For more classes visit
www.snaptutorial.com
Question 1
What are the buttons called in the Windows 8 edge UI that provide access to common operating system functions such as Search and Settings?
9953330565 Low Rate Call Girls In Rohini Delhi NCR
Â
CIS 329 Technology levels--snaptutorial.com
1. CIS 329 quiz
For more classes visit
www.snaptutorial.com
Question 1
What are the buttons called in the Windows 8 edge UI that
provide access to common operating system functions such as Search
and Settings?
Question 2
If you are currently running Windows 8 on your computer,
what is the easiest way to upgrade to Windows 8 Professional?
Question 3
Which of the following methods is not a way to close unused
apps that are still running on a Windows 8 computer?
Question 4
Computers running Windows PE will automatically shut down
and reboot after how long?
Question 5
During what phase of the Windows 8 startup process is the
Local Security Authority loaded?
2. Question 6
Before performing an upgrade to Windows 8, several tasks
should be performed to ensure the procedure goes smoothly. Which of
the following is not one of these tasks?
Question 7
What name is given to a Windows PE installation on a
computer with Windows 8 already installed?
Question 8
Your organization currently uses roaming profiles for all
users. All users use Windows 7 computers. Windows 8 will be
introduced shortly in your organization. Given the information
presented, what issue should you be aware of?
Question 9
You have a small number of Windows XP computers in your
organization. You need to manually move as much data from the user
profile locations for these computers as possible to the new Windows 8
computers these users will be receiving shortly. Where in the file system
would you find the profile information?
Question 10
The User State Migration Tool uses several files to control the
migration process. What is the file format of these files?
Question 11
What should you enter into the Run dialog box to open the
Device Manager console?
Question 12
3. What is the value of a protected checksum dependent upon?
Question 13
0 out of 2 points On which tab of a driverâs properties dialog box will
you find information about any conflicts the driver may be
experiencing?
Question 14
What Windows 8 feature assigns one of four integrity levels to
running processes?
Question 15
What is the executable file name for the Windows Installer
application on a Windows 8 computer?
Question 16
What Windows 8 feature prevents applications from executing
code in prohibited areas?
Question 17
Using a single Microsoft account, on how many Windows 8
devices can you install a specific Windows app?
Question 18
Which of the following is not an AppLocker rule collection
type available for usage when creating AppLocker rules?
Question 19
What PowerShell cmdlet would you need to use to install a
critical Line of Business (LOB) Windows App that has been created
within your organization?
4. Question 20
When you click the down arrow next to the Print button on the
IE 10 toolbar, you can choose from all of the following options except
which one?
Question 21
What new standard defines a protocol that allows clients and
servers to exchange data immediately as it becomes available without
the overhead created by HTTP and TCP?
Question 22
By default, IE 10 is granted access to which area of the
computer?
Question 23
Which Hyper-V virtual switch feature provides protection
against a malicious virtual machine attempting to steal IP addresses
from other virtual machines?
Question 24
Snapshot data files are stored using what file format?
Question 25
What PowerShell cmdlet can you use to enable Client Hyper-
V?
********************************************************
5. CIS 329 Week 4 Quiz 1
For more classes visit
www.snaptutorial.com
⢠Question 1
When considering an upgrade to Windows 8, several critical
questions must be considered. Which of the following is not one of these
questions to consider?
⢠Question 2
Which edition of Windows 8 includes Office 2013 installed
already but does not offer a choice of 32-bit or 64-bit versions?
⢠Question 3
What are the buttons called in the Windows 8 edge UI that
provide access to common operating system functions such as Search
and Settings?
⢠Question 4
6. Which of the following should be used to locate hardware
inadequacies in the computer that might prevent a successful upgrade to
Windows 8?
⢠Question 5
What name is given to a Windows PE installation on a
computer with Windows 8 already installed?
⢠Question 6
During what phase of the Windows 8 startup process is the
Local Security Authority loaded?
⢠Question 7
Computers running Windows PE will automatically shut down
and reboot after how long?
⢠Question 8
What is the name of the USMT application that is used to save
user profile data for a migration?
⢠Question 9
In the scenario where you are installing Windows 8 on a new
computer and plan to dispose of an old computer running Windows XP,
which Windows Easy Transfer method would be most appropriate to
use?
7. ⢠Question 10
Your organization currently uses roaming profiles for all
users. All users use Windows 7 computers. Windows 8 will be
introduced shortly in your organization. Given the information
presented, what issue should you be aware of?
⢠Question 11
To communicate with the operating system running on the
computer, each device also requires a software element known as what?
⢠Question 12
What is the value of a protected checksum dependent upon?
⢠Question 13
You have opened the Properties dialog box for an installed
printer on your computer system. On what tab will you find information
that is specific to this piece of installed hardware on your computer
system?
8. ⢠Question 14
You have PhotoShop Elements installed on your Windows 8
computer. You want PhotoShop Elements to automatically be launched
every time you plug in a memory card that contains photos. What setting
do you need modify?
⢠Question 15
Windows Installer uses what file format for single package
application installations?
⢠Question 16
What is the name of the Remote Desktop Services feature that
enables clients to run Remote Desktop server applications within an
individual window?
⢠Question 17
What PowerShell cmdlet would you need to use to install a
critical Line of Business (LOB) Windows App that has been created
within your organization?
⢠Question 18
When you create your first new rule in AppLocker, what will
happen if you do not have the default rules in place?
⢠Question 19
9. By default, Windows 8 is configured to check for
updates for installed apps _________ and then _________ the needed
updates.
⢠Question 20
Which of the following is not one of the methods that the
SmartScreen Filter uses to identify potential phishing web sites?
⢠Question 21
When you click the down arrow next to the Print button on the
IE 10 toolbar, you can choose from all of the following options
exceptwhich one?
⢠Question 22
What new standard defines a protocol that allows clