Deck 6: Windows 10 Security Features

Full screen (f)
exit full mode
Question
Which policy allows you to configure an account to be temporarily disabled after a number of incorrect sign-in attempts?

A) Domain
B) Group
C) Account Lockout
D) Password
Use Space or
up arrow
down arrow
to flip the card.
Question
Which of the following do newer Windows applications use to describe the structure of an application?

A) Manifest
B) Log
C) Record
D) Hash
Question
What type of encryption algorithm uses two related, but unique, keys to encrypt and decrypt data?

A) Symmetric
B) Asymmetric
C) Hashing
D) Signing
Question
Which of the following is a method for protecting data on removable storage, such as USB drives?

A) NTFS
B) EFS
C) BitLocker To Go
D) Account Lockout Policy
Question
Which of the following is true of BitLocker Drive Encryption?

A) It uses asymmetric encryption to secure data.
B) EFS and BitLocker Drive Encryption use the same method to secure the encryption key.
C) To use BitLocker Drive Encryption, a hard drive cannot be divided into partitions.
D) When you use BitLocker Drive Encryption, an entire volume is encrypted.
Question
Raphael, a system administrator, is setting up the password policy for local user accounts. He allows users to reuse a password after they have used 4 different passwords. He also modifies the policy to force users to change their old passwords every 60 days. After some time, he notices that users are modifying their passwords 4 times in a short time span and continuing to use their old passwords. This defeats the purpose of setting up the password restrictions.
Which of the following settings should Raphael modify to control this behavior?

A) Raphael should modify the setting to enforce password history.
B) Raphael should set the Minimum password age setting to at least 1 day.
C) Raphael should modify the Maximum password age setting to 60 days.
D) Raphael should set the Minimum password length to 10 characters.
Question
Winona has set up AppLocker rules to protect computers on the company network from being infected by malware. Despite this, one of the computers is infected by malware. She identifies that the malware infected the computer when a user ran a malicious .exe file.
Which of the following prevented the AppLocker rules from being evaluated?

A) The Executable rules are enforced and not audited.
B) The Application Identity service is configured for Manual startup.
C) The Windows Installer rules are not configured.
D) A Path rule does not allow software to run from C:\Program Files\.
Question
Esmeralda creates a rule with the Deny permission for photo.exe in the Executable Rules collection for a group with all users.
Which of the following is true in this scenario?

A) This rule is not enabled by default due to negative performance impact.
B) This rule can also be applied to multiple users or groups.
C) Users will not be able to run other applications that do not have an Allow rule.
D) Users who have the Allow permission for photo.exe will be able to run the executable.
Question
Percy is configuring Advanced Audit Policy settings for Windows 10 clients in his organization.
Which of the following event categories is Percy least likely to configure for these systems?

A) Account Logon
B) Logon/Logoff
C) DS Access
D) Privilege Use
Question
Macy works as a system administrator at an accounting firm. Sensitive data is stored on all Windows 10 client systems. She wants to audit all access to files on these systems, so she decides to edit the Global Object Access Auditing category.
In order to complete this task, which of the following conditions should be met?

A) The files and folders must be on NTFS-formatted volumes.
B) This category must be edited using auditpol.exe.
C) Macy must first edit the settings under the Privilege Use category.
D) Macy must configure auditing at the individual file and folder level.
Question
Mahima is configuring advanced audit policies for Windows 10 clients. She decides to configure the Privilege Use category.
Which of the following justifies Mahima's decision to configure the settings under this category?

A) Mahima wants to track when system events occur, such as restarting the system.
B) Mahima wants to track instances where users change the time zone on their systems.
C) Mahima wants to change the categories of privilege use that are audited by default.
D) Mahima wants to disable auditing for success and failure events for log off and account lockout.
Question
Shawn signs into a Windows 10 system with administrative user privileges. The system has UAC enabled. Shawn accidently launches a malicious application that is infected with malware.
If the malware is able to access and corrupt the system files, which of the following must be true?

A) The Application Information Service has stopped or is set to start manually.
B) The application launched with standard user privileges, the same as the Windows 10 interface.
C) On a prompt to continue or cancel running the program, Shawn selected to continue.
D) Shawn entered the credentials of a user with administrative privileges after opening the application.
Question
Joanna, a graphic designer at ChromaStage, has an application installed on her UAC-enabled Windows 10 system that was designed for an older version of Windows. Some of the application's features require administrative privileges. When she tries running the application, the application fails to run and generates an error instead.
If Joanna's account already has administrative privileges, what can she do to resolve this issue?

