CH 9

User accounts that are issued a temporary user profile that is deleted when the user signs out are members of what group?
guest group
Which of the following is NOT true about Remote Desktop?
by default all users can access Remote Desktop
What statement about user accounts and groups is NOT true?
a user account can belong to only one group at a time
When utilizing both share and NTFS permissions, what statement is inaccurate?
if both permissions are used, the least restrictive permission between the two applies
What statement about controlling access to folders and files is accurate?
rights are assigned to accounts
On the IE General tab you can block cookies.
false
What port is utilized by the Remote Desktop service?
3389
When attempting to access a remote computer on which your user name and password do not exist, what user group will you be placed in?
anonymous users
When working with a workgroup, what statement is accurate regarding which folders to use to hold shared data?
private data for each user should be kept in their C:Users folder
What type of permission should you set to control access to files and folders by local and network users?
NTFS on NTFS volumes only
What task can’t be performed from the IE General tab?
What task can’t be performed from the IE General tab?
Windows 10 features what new web browser, which is designed to replace Internet Explorer?
microsoft edge
If you want to be able to power up a computer remotely, what feature should you use?
wake on lan
To which group does Windows give access to folders that you create which are not part of your user profile?
authenticated users
The default value of the security level in IE is Medium-high.
true
If a Windows computer belongs to a domain, all security is managed by the network administrator for the entire network.
true
When all users on a network require the same access to all resources, what type of network model should you use?
homegroup
What protocol must be supported by routers in order to utilize Remote Assistance Easy Connect?
pnrp
Regarding the use of Group Policy, what statement is NOT accurate?
all policies are applied before the logon screen appears
What kind of a computer intercepts requests that a browser makes of a server and can cache received content?
proxy server
What command launches the Remote Desktop client for Windows?
mstsc
When mapping a drive, you can type in the path to the shared folder on the host computer. What is the syntax for the path?
\serversharedfolder
What is a valid reason for wanting to configure a proxy server in Internet Explorer?
to connect to secured websites on a coporate network vpn
When a user logs on to a Windows 7 computer using Remote Desktop, users that are logged on locally are unaffected.
false
What kind of a computer intercepts requests that a browser makes of a server and can cache received content?
proxy server
What command launches the Remote Desktop client for Windows?
mstsc
When mapping a drive, you can type in the path to the shared folder on the host computer. What is the syntax for the path?
\serversharedfolder
What is a valid reason for wanting to configure a proxy server in Internet Explorer?
to connect to secured websites on a coporate network vpn
What kind of a computer intercepts requests that a browser makes of a server and can cache received content?
proxy server
What command launches the Remote Desktop client for Windows?
mstsc
When mapping a drive, you can type in the path to the shared folder on the host computer. What is the syntax for the path?
\serversharedfolder
What is a valid reason for wanting to configure a proxy server in Internet Explorer?
What kind of a computer intercepts requests that a browser makes of a server and can cache received content?
proxy server