Part 2 Flashcards Preview

W10 Certification flashcards > Part 2 > Flashcards

Flashcards in Part 2 Deck (187):
1

Types of virtual hard disks
Dynamically expanding

This disk starts with a small VHD file and expands it on demand once an installation takes place. It can grow to the maximum size you defined during creation. You can use this type of disk to clone a local hard drive during creation.

2

Types of virtual hard disks
Fixed size

The size of the VHD file is fixed to the size specified when the disk is created. This option is faster than a dynamically expanding disk. However, a fixed-size disk uses up the maximum defined space immediately. This type is ideal for cloning a local hard drive.

3

Types of virtual hard disks
Differencing

This type of disk is associated in a parent-child relationship with another disk. The differencing disk
is the child, and the associated virtual disk is the parent. Differencing disks include only the differences to the parent disk. By using type, you can save a lot of disk space in similar virtual machines. This option is suitable if you have multiple virtual machines with the same operating systems.

4

Types of virtual hard disks
Physical (or passthrough disk)

The virtual machine receives direct pass-through access to the physical disk for exclusive use. This type provides the highest performance of all disk types and thus should be used for production servers where performance is the top priority. The drive is not available for other guest systems.

5

Edit Disk overview
Compact

Reduces the size of a dynamically expanding or differencing disk by removing blank space from deleted files.

6

Edit Disk overview
Convert

Converts a dynamically expanding disk to a fixed disk or vice versa.

7

Edit Disk overview
Expand

Increases the storage capacity of a dynamically expanding disk or a fixed virtual hard disk.

8

Edit Disk overview.
Merge

Merges the changes from a differencing disk into either the parent disk or another disk (applies to differencing disks only!).

9

Edit Disk overview
Reconnect

If a differencing disk does not find its referring parent disk anymore, this option can reconnect the parent to the disk.

10

File-system capabilities - FAT32
Supporting operating
systems

All Windows operating systems above Windows 95

11

File-system capabilities - NTFS
Supporting operating
systems

Windows NT, Windows 2000, Windows XP, Windows Server 2003, Windows Vista, Windows 7, Windows 8, Windows 10, Windows Server 2008/2008 R2, and Windows Server 2012/2012 R2

12

File-system capabilities - FAT32
Long filename support

YES

13

File-system capabilities - NTFS
Long filename support

YES

14

File-system capabilities - FAT32
Efficient use of disk space

YES

15

File-system capabilities - NTFS
Efficient use of disk space

YES

16

File-system capabilities - FAT32
Compression support

NO

17

File-system capabilities - NTFS
Compression support

YES

18

File-system capabilities - FAT32
Encryption support

NO

19

File-system capabilities - NTFS
Encryption support

YES

20

File-system capabilities - FAT32
Support for local security

NO

21

File-system capabilities - NTFS
Support for local security

YES

22

File-system capabilities - FAT32
Support for network security

YES

23

File-system capabilities - NTFS
Support for network security

YES

24

File-system capabilities - FAT32
Maximum volume size

32 GB

25

File-system capabilities - NTFS
Maximum volume size

16 TB with 4 KB clusters or 256 TB with 64 KB clusters

26

MMC modes
Author mode

Allows use of all the MMC functions.

27

MMC modes
User mode—full access

Gives users full access to window-management commands, but they cannot add or remove snap-ins or change console properties.

28

MMC modes
User mode—limited access, multiple window

Allows users to create new windows but not close any existing windows. Users can access only the areas of the console tree that were visible when the console was last saved.

29

MMC modes
User mode—limited access, single window

Allows users to access only the areas of the console tree that were visible when the console was last saved, and they cannot create new windows.

30

Compact commands
/C

Compresses the specified file or folder

31

Compact commands
/U

Uncompresses the specified file or folder

32

Compact commands
/S:dir

Used to specify which folder should be compressed or uncompressed

33

Compact commands
/A

Displays any files that have been hidden or system file attributes

34

Compact commands
/I

Indicates that errors should be ignored

35

Compact commands
/F

Forces a file to be compressed

36

Compact commands
/Q

Used with reporting, to report only critical information

37

Compact commands
/?

Displays help

38

Cipher command parameters
/E

Specifies that files or folders should be encrypted. Any files that are subsequently added to the folder will be encrypted.

39

Cipher command parameters
/D

Specifies that files or folders should be decrypted. Any files that are subsequently added to the folder will not be encrypted.

40

Cipher command parameters
/S:dir

Specifies that subfolders of the target folder should also be encrypted or decrypted based on the option specified.

41

Cipher command parameters
/I

Causes any errors that occur to be ignored. By default, the Cipher utility stops whenever an error occurs.

42

Cipher command parameters
/H

By default, files with hidden or system attributes are omitted from display. This option specifies that hidden and system files should be displayed.

43

Cipher command parameters
/K

Creates a new certificate file and certificate key.

44

Cipher command parameters
/R

Used to generate a recovery agent key and certificate for use with EFS.

45

Cipher command parameters
/X

Used to back up the EFS certificate and key into the specified filename.

46

Shared folder options
Share This Folder

Makes the folder available through local access and network access

47

Shared folder options
Share Name

A descriptive name by which users will access the folder

48

Shared folder options
Comments

Additional descriptive information about the share (optional)

49

Shared folder options
Limit The Number Of Simultaneous Users To

The maximum number of connections to the share at any one time (no more than 10 users can simultaneously access a share on a Windows 10 computer)

50

Shared folder options
Permissions

How users will access the folder over the network

51

Shared folder options
Caching

How folders are cached when the folder is offline

52

Powercfg.exe switches
-change

Changes a setting in the current power scheme.

53

Powercfg.exe switches
-changename

Changes the name of a power scheme. Also gives you the ability to change the description.

54

Powercfg.exe switches
-delete

Deletes the power scheme of the GUID specified.

55

Powercfg.exe switches
-deletesetting

Deletes a power setting.

56

Powercfg.exe switches
-energy

Looks for common energy-efficiency and battery-life issues and displays these issues in an HTML format. This switch is used to identify
problems with the power scheme.

57

Powercfg.exe switches
-list

Shows all the power schemes in the current user’s environment.

58

Powercfg.exe switches
-query

Shows the content of a power scheme.

59

Powercfg.exe switches
-qh

Displays the content (including hidden content) of the power scheme.

60

Powercfg.exe switches
-waketimers

Enumerates the wake timers. If this is enabled, when the wake timer expires, the system will wake from hibernation or sleep state.

61

Windows To Go Host requirements
Boot Process

Capable of USB boot

62

Windows To Go Host requirements
Firmware

USB boot enabled (PCs certified for use with Windows 7 or later can be configured to boot directly from USB; check with the hardware manufacturer if you are unsure of the ability of your PC to boot from USB)

63

Windows To Go Host requirements
Processor architecture

Must support the image on the Windows To Go drive

64

Windows To Go Host requirements
External USB Hubs

Not supported; connect the Windows To Go drive directly to the host machine

65

Windows To Go Host requirements
Processor

1 Ghz or faster

66

Windows To Go Host requirements
RAM

2 GB or greater

67

Windows To Go Host requirements
Graphics

DirectX 9 graphics device with WDDM 1.2 or greater driver

68

Windows To Go Host requirements
USB port

USB 2.0 port or greater

69

Registry keys -
Configuration information used by Windows Explorer to properly associate file types with applications.

HKEY_CLASSES_ROOT

70

Registry keys -
Configuration information for the user who is currently logged
onto the computer. This key is a subkey of the HKEY_USERS key.

HKEY_CURRENT_USER

71

Registry keys -
Computer hardware configuration information. This computer configuration is used regardless of the user who is logged in.