A) She should add an entry in the application manifest to trigger the privilege elevation prompt.
B) She should sign in with another user account that has administrative privileges.
C) She should sign in with a user account that has standard user privileges.
D) She should use the Application Compatibility Toolkit to resolve the issue.
Question
An application installed on a Windows 10 system requires access to restricted areas on the system to place user data. However, this application is not UAC compliant.
To enable this application to run properly, which of the following UAC options should be enabled?

A) Run all administrators in Admin Approval Mode
B) Switch to the secure desktop when prompting for elevation
C) Detect application installations and prompt for elevation
D) Virtualize file and registry write failures to per-user locations
Question
Jimmy downloaded a game from the Internet and installed it on his Windows 10 system. A couple of days after the installation, his computer's performance degraded drastically. Assuming that the game had slowed it down, he uninstalled the game and used software to get rid of residual files. Despite this, his computer's performance did not improve. Inspecting the Resource Monitor revealed that the Memory and CPU were running close to 100% capacity. He suspects that the computer is infected with malware.
Which of the following scans would you recommend to Jimmy?

A) Real-time scanning
B) A full scan
C) A quick scan
D) A custom scan
Question
Kesha spends time analyzing datasets that are larger than 1 TB in job as a data scientist. This data is stored in databases on her Windows 10 system. While running an analysis on these databases, she does not want her code to be slowed down because of real-time scanning by Windows Defender.
Which of the following settings should Kesha modify to solve this problem?

A) Exclusions
B) Tamper protection
C) Notifications
D) Cloud-based protection
Question
Oshane is configuring security settings on his computer. Recently, his friend's computer was attacked by malware that encrypted data on all the hard disks and demanded a cryptocurrency ransom to decrypt this data.
Which of the following options in Windows 10 is the best option to help Oshane avoid a similar situation?

A) Windows Defender Application Guard
B) Windows Defender Smartscreen
C) Controlled folder access
D) Secure boot
Question
Oluseyi receives a link to a free download of a premium application in his email. He clicks the link and the application downloads. Before installing it, he wants to verify the authenticity of the download. He verifies the MD5 value of the downloaded application against the MD5 value listed for the application on the original website. The MD5 values do not match.
Which of the following is true in this scenario?

A) The downloaded application has been modified from its original and authentic version.
B) The MD5 value is generated by a symmetric encryption algorithm.
C) The file name of the downloaded application does not match the original file on the website.
D) Oluseyi's email is compromised, and his mailbox is most likely infected by malware.
Question
Orson is trying to open an encrypted file on his Windows 10 system. The file was encrypted using EFS, and he opened this as recently as last week.
Which of the following is most likely the reason that Orson is unable to open the file?

A) Orson moved the file from its original folder to a different folder.
B) Orson reset the password of his Windows user account.
C) Orson failed to back up the EFS certificate on a smart card.
D) Orson created a duplicate copy of the file on another partition.
Question
Sharon recently lost an encryption certificate that rendered some of her EFS-encrypted files unrecoverable. To prevent a similar situation from arising in the future, she wants to create a recovery certificate for recently encrypted files. She creates the recovery certificate.
What should Sharon do next?

A) Run cipher with the /r:filename option, where filename is the name of the recovery certificate
B) Use the public key of the recovery certificate to encrypt the symmetric key
C) Run cipher with the /u option to update the existing encrypted files
D) Import the recovery certificate into the local security policy as a data recovery agent
Question
Veronica copies an unencrypted file from one partition on her hard drive to an encrypted folder on another partition. From there, she moves the file to a folder on a flash drive.
If the file on the flash drive is encrypted, which of the following must be true?

A) The folder on the flash drive is an encrypted folder.
B) Copying the file to the encrypted folder encrypted the file.
C) The flash drive is a FAT32-formatted volume.
D) Moving the file to the flash drive encrypted the file.
Question
Vishal is considering switching to BitLocker Drive Encryption because of the inefficiencies of EFS. When he tries to use this encryption feature on Windows 10 Professional, he is unsuccessful.
Which of the following is the most likely reason?

A) The motherboard in the computer does not contain a TPM module.
B) BitLocker Drive Encryption is unavailable on Windows 10 Professional.
C) Vishal encrypted some files and folders using EFS.
D) The hard drive does not contain a system volume.
Question
Tobias, a system administrator at a pharmaceutical company, uses BitLocker Drive Encryption to encrypt all Windows 10 computers in the organization. Because the computers contain sensitive information, users must enter a PIN to start the system. While this is a useful security feature when the computers are disconnected from the organization's network, this becomes a hindrance in performing remote maintenance because Tobias cannot start these computers without entering the PIN.
Which of the following tools can Tobias use to overcome this issue?

A) BitLocker Network Unlock
B) BitLocker To Go
C) Trusted Platform Module (TPM)
D) Windows Defender Smartscreen
Question
Dorothy, a system administrator, uses BitLocker To Go to protect USB drives that are used in the organization. She chooses the Use a password to unlock the drive option when picking between unlocking options. Warren wants to print some files, so he copies these files from his work laptop onto a USB drive. Next, he plugs in this drive on a computer that is connected to a printer.
If Warren is able to print the files on the USB drive successfully without entering any password, which of the following must be true of the computer connected to the printer?

A) The computer is not running Windows 10 Home.
B) The computer has a smart card reader.
C) The motherboard on the computer has a TPM module.
D) The computer is marked as a trusted environment.
Question
TropicMaze is a manufacturer of processed foods. The packaging at the plant is automated by machines that are controlled by a Windows 10 computer.
Which of the following indicates that this computer receives updates using Long Term Servicing Branch?

A) The computer receives Windows Updates at irregular intervals.
B) The computer receives the latest feature updates from Microsoft every six months.
C) The operating system on the computer will receive Windows Updates for 10 years.
D) The updates applied to the operating system come with version numbers such as 1909.
Question
Diego has the Windows 10 Home edition installed on his personal laptop. As an avid gamer, he prefers having his computer update with the latest feature updates from Microsoft. He usually plays games at specific times, and he wants to prevent his computer from restarting to install an update during these time slots.
Which of the following Windows Update settings should Diego modify?

A) View update history
B) Pause updates for 7 days
C) Change active hours
D) Download updates over metered connections
Question
Hang owns a Windows 10 laptop that does not have any issues. She is configuring Windows Update settings on this laptop.
Which of the following settings should Hang leave turned on?

A) Receive updates for other Microsoft products when you update Windows
B) Pause updates
C) Restart this device as soon as possible when a restart is required to install an update
D) Download updates over metered connections
Question
Hannah, a system administrator, wants to use Windows Update for Business in her organization to control updates for Windows 10 systems. While she is able to use Group Policy to apply these settings to most computers, she is unable to apply these settings to some computers.
Which of the following is the most likely reason that Hannah is not able to apply the Windows Update for Business settings to these computers?

A) These computers are part of a domain rather than a workgroup.
B) These computers are running preview builds of Windows 10.
C) These computers are running the Windows 10 Home edition.
D) These computers are designated test computers for new updates.
Question
Yixuan, a system administrator, configures Windows Update for Business in her organization to control updates for Windows 10 systems. The settings are configured such that a test system first receives any new Windows update and other Windows systems receive the update after two weeks. Being a small organization, Yixuan wants to reduce bandwidth consumption during the organization-wide update.
Which of the following options should Yixuan use in this scenario?

A) Pause updates
B) Delivery optimization
C) Change active hours
D) Update notification
Question
Alex, a system administrator, wants to uninstall a Windows update that was recently installed on around 200 Windows 10 computers in the organization.
Which of the following options is best suited to this scenario?

A) Using Windows Server Update Services
B) Using a batch script with wusa.exe
C) Using the Get-HotFix cmdlet on command prompt
D) Using the graphical interface
Question
Guillaume has a Windows 10 personal laptop. He wants to ensure that the Microsoft Store apps on his computer are kept updated.
What can Guillaume do to ensure this?

A) Use Windows Update to update these apps regularly
B) Turn on automatic updates in the Microsoft Store
C) Use the Get-HotFix cmdlet on command prompt
D) Turn on the Receive updates for other Microsoft products when you update Windows option
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/31
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 6: Windows 10 Security Features
1
Which policy allows you to configure an account to be temporarily disabled after a number of incorrect sign-in attempts?

