibernate mode is very similar but instead of saving your open documents and applications to ram ,it saves them to your drive. This allows your computer to turn off entirely,which means once your computer is in Hibernate mode it uses zero power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the registry used for

A

The registry helps windows manage and operate your computer, ensuring access to critical resources and helping important programs configure settings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are all the security zones in internet explorer

A

Internet, local intranet, trusted sites or restricted sites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How do virtual switches allow VMs communicated with each other

A

Private network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is hypervisor

A

Hyper-V is a hypervisor that let’s you run several, isolated guest operating systems on a hardware platform

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which hyper v software package can help remedy compatibility issues

A

Guest integration services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How is ram configured on vm

A

Each virtual machine consumes memory based on its configured size, plus overhead memory for virtualizeation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How to capture a vm image

A

On the page for the VMs on the upper menu select capture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a differing disk used for

A

A differing vhd is used to create a copy of an existing disk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Know at least two methods to prevent software piracy

A

The product key must be successfully activated and the computer must have a product key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The windows activation process

A

Verifies that your copy of windows is genuine and has not been used on more computers
microsoft software terms allows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a multiple activation key used for

A

MAK activates systems on a one time basis, using microsoft’s hosted activation services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is adk used for

A

To provide a complete solution for evaluating overall computer performance and automating the deployment of the windows operating system to new pcs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is kms used for

A

A centralized repository that’s used to organize, store and share organizational knowledge with employees and customers

19
Q

Which windows versions can be activated from ad based activation

A

Windows 11,windows 10 and windows server 2022

20
Q

What vbs comand is used to change the product key

A

Slmgr

21
Q

Where is the ad database stored and run from

A

Is stored in the ntds and is ran form windows server

22
Q

What are the definitions for domains, forests and organizational units

A

Domains = a domain is a group of connected windows computers that share user account information and a security policy ,forests =the forest is a secure boundary that limits access to users ,computers, groups and other objects, organizational units = is a construct used to represent an organization whose resources are logically separate from those resources of other, similar organizations

23
Q

How are tokens used when uac is configured

A

Each application that requires the administrator access token must prompt the end user of constant

24
Q

What are the default settings for uac in windows 10

A

Criticdical prompt

25
Q

Which tools are contained in adk

A

Windows configuration designer, user state migration kit ,volume activation management tool,windows performance kit,windows assessment tool kit,windows user experience virtualizean and application virtualizean

26
Q

What does icd do

A

Streamlines the customizing and provisioning of a windows image

27
Q

what are the differences between ipv4 and ipv6

A

ipv4 uses a 32 bits address space ,ipv6 uses a 128 bits address space ,ipv4 must support DHCP or be configured manually ,IPv6 does not require DHCP or manual configuration ,it supports stateless auto configuration

28
Q

how to convert decimal to binary

A

one of the methods to convert decimal to binary is by dividing the given decimal by 2

29
Q

what are the IPv4 classes including the total of the number of networks and host for each class

A

class A: networks use a default subnet mask of 255.0.0.0 and have 0-127 as their first octet. the address 10.52.36.11 is a class A address =16,777,214.
class B =16,384 networks and 65,000 hosts
class C =2 million networks ,254 hosts

30
Q

what is the difference between a primary- and second-level domain

A

primary DNS servers contain all relevant resource records and handle DNS queries for a domain. By contrast ,secondary DNS servers contain zone file copies that are read only meaning they cannot be modified

31
Q

what do the fallowing commands do tracert, ping, and nslookup

A

tracert =determines the route to a destination by sending internet control massage protocol {ICMP} echo packets to the destination.
ping=the ping command is a commend prompt command used to test the ability of the source computer to reach a specified destination computer.
nslookup=nslookup is an abbreviation of name server lookup and allows you to query your DNS service

32
Q

how to identify a valid IPv6 address

A

an ipv6 normal address must have eight segments

33
Q

what is a global unicast

A

A global unicast address is similar to an ipv4 public address and unique across the internet a packet is delivered from single interface to another single interface.

34
Q

Know the different types of networks (home, work, domain, public, etc.) and for which is network discovery enabled by default.

A

homegroup =a group of PCs on a home network that can share files and printers
workgroup=is microsoft”s term for a peer-to peer local area network. computers running microsoft operating systems in the same work group may share files,printers or internet connection. domain=windows network technology enables you to create network domains . a domain is a group of connected windows computers that share user account information and a security policy. public = network profiles in windows 10 allows you to quickly change security and file-sharing settings

35
Q

Know the max data rates for 802.11g and 11n.

A

802.11g=54 MBPS and 802.11n =450 MBPS^3

36
Q

Know the difference between ad hoc and infrastructure mode

A

in ad hoc mode, each node transmits data directly to other nodes without access point.
in infrastructure mode ,all communication needs to go through the access point witch connects wireless devices to a wired network

37
Q

Understand the concept of inbound and outbound rules in the Windows Firewall

A

an outbound rule is where the client pc or laptop initiates a network connection with some other resource or system. an inbound rule is where some server or device initiates a network connection with this pc or laptop . for any connection ,be it inbound or outbound there is a source port and a destination port

38
Q

Know the max throughput for eSATA. Hint: Know the answer in Mbps.

A

up to 600 MB/s 6Gbps

39
Q

Know the max number of devices that can be connected to a single USB port.

A

255

40
Q

Know the tasks that become available after completing the setup of a storage space

A

repartitioning drives

41
Q

Know the difference between a 3-way and a 2-way mirror

A

a two way mirror can tolerate one physical disk failure ,while a 3 way mirror can tolerate up to two disk failures

42
Q

What does parity do to protect against drive failures?

A

by keeping multiple copies of your data with parity information

43
Q

Why are high-capacity removable disks and drives dangerous to enterprise networks

A

because malicious software can be easily be installed on USB flash drives and other storage drives

44
Q

Know what “hot pluggable” means

A

the device is added or removed without shutting down the operating system