HKEY_LOCAL_MACHINE

72

Registry keys -
Configuration information for all users of the computer.

HKEY_USERS

73

Registry keys -
Configuration of the hardware profile that is used during system startup.

HKEY_CURRENT_CONFIG

74

MSRA command-line switches -

Displays the help options.

/?

75

MSRA command-line switches -

Starts Remote Assistance at the Invite screen.

/novice

76

MSRA command-line switches -

Starts Remote Assistance at the Help Someone screen.

/expert

77

MSRA command-line switches -

Starts Remote Assistance at the Expert Initiated screen or with the options, by automatically initiating with the novice user (used with Group Policy configured in an enterprise environment).

/offerRA ip | computer

78

MSRA command-line switches -

Creates an email invitation to be sent to an expert
user to request assistance using the novice’s default email program; a random password will be generated and needs to be conveyed to the expert, or alternatively a password can be specified with the password option and conveyed to the expert.

/email password

79

MSRA command-line switches -

Creates a file invitation to be given to an expert user to request assistance; a random password will be generated, or optionally a password can be specified with the password option and conveyed to the expert.

/saveasfile path password

80

MSRA command-line switches -

Used to open the invitation file sent to the expert ;can be local or on a shared network drive; the expert will enter the password given to the user when the session was initiated.

/openfile path

81

MSRA command-line switches -
Starts a novice user’s Remote Assistance session using Easy Connect; presents the novice with the password to convey to the expert user.

/geteasyhelp

82

MSRA command-line switches -

Starts an expert user’s Remote Assistance session using Easy Connect; presents the expert user with the screen to enter the password from the novice user.

/offereasyhelp

83

MSRA command-line switches -

Starts an expert user’s Remote Assistance session using Easy Connect; presents the expert user with the screen to enter the password from the novice user.

/offereasyhelp

84

MSRA command-line switches -

Reestablishes a Remote Assistance session from a novice user’s machine to the address from the previous session. The address is in the RAContactHistory. xml file as a 20-byte hexadecimal string with an .RAContact extension.

/getcontacthelp address

85

MSRA command-line switches -
Reestablishes a Remote Assistance session from an expert user’s machine to the address from the previous session. The address is in the RAContactHistory. xml file as a 20-byte hexadecimal string with an .RAContact extension.

/offercontacthelp address

86

UE-V components -
The UE-V agent gets installed on every Windows operating system that you want to synchronize settings with. The UE-V agent also observes all of the applications and settings for the Windows operating
system.

UE-V agent

87

UE-V components -

UE-V agents take all of the settings and applications on a system and turn those into an application package. These application packages are created locally, and then they are copied to a shared network location.

Settings packages

88

UE-V components -

Administrators must create a network share that will house all of the setting packages. The UE-V agent will verify that the network share is configured properly, and then the UE-V agent will create a hidden system folder for the user’s settings.

Settings storage share

89

UE-V components -

XML templates are used to synchronize the application and settings files. UE-V includes a few templates by default, but you have the ability to create your own.

Settings location
templates

90

UE-V components -

The Windows apps list is used to determine which Windows applications will get synchronized. UE-V uses the Windows apps list to know which apps and files get copied to the settings package.

Windows apps list

91

RemoteApp PowerShell commands

Set-AzureRemoteAppCollection -CollectionName -CustomRdpProperty “drivestoredirect: s:*’nusbdevicestoredirect:s:*”

This command sets the custom RDP properties.

92

RemoteApp PowerShell commands

Get-AzureRemoteAppCollection -CollectionName

This command shows you a list of what custom
RDP properties are configured.

93

RemoteApp PowerShell commands

Set-AzureRemoteAppCollection
-CollectionName
-CustomRdpProperty
“drivestoredirect:s:*”

This command shows you how to set up harddrive redirection.

94

RemoteApp PowerShell commands

Set-AzureRemoteAppCollection -CollectionName -CustomRdpProperty “drivestoredirect: s:*’nusbdevicestoredirect:s:*”

This command shows you how to set up USB and
hard-drive redirection.

