Curioustab
Aptitude
General Knowledge
Verbal Reasoning
Computer Science
Interview
Take Free Test
Aptitude
General Knowledge
Verbal Reasoning
Computer Science
Interview
Take Free Test
Microsoft Certification Questions
In Microsoft Windows, which of the following are typically displayed in File Explorer for end users?
In a Windows Server environment, what is the name of the service that manages a centralized database containing user account and security information?
In a Windows 2000 Active Directory forest using the DNS name DIM.COM as the root domain with multiple child domains, what is the effect of attempting to rename the misspelled root domain to DLM.COM?
You have a computer that runs Windows 7. You need to confirm that all installed device drivers are digitally signed and trusted by the operating system. Which built in Windows tool should you run to perform this verification?
Your network consists of a single Active Directory domain and 10 Web servers that run Windows Server 2003 Service Pack 2 (SP2). You need to archive the Application event logs from all of the Web servers so that the archived copies retain all of the information from the original logs. Which method should you use?
As a network administrator, you move a shared printer object from your company's Marketing organizational unit (OU) to the Research OU in Active Directory. After the move, you test the printer and discover that the local administrator associated with the Marketing OU still has permissions to manage the printer and can remove print jobs. What should you do to remove this access while keeping the printer available?
In C++ programming, the scope resolution operator (::) is used to qualify names with a namespace or class scope. Why does the C++ language forbid you from overloading the scope resolution operator (::) in your own classes or libraries?
In the context of modern PC hardware and Microsoft Windows operating systems, what does the term Plug and Play (often written as PnP) mean and what does it allow a user to do?
In a bitmap based paint program, the application internally keeps track of every __________ that is placed on the screen while you draw, erase, and edit images.
Joyel and Susy share a Windows 10 tablet but sign in with different standard user accounts. Joyel needs to open some files that are stored in Susy's Documents folder under her user profile. Under normal Windows security, how can Joyel gain access to these files?
In the context of PC hardware and older Microsoft Windows power management, what does the acronym APM stand for, and what does this technology do?
Programs from the same developer that are sold together as a bundle, share common menus and toolbars, integrate closely with one another, and provide a consistent user interface are known as what type of software package?
Your network consists of a single Active Directory domain. You have a Windows 7 computer named Computer1 and another Windows 7 computer named Computer2. From Computer1, you can recover all Encrypting File System (EFS) encrypted files for users in the domain (Computer1 holds the EFS data recovery agent keys). You need to ensure that you can also recover all EFS encrypted files from Computer2. What should you do?
You have a computer named Computer1 that runs Windows Vista and a computer named Computer2 that runs Windows 7. You plan to migrate all user profiles and data files from Computer1 to Computer2 by using the User State Migration Tool (USMT). Before performing the migration, you need to determine how much disk space will be required to store the migration data. What should you do?
You have prepared a reference computer that runs Windows 7 and want to deploy its image to multiple machines. You create an unattended answer file named answer.xml. You need to ensure that the deployed installations automatically apply the settings in answer.xml after you capture and deploy the image. Which Sysprep command should you run on the reference computer before capturing the image?
Your network consists of a single Active Directory domain. All servers run Windows Server 2003 Service Pack 2 (SP2), all client computers run Windows XP Service Pack 3 (SP3), and you have installed Microsoft Windows Server Update Services (WSUS) 3.0 on a member server named Server1. You create a new Group Policy object (GPO1) that enables Automatic Updates and link it to the domain. You need to ensure that each client computer obtains software updates from Server1 instead of from Microsoft Update on the Internet. What should you configure?
You have a computer that runs Windows 7 and a locally installed printer that you share on the network. You remove the Everyone group from the printer's access control list (ACL) and then share the printer. You need to ensure that members of the Sales group can submit print jobs and modify or cancel only their own jobs, but cannot modify or cancel print jobs submitted by other users. What should you do?
You are part of a development team building several ASP.NET applications for your organization. You want to create a reusable toolbar that will appear at the top of every page in each application, with its contents varying based on options the user selects when creating a profile. You also want the toolbar to be a reusable control that your team can add to the Visual Studio toolbox and drop onto pages in multiple projects. What should you do?
In Windows 7, the operating system uses the Action Center to notify users about important information system and configuration issues. Which description best explains how the user is alerted to these system and configuration alerts on the desktop?
Your network consists of a single Active Directory domain. The domain includes a group named SalesUsers. You have a file server that runs Windows Server 2003 Service Pack 2 (SP2) with a folder named CorpData that is shared as CorpData. The Domain Users group has Full Control share permission on CorpData. Inside CorpData, you create a folder named Sales. You need to configure security for the Sales folder so that members of the SalesUsers group can read, create, and modify all files and folders, while all other users can only view items in the folder. What should you do?
1
2
3
4
5
6
7