A) Domain
B) Group
C) Account Lockout
D) Password
Account Lockout
2
Which of the following do newer Windows applications use to describe the structure of an application?

A) Manifest
B) Log
C) Record
D) Hash
Manifest
3
What type of encryption algorithm uses two related, but unique, keys to encrypt and decrypt data?

A) Symmetric
B) Asymmetric
C) Hashing
D) Signing
Asymmetric
4
Which of the following is a method for protecting data on removable storage, such as USB drives?

A) NTFS
B) EFS
C) BitLocker To Go
D) Account Lockout Policy
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
5
Which of the following is true of BitLocker Drive Encryption?

A) It uses asymmetric encryption to secure data.
B) EFS and BitLocker Drive Encryption use the same method to secure the encryption key.
C) To use BitLocker Drive Encryption, a hard drive cannot be divided into partitions.
D) When you use BitLocker Drive Encryption, an entire volume is encrypted.
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
6
Raphael, a system administrator, is setting up the password policy for local user accounts. He allows users to reuse a password after they have used 4 different passwords. He also modifies the policy to force users to change their old passwords every 60 days. After some time, he notices that users are modifying their passwords 4 times in a short time span and continuing to use their old passwords. This defeats the purpose of setting up the password restrictions.
Which of the following settings should Raphael modify to control this behavior?

A) Raphael should modify the setting to enforce password history.
B) Raphael should set the Minimum password age setting to at least 1 day.
C) Raphael should modify the Maximum password age setting to 60 days.
D) Raphael should set the Minimum password length to 10 characters.
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
7
Winona has set up AppLocker rules to protect computers on the company network from being infected by malware. Despite this, one of the computers is infected by malware. She identifies that the malware infected the computer when a user ran a malicious .exe file.
Which of the following prevented the AppLocker rules from being evaluated?

A) The Executable rules are enforced and not audited.
B) The Application Identity service is configured for Manual startup.
C) The Windows Installer rules are not configured.
D) A Path rule does not allow software to run from C:\Program Files\.
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
8
Esmeralda creates a rule with the Deny permission for photo.exe in the Executable Rules collection for a group with all users.
Which of the following is true in this scenario?

A) This rule is not enabled by default due to negative performance impact.
B) This rule can also be applied to multiple users or groups.
C) Users will not be able to run other applications that do not have an Allow rule.
D) Users who have the Allow permission for photo.exe will be able to run the executable.
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
9
Percy is configuring Advanced Audit Policy settings for Windows 10 clients in his organization.
Which of the following event categories is Percy least likely to configure for these systems?

A) Account Logon
B) Logon/Logoff
C) DS Access
D) Privilege Use
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
10
Macy works as a system administrator at an accounting firm. Sensitive data is stored on all Windows 10 client systems. She wants to audit all access to files on these systems, so she decides to edit the Global Object Access Auditing category.
In order to complete this task, which of the following conditions should be met?

A) The files and folders must be on NTFS-formatted volumes.
B) This category must be edited using auditpol.exe.
C) Macy must first edit the settings under the Privilege Use category.
D) Macy must configure auditing at the individual file and folder level.
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
11
Mahima is configuring advanced audit policies for Windows 10 clients. She decides to configure the Privilege Use category.
Which of the following justifies Mahima's decision to configure the settings under this category?

A) Mahima wants to track when system events occur, such as restarting the system.
B) Mahima wants to track instances where users change the time zone on their systems.
C) Mahima wants to change the categories of privilege use that are audited by default.
D) Mahima wants to disable auditing for success and failure events for log off and account lockout.
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
12
Shawn signs into a Windows 10 system with administrative user privileges. The system has UAC enabled. Shawn accidently launches a malicious application that is infected with malware.
If the malware is able to access and corrupt the system files, which of the following must be true?

A) The Application Information Service has stopped or is set to start manually.
B) The application launched with standard user privileges, the same as the Windows 10 interface.
C) On a prompt to continue or cancel running the program, Shawn selected to continue.
D) Shawn entered the credentials of a user with administrative privileges after opening the application.
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
13
Joanna, a graphic designer at ChromaStage, has an application installed on her UAC-enabled Windows 10 system that was designed for an older version of Windows. Some of the application's features require administrative privileges. When she tries running the application, the application fails to run and generates an error instead.
If Joanna's account already has administrative privileges, what can she do to resolve this issue?

A) She should add an entry in the application manifest to trigger the privilege elevation prompt.
B) She should sign in with another user account that has administrative privileges.
C) She should sign in with a user account that has standard user privileges.
D) She should use the Application Compatibility Toolkit to resolve the issue.
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
14
An application installed on a Windows 10 system requires access to restricted areas on the system to place user data. However, this application is not UAC compliant.
To enable this application to run properly, which of the following UAC options should be enabled?

A) Run all administrators in Admin Approval Mode
B) Switch to the secure desktop when prompting for elevation
C) Detect application installations and prompt for elevation
D) Virtualize file and registry write failures to per-user locations
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
15
Jimmy downloaded a game from the Internet and installed it on his Windows 10 system. A couple of days after the installation, his computer's performance degraded drastically. Assuming that the game had slowed it down, he uninstalled the game and used software to get rid of residual files. Despite this, his computer's performance did not improve. Inspecting the Resource Monitor revealed that the Memory and CPU were running close to 100% capacity. He suspects that the computer is infected with malware.
Which of the following scans would you recommend to Jimmy?

A) Real-time scanning
B) A full scan
C) A quick scan
D) A custom scan
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
16
Kesha spends time analyzing datasets that are larger than 1 TB in job as a data scientist. This data is stored in databases on her Windows 10 system. While running an analysis on these databases, she does not want her code to be slowed down because of real-time scanning by Windows Defender.
Which of the following settings should Kesha modify to solve this problem?

A) Exclusions
B) Tamper protection
C) Notifications
D) Cloud-based protection
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
17
Oshane is configuring security settings on his computer. Recently, his friend's computer was attacked by malware that encrypted data on all the hard disks and demanded a cryptocurrency ransom to decrypt this data.
Which of the following options in Windows 10 is the best option to help Oshane avoid a similar situation?

A) Windows Defender Application Guard
B) Windows Defender Smartscreen
C) Controlled folder access
D) Secure boot
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
18
Oluseyi receives a link to a free download of a premium application in his email. He clicks the link and the application downloads. Before installing it, he wants to verify the authenticity of the download. He verifies the MD5 value of the downloaded application against the MD5 value listed for the application on the original website. The MD5 values do not match.
Which of the following is true in this scenario?

A) The downloaded application has been modified from its original and authentic version.
B) The MD5 value is generated by a symmetric encryption algorithm.
C) The file name of the downloaded application does not match the original file on the website.
D) Oluseyi's email is compromised, and his mailbox is most likely infected by malware.
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
19
Orson is trying to open an encrypted file on his Windows 10 system. The file was encrypted using EFS, and he opened this as recently as last week.
Which of the following is most likely the reason that Orson is unable to open the file?

A) Orson moved the file from its original folder to a different folder.
B) Orson reset the password of his Windows user account.
C) Orson failed to back up the EFS certificate on a smart card.
D) Orson created a duplicate copy of the file on another partition.
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
20
Sharon recently lost an encryption certificate that rendered some of her EFS-encrypted files unrecoverable. To prevent a similar situation from arising in the future, she wants to create a recovery certificate for recently encrypted files. She creates the recovery certificate.
What should Sharon do next?

A) Run cipher with the /r:filename option, where filename is the name of the recovery certificate
B) Use the public key of the recovery certificate to encrypt the symmetric key
C) Run cipher with the /u option to update the existing encrypted files
D) Import the recovery certificate into the local security policy as a data recovery agent
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
21
Veronica copies an unencrypted file from one partition on her hard drive to an encrypted folder on another partition. From there, she moves the file to a folder on a flash drive.
If the file on the flash drive is encrypted, which of the following must be true?

A) The folder on the flash drive is an encrypted folder.
B) Copying the file to the encrypted folder encrypted the file.
C) The flash drive is a FAT32-formatted volume.
D) Moving the file to the flash drive encrypted the file.
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
22
Vishal is considering switching to BitLocker Drive Encryption because of the inefficiencies of EFS. When he tries to use this encryption feature on Windows 10 Professional, he is unsuccessful.
Which of the following is the most likely reason?