95

RemoteApp PowerShell commands

Install-Module AzureRM
Install-AzureRM

These commands allow you to install the Azure Resource Manager modules.

96

RemoteApp PowerShell commands

Install-Module Azure

This command installs the Azure Service Management module.

97

RemoteApp PowerShell commands

Import-AzureRM

This command imports AzureRM modules.

98

RemoteApp PowerShell commands

Import-Module Azure

This command imports the Azure Service Management module.

99

RemoteApp PowerShell commands

Set-Mailbox

This command allows you to manipulate an Office 365 mailbox.

100

App-V components
Administrators can manage the App-V infrastructure from the Management Server. App-V Management Server allows you to set up virtual applications to the App-V Desktop Client and the Remote Desktop Services Client.

App-V Management Server

101

App-V components

This server hosts streaming virtual applications and also allows
App-V–specific employees to gain access to virtual applications.

App-V Publishing Server

102

App-V components
This accesses the virtual applications along with client application publication. Desktop client also manages virtual environments and stores employee-specific application settings.

App-V Desktop Client

103

App-V components

This allows Remote Desktop Session Host servers to work in conjunction with the App-V Desktop Client for shared desktop sessions.
This is very useful for tablets connecting to corporate applications.
If the tablet can’t run the application, the tablet user can connect to the Remote Desktop services to access the application.

App-V Remote Desktop Services (RDS) Client

104

App-V components
This tool allows administrators to convert normal applications into virtual applications through the use of a wizard.

App-V Sequencer

105

App-V components

The disconnected operation mode allows App-V Desktop Clients to run applications even when the client cannot connect to the App-V Management Server. This allows laptops to continue to access App-V applications even when not connected to the network or the Internet.

Disconnected Operation Mode

106

Configurable user-account options in Control Panel-

Allows you to change a user’s password.

Change Your Password

107

Configurable user-account options in Control Panel-

Allows you to rename the account.


Change Your Account Name

108

Configurable user-account options in Control Panel-

Allows you to change your account type between the standard user and administrator account type.

Change Your Account Type

109

Configurable user-account options in Control Panel-

Allows you to configure other accounts on the
Windows 10 machine.

Manage Another Account

110

Configurable user-account options in Control Panel-

Allows you to set the level of notification displayed through pop-up messages when changes are made to your computer. These notifications can prevent potentially hazardous programs from being loaded onto the operating system.

Change User Account Control Settings

111

Configurable user-account options in Control Panel-

Allows you to set up credentials so you can easily connect to websites that require usernames and passwords or computers that require certificates.

Manage Your Credentials

112

Configurable user-account options in Control Panel-

Allows you to manage your file-encryption certificates.

Manage Your File Encryption
Certificates

113

Configurable user-account options in Control Panel-

Takes you directly to the User’s Profile dialog box in
Control Panel ➢ System ➢ Advanced ➢ System Settings.

Configure Advanced User Profile
Properties

114

Configurable user-account options in Control Panel-

Allows you to access the Environment Variables dialog
box directly.

Change My Environment Variables

115

Group Policy and LGPO setting options
Available for LGPO?

Software installation

NO

116

Group Policy and LGPO setting options
Available for LGPO?
Remote Installation Services

YES

117

Group Policy and LGPO setting options
Available for LGPO?

Scripts

YES

118

Group Policy and LGPO setting options
Available for LGPO?

Printers

YES

119

Group Policy and LGPO setting options
Available for LGPO?

Security settings

YES

120

Group Policy and LGPO setting options
Available for LGPO?

Policy-based QOS

YES

121

Group Policy and LGPO setting options
Available for LGPO?

Administrative templates

YES

122

Group Policy and LGPO setting options
Available for LGPO?

Folder redirection

NO

123

Group Policy and LGPO setting options
Available for LGPO?

