Multiple Choice Questions/Answers for Windows – With Explanation

1. What filename extension is applied by default to custom consoles that are created for the MMC?

  1. .mmc
  2. .msc
  3. .con
  4. .mcn

Answer – B
Description – When you create a custom console for the MMC, the .msc filename extension is automatically applied.

2. You want to create roaming profiles for users in the sales department. They frequently log on at computers in a central area. The profiles should be configured as mandatory and roaming profiles. Which users are able to manage mandatory profiles on Windows 7 computers?

  1. The user who uses the profile
  2. Server operators
  3. Power users
  4. Administrators

Answer – D
Description – Only members of the Administrators group can manage mandatory profiles.

3. You want to monitor the CPU, memory, and disk usage on your computer to ensure that there are no bottlenecks. Which MMC snap – in would you load to access System Monitor?

  1. System Monitor
  2. Reliability Monitor
  3. ActiveX Control
  4. Performance Logs and Alerts

Answer – C
Description – Select ActiveX Control in the Add/Remove Snap – in dialog box. Then, from the Insert ActiveX Control dialog box, select System Monitor Control to access the System Monitor utility. You can also access the System Monitor view by opening Performance Monitor.

4. If you wanted to require that a user enter an Administrator password to perform administrative tasks, what type of user account should you create for the user?

  1. Administrator User account
  2. Standard User account
  3. Power User account
  4. Authenticated User account

Answer – B
Description – You would create a standard user account for the user. Standard users must provide the credentials of an administrator account when prompted by User Account Control (UAC) in order to perform administrative tasks.

5. You have installed a clean installation of Windows 7 on your computer. You want to create an image of the new installation to use as a basis for remote installs. What Windows 7 utility should you use to accomplish this?

  1. WDS
  2. Windows SIM
  3. ImageX
  4. Sysprep

Answer – C
Description – You can use the ImageX utility to create an image of a Windows 7 installation. After the image has been created, you can prepare the image with a utility such as the System Preparation Tool (Sysprep). The image can then be used for remote installations of Windows 7.

6. Which of the following statements is true regarding the built – in Administrator account in Windows 7? (Choose all that apply.)

  1. The built – in Administrator account does not exist in Windows 7.
  2. The built – in Administrator account is disabled by default in Windows 7.
  3. The built – in Administrator account has no permissions in Windows 7.
  4. The built – in Administrator account is not a member of the Administrators group in Windows 7.

Answer – B
Description – The built – in Administrator account is disabled by default in Windows 7. However, it can be enabled through Local Users and Groups or by modifying the Accounts: Administrator Account Status GPO setting.

7. You have a user with limited vision. Which accessibility utility is used to read aloud screen text, such as the text in dialog boxes, menus, and buttons?

  1. Read – Aloud
  2. Orator
  3. Dialog Manager
  4. Narrator

Answer – D
Description – The Narrator utility uses a sound output device to read onscreen text.

8. You have just purchased a new computer that has Windows 7 pre installed. You want to migrate existing users from a previous computer that was running Windows XP Professional. Which two files would you use to manage this process through the User State Migration Tool?

  1. usmt.exe
  2. ScanState.exe
  3. LoadState.exe
  4. Windows7Migrate.exe

Answer – B,C
Description – Windows 7 ships with a utility called the User State Migration Tool (USMT) that is used by administrators to migrate users from one computer to another via a command – line utility. The USMT consists of two executable files: ScanState.exe and LoadState.exe .

9. You have scheduled a specific program that is required by the accounting department to run as a scheduled task every day. When you log on as an administrator, you can run the task, but when the scheduled task is supposed to run, it does not run properly. You have already verified that the Task Scheduler task is running. What else should you check?

  1. Verify that the task has been configured to run in unattended mode.
  2. Make sure the user who is scheduled to run the task has the appropriate permissions.
  3. Make sure the time is properly synchronized on the computer.
  4. Verify that the Process Manager task is running.

Answer – B
Description – If you are using Task Scheduler and your jobs are not running properly, make sure the Task Scheduler service is running and is configured to start automatically. You should also ensure that the user who is configured to run the scheduled task has sufficient permissions to run it.

10. You are the network administrator for your company. Recently, one of your users in the accounting department has reported that they were unsure whether a banking website was legitimate or not. You want to configure a utility that will verify whether a website is known to be fraudulent. Which utility should you configure?

  1. Pop – up Blocker
  2. RSS Reader
  3. Phishing Filter
  4. Add – on Manager

Answer – C
Description – Internet Explorer 8 ships with Phishing Filter, which can help verify whether a website is known to be fraudulent or not. Phishing Filter helps to prevent malicious websites from masquerading as legitimate sites in order to obtain your personal or financial information.

11. You have a user, Jan, who suspects that her Windows 7 computer has been infected with spyware. You remove the spyware from her computer and want to prevent spyware from infecting it in the future. Which of the following Windows 7 utilities should you configure?

  1. Windows Defender
  2. Phishing Filter
  3. Pop – up Blocker
  4. Windows OneCare

Answer – A
Description – Windows Defender is an anti-spyware program included with Windows 7. It offers real – time protection from spyware and other unwanted software. You can also configure Windows Defender to scan for spyware on a regular basis.

12. You are configuring power settings on your laptop. You configure the laptop to enter sleep mode after a specified period of inactivity. Which of the following will occur when the computer enters Sleep mode?

  1. The computer will be shut down gracefully.
  2. Data will be saved to the hard disk.
  3. The monitor and hard disk will be turned off, but the computer will remain in a fully active state.
  4. The user session will not be available when you resume activity on the computer.

Answer – B
Description – Sleep mode is a combination of Standby mode and Hibernation mode. When Sleep mode is configured, the user ‘s session is quickly accessible on wakeup, but the data is saved to the hard disk. Sleep mode is the preferred power – saving mode in Windows 7.

13. You are using Internet Explorer to access several RSS feeds that you subscribe to. One of the feeds stores only the 10 most recent updates. You want to ensure that the last 100 updates are stored. What should you do?

  1. Configure the RSS feed to automatically download attached files.
  2. Modify the schedule so that the RSS feed is updated more than once a day.
  3. Turn on feed reading view in IE.
  4. Modify the archive setting so that the last 100 items are stored.

Answer – D
Description – Internet Explorer 8 provides the ability to read and subscribe to RSS feeds. You can configure several options for RSS feeds, such as how often the feed is checked for updates, whether attachments are automatically downloaded, and how many updates are stored for the feed.

14. What is the CIDR equivalent for

  1. /24
  2. /25
  3. /26
  4. /27

Answer – D
Description – A subnet mask of equals a CIDR of /27. CIDR is the number of on bits.

15. You are configuring a new Windows 7 computer for a new employee. You configure the new user with a standard user account. Which of the following functions will the new employee be allowed to perform? (Choose all that apply.)

  1. Install a printer.
  2. Install network drivers.
  3. Configure WPA keys.
  4. Modify the Desktop settings.

Answer – A,C,D
Description – Standard users are allowed to perform a variety of tasks, such as install printers, configure wireless keys, and modify their Desktop settings.

16. You are the network administrator for Some Company. Your network consists of 200 Windows 7 computers, and you want to assign static IP addresses rather than use a DHCP server. You want to configure the computers to reside on the network. What subnet mask should you use with this network address?


Answer – C
Description – You should use the subnet mask on your network in this scenario. The IP network address is a Class C address. Class C addresses, by default, use the subnet mask The network portion of the address is 192.168.10, and the host portion of the address can be 1 to 254.

17. You are using a laptop running Windows 7 Home Premium. You want to synchronize files between your laptop and a network folder. Which of the following actions must you perform first in order to enable synchronization to occur between your laptop and the network folder?

  1. Upgrade your laptop to Windows 7 Ultimate.
  2. Enable one – way synchronization between the laptop and the network folder.
  3. Enable two – way synchronization between the laptop and the network folder.
  4. Configure the files on your laptop as read – only.

Answer – A
Description – To enable synchronization of files between your laptop and a network folder, you must first upgrade your laptop to a version of Windows 7 that supports synchronization with network folders, such as Windows 7 Ultimate. Windows Sync Center also supports synchronization of files between computers and mobile devices.

18. You have a DNS server that contains corrupt information. You fix the problem with the DNS server, but one of your users is complaining that they are still unable to access Internet resources. You verify that everything works on another computer on the same subnet. Which command can you use to fix the problem?

  1. IPCONFIG /flush
  2. IPCONFIG /flushdns
  3. PING /flush
  4. GROPE /flushdns

Answer – B
Description – The IPCONFIG /flushdns command is used to purge the DNS Resolver cache. The IPCONFIG command displays a computer’s IP configuration.

19. Which of the following information can be configured on a VPN client so that it can access a VPN server? (Choose two answers.)

  1. IP address
  2. MAC address
  3. Domain name
  4. Connection address

Answer – A,C
Description – When you configure a VPN connection, you must specify the IP address or host domain name of the computer to which you’ll connect.

20. Which of the following statements are true regarding the creation of a group in Windows 7? (Choose two.)

  1. Only members of the Administrators group can create users on a Windows 7 computer.
  2. Group names can be up to 64 characters.
  3. Group names can contain spaces.
  4. Group names can be the same as usernames but not the same as other group names on the computer.

Answer – A,C
Description – Only administrators can create new groups on a Windows 7 computer. Group names can contain up to 256 characters and can contain spaces. Group names must be unique to the computer, different from all the other usernames and group names that have been specified on that computer.

21. You need to expand the disk space on your Windows 7 computer. You are considering using spanned volumes. Which of the following statements is/are true concerning spanned volumes? (Choose all that apply.)

  1. Spanned volumes can contain space from 2 to 32 physical drives.
  2. Spanned volumes can contain space from 2 to 24 physical drives.
  3. Spanned volumes can be formatted as FAT32 or NTFS partitions.
  4. Spanned volumes can be formatted only as NTFS partitions.

Answer – A,C
Description – You can create a spanned volume from free space that exists on a minimum of 2 to a maximum of 32 physical drives. When the spanned volume is initially created in Windows 7, it can be formatted with FAT32 or NTFS. If you extend a volume that already contains data, however, the partition must be NTFS.

22. Which of the following versions of Windows 7 support the Windows Aero interface? (Choose all that apply.)

  1. Windows 7 Home Basic
  2. Windows 7 Home Premium
  3. Windows 7 Business
  4. Windows 7 Ultimate

Answer – B,C,D
Description – The new Windows Aero interface is not available on Windows 7 Home Basic. It is available on Windows 7 Home Premium, Windows 7 Business, and Windows 7 Ultimate.

23. Your home computer network is protected by a firewall. You have configured your Windows 7 home computer to use Windows Mail. After you configure your email accounts, you discover that you are unable to send email messages from Windows Mail. Your email provider uses POP3 and SMTP. What port should you open on the firewall?

  1. 25
  2. 110
  3. 443
  4. 995

Answer – A
Description – Port 25 should be opened on the firewall. SMTP is used for outbound mail and uses port 25. POP3, which is used for receiving inbound mail, uses port 110.

24. You need Windows 7 to be the primary operating system on a dual – boot machine. Which file do you configure for this?

  1. boot.ini
  2. bcdedit
  3. bcboot.ini
  4. bcdboot

Answer – B
Description – You should configure the bcdedit utility to configure your boot order.

25. Which of the following versions of Windows 7 can be upgraded to Windows 7 Ultimate Edition? (Choose all that apply.)

  1. Windows 7 Home Starter
  2. Windows 7 Professional
  3. Windows 7 Home Premium
  4. Windows 7 Business

Answer – B,D
Description – You can upgrade Windows 7 Professional, and Windows 7 Business to Windows 7 Ultimate Edition.

26. You are configuring a Windows 7 computer that is going to be used by your children. You are configuring access restrictions using the Parental Controls feature of Windows 7. Which of the following can be configured by setting Parental Controls? (Choose all that apply.)

  1. When your children can access the computer
  2. What websites your children can view
  3. What programs your children can access
  4. What other computers on your home network your children can access

Answer – A,B,C
Description – Using Parental Controls, you can configure what websites your children can access, when they can use the computer, what games they can play, and what programs they can run, and you can view reports regarding their activity.

27. How do you access the Advanced Boot Menu in Windows 7 during the boot process?

  1. Press the spacebar.
  2. Press F6.
  3. Press F8.
  4. Press F10.

Answer – C
Description – During the boot process, you are prompted to press F8 to access the Advanced Boot Menu.

28. You have two remote sites with Windows 7 machines. You need to share data across the slow sites. What feature can help with this?

  1. Link Detection
  2. BranchCache
  3. DirectAccess
  4. DirectCache

Answer – B
Description – BranchCache allows multiple sites with slower links to share data quickly and efficiently.

29. Which utility is used to upgrade a FAT32 partition to NTFS?

  1. UPFS
  3. Disk Manager

Answer – D
Description – The CONVERT utility is used to convert an FAT32 partition to NTFS.

30. You want to be able to track which users are accessing the C:\PAYROLL folder and whether the access requests are successful. Which of the following audit policy options allows you to track events related to file and print object access?

  1. File And Object Access
  2. Audit Object Access
  3. Audit File And Print Access
  4. Audit All File And Print Events

Answer – B
Description – Though all four options seem plausible, only the Audit Object Access option actually exists. Audit Object Access is used to enable auditing of access to files, folders, and printers. Once you enable auditing of object access, you must enable file auditing through NTFS security or enable print auditing through printer security.

You may also like:

Sarcastic Writer

Step by step hacking tutorials about wireless cracking, kali linux, metasploit, ethical hacking, seo tips and tricks, malware analysis and scanning.

Related Posts