A) The motherboard in the computer does not contain a TPM module.
B) BitLocker Drive Encryption is unavailable on Windows 10 Professional.
C) Vishal encrypted some files and folders using EFS.
D) The hard drive does not contain a system volume.
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
23
Tobias, a system administrator at a pharmaceutical company, uses BitLocker Drive Encryption to encrypt all Windows 10 computers in the organization. Because the computers contain sensitive information, users must enter a PIN to start the system. While this is a useful security feature when the computers are disconnected from the organization's network, this becomes a hindrance in performing remote maintenance because Tobias cannot start these computers without entering the PIN.
Which of the following tools can Tobias use to overcome this issue?

A) BitLocker Network Unlock
B) BitLocker To Go
C) Trusted Platform Module (TPM)
D) Windows Defender Smartscreen
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
24
Dorothy, a system administrator, uses BitLocker To Go to protect USB drives that are used in the organization. She chooses the Use a password to unlock the drive option when picking between unlocking options. Warren wants to print some files, so he copies these files from his work laptop onto a USB drive. Next, he plugs in this drive on a computer that is connected to a printer.
If Warren is able to print the files on the USB drive successfully without entering any password, which of the following must be true of the computer connected to the printer?

A) The computer is not running Windows 10 Home.
B) The computer has a smart card reader.
C) The motherboard on the computer has a TPM module.
D) The computer is marked as a trusted environment.
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
25
TropicMaze is a manufacturer of processed foods. The packaging at the plant is automated by machines that are controlled by a Windows 10 computer.
Which of the following indicates that this computer receives updates using Long Term Servicing Branch?

A) The computer receives Windows Updates at irregular intervals.
B) The computer receives the latest feature updates from Microsoft every six months.
C) The operating system on the computer will receive Windows Updates for 10 years.
D) The updates applied to the operating system come with version numbers such as 1909.
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
26
Diego has the Windows 10 Home edition installed on his personal laptop. As an avid gamer, he prefers having his computer update with the latest feature updates from Microsoft. He usually plays games at specific times, and he wants to prevent his computer from restarting to install an update during these time slots.
Which of the following Windows Update settings should Diego modify?

A) View update history
B) Pause updates for 7 days
C) Change active hours
D) Download updates over metered connections
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
27
Hang owns a Windows 10 laptop that does not have any issues. She is configuring Windows Update settings on this laptop.
Which of the following settings should Hang leave turned on?

A) Receive updates for other Microsoft products when you update Windows
B) Pause updates
C) Restart this device as soon as possible when a restart is required to install an update
D) Download updates over metered connections
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
28
Hannah, a system administrator, wants to use Windows Update for Business in her organization to control updates for Windows 10 systems. While she is able to use Group Policy to apply these settings to most computers, she is unable to apply these settings to some computers.
Which of the following is the most likely reason that Hannah is not able to apply the Windows Update for Business settings to these computers?

A) These computers are part of a domain rather than a workgroup.
B) These computers are running preview builds of Windows 10.
C) These computers are running the Windows 10 Home edition.
D) These computers are designated test computers for new updates.
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
29
Yixuan, a system administrator, configures Windows Update for Business in her organization to control updates for Windows 10 systems. The settings are configured such that a test system first receives any new Windows update and other Windows systems receive the update after two weeks. Being a small organization, Yixuan wants to reduce bandwidth consumption during the organization-wide update.
Which of the following options should Yixuan use in this scenario?

A) Pause updates
B) Delivery optimization
C) Change active hours
D) Update notification
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
30
Alex, a system administrator, wants to uninstall a Windows update that was recently installed on around 200 Windows 10 computers in the organization.
Which of the following options is best suited to this scenario?

A) Using Windows Server Update Services
B) Using a batch script with wusa.exe
C) Using the Get-HotFix cmdlet on command prompt
D) Using the graphical interface
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
31
Guillaume has a Windows 10 personal laptop. He wants to ensure that the Microsoft Store apps on his computer are kept updated.
What can Guillaume do to ensure this?

A) Use Windows Update to update these apps regularly
B) Turn on automatic updates in the Microsoft Store
C) Use the Get-HotFix cmdlet on command prompt
D) Turn on the Receive updates for other Microsoft products when you update Windows option
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 31 flashcards in this deck.