Internet Explorer configuration

YES

124

gpresult switches
Forces gpresult to override the filename specified in the /X or /H command

/F

125

gpresult switches

Saves the report in an HTML format

/H

126

gpresult switches

Specifies the password for a given user context

/P

127

gpresult switches

Displays RSoP summary data

/R

128

gpresult switches

Specifies the remote system to connect to

/S

129

gpresult switches

Specifies the user context under which the command should be executed

/U

130

gpresult switches

Specifies that verbose information should be displayed

/V

131

gpresult switches

Saves the report in XML format

/X

132

gpresult switches

Specifies that the super-verbose information should be displayed

/Z

133

gpresult switches

Shows all the gpresult command switches

/?

134

gpresult switches

Specifies whether the user or the computer settings need to be displayed

/scope

135

gpresult switches

Specifies the username for which the RSoP data is to be displayed

/User

136

Audit-policy options

Tracks when a user logs on or logs off either their local
machine or the domain (if domain auditing is enabled).

Audit Account Logon Events

137

Audit-policy options

Tracks user and group account creation, deletion, and
management actions, such as password changes.

Audit Account Management

138

Audit-policy options

Tracks directory service accesses.

Audit Directory Service Access

139

Audit-policy options

Audits events related to logon, such as running a logon script, accessing a roaming profile, and accessing a server.

Audit Logon Events

140

Audit-policy options

Enables auditing of access to files, folders, and printers.

Audit Object Access

141

Audit-policy options

Tracks any changes to the audit policies, trust policies, or user rights assignment policies.

Audit Policy Change

142

Audit-policy options

Tracks users exercising a user right.

Audit Privilege Use

143

Audit-policy options

Tracks events such as activating a program, accessing an object, and exiting a process.

Audit Process Tracking

144

Audit-policy options

Tracks system events such as shutting down or restarting the computer as well as events that relate to the security log in Event Viewer.

Audit System Events

145

User Rights Assignment policy options

Used to back up and restore Credential Manager.

Access Credential Manager As A
Trusted Caller

146

User Rights Assignment policy options

Allows a user to access the computer from the
network.

Access This Computer From The Network

147

User Rights Assignment policy options

Allows low-level authentication services to authenticate as any user.

Act As Part Of The Operating System

148

User Rights Assignment policy options

Allows a user to create a computer account on the domain.

Add Workstations To Domain

149

User Rights Assignment policy options

Allows you to configure how much memory can be used by a specific process.

Adjust Memory Quotas For A Process

150

User Rights Assignment policy options

Allows a user to log on at the physical computer.

Allow Log On Locally

151

User Rights Assignment policy options

Gives a user permission to log on through Remote Desktop Services.

Allow Log On Through Remote Desktop Services

152

User Rights Assignment policy options

Allows a user to back up all files and directories regardless of how the file and directory permissions have been set.

Back Up Files And Directories

153

User Rights Assignment policy options

Allows a user to pass through and traverse the directory structure, even if that user does not have permissions to list the contents of the directory.

Bypass Traverse Checking

154

User Rights Assignment policy options

Allows a user to change the internal time and date on the computer.

Change The System Time

155

User Rights Assignment policy options

Allows a user to change the time zone.

Change The Time Zone

156

User Rights Assignment policy options

Allows a user to create or change the size of a page file.

Create A Pagefile

157

User Rights Assignment policy options

Allows a process to create a token if the process uses an internal API to create the token.

Create A Token Object

158

User Rights Assignment policy options

Allows a user to create global objects when connected using Terminal Server.

Create Global Objects

159

User Rights Assignment policy options

Allows a process to create directory objects
through Object Manager.

Create Permanent Shared Objects

160

User Rights Assignment policy options

Allows a user to create a symbolic link.

Create Symbolic Links

161

User Rights Assignment policy options

Allows a user to attach a debugging program to any process.

Debug Programs

162

User Rights Assignment policy options

Allows you to deny specific users or groups access to this computer from the network. Overrides the Access This Computer From The Network policy for accounts present in both policies.

Deny Access To This Computer From The Network

163

User Rights Assignment policy options

Allows you to prevent specific users or groups from logging on as a batch file. Overrides the Log On As A Batch Job policy for accounts present in both policies.


Deny Log On As A Batch Job

164

User Rights Assignment policy options

Allows you to prevent specific users or groups from logging on as a service. Overrides the Log On As A Service policy for accounts present in both policies.

Deny Log On As A Service

165

User Rights Assignment policy options

Allows you to deny specific users or groups access to the computer locally. Overrides the Log On Locally policy for accounts present in both policies.

Deny Log On Locally

166

User Rights Assignment policy options

Specifies that a user is not able to log on through
Terminal Services.

Deny Log On Through Terminal
Services

167

User Rights Assignment policy options

Allows a user or group to set the Trusted For Delegation setting for a user or computer object. A user or computer that is trusted for delegation can access resources on another computer using delegated credentials of a client.

Enable Computer And User Accounts To Be Trusted For Delegation

168

User Rights Assignment policy options

Allows the system to be shut down by a user at remote location on the network.

Force Shutdown From A Remote System

169

User Rights Assignment policy options

Allows a user, group, or process to make entries in the security log.

Generate Security Audits

170

User Rights Assignment policy options

Enables programs running on behalf of a user to impersonate a client.

Impersonate A Client After Authentication

171

User Rights Assignment policy options

The working set of a process is the current set of pages in the virtual address space of the process that resides in physical memory. This setting allows you to increase the size of the process working set.

Increase A Process Working Set

172

User Rights Assignment policy options

Specifies that a process can increase or decrease the priority that is assigned to another process.

Increase Scheduling Priority

173

User Rights Assignment policy options

Allows a user to dynamically unload and load device drivers. This right does not apply to Plug and Play drivers.

Load And Unload Device Drivers

174

User Rights Assignment policy options

Allows an account to create a process that runs only in physical RAM, preventing it from being paged.

Lock Pages In Memory

175

User Rights Assignment policy options

Allows a process to log on to the system and run a file that contains one or more operating system commands.

Log On As A Batch Job

176

User Rights Assignment policy options

Allows a service to log on in order to run.

Log On As A Service

177

User Rights Assignment policy options

Allows a user to enable object access auditing
for files and other Active Directory objects. This
right does not allow a user to enable general
object access auditing in the Local Security
Policy.

Manage Auditing And Security Log

178

User Rights Assignment policy options

Allows a user to change the integrity level of
files, folders, or other objects.

Modify An Object Label

179

User Rights Assignment policy options

Allows a user to install or upgrade Windows. It also allows a user or process to modify the firmware environment variables stored in NVRAM of non-x86-based computers. This right does not affect the modification of system environment variables or user environment variables.

Modify Firmware Environment Variables

180

User Rights Assignment policy options

Allows a user to monitor nonsystem processes through performance-monitoring tools.

Profile Single Process

181

User Rights Assignment policy options

Allows a user to monitor system processes through performance-monitoring tools.

Profile System Performance

182

User Rights Assignment policy options

Allows a user to undock a laptop through the Windows 10 user interface.

Remove Computer From Docking Station

183

User Rights Assignment policy options

Allows a process, such as Task Scheduler, to call
an API to start another service.

Replace A Process Level Token

184

User Rights Assignment policy options

Allows a user to restore files and directories regardless of file and directory permissions.

Restore Files And Directories

185

User Rights Assignment policy options

Allows a user to shut down the Windows 10 computer
locally.

Shut Down The System

186

User Rights Assignment policy options

Allows a user to synchronize Active Directory data.

Synchronize Directory Service Data

187

User Rights Assignment policy options

Allows a user to take ownership of system objects, such as files, folders, printers, and processes.

Take Ownership Of Files Or Other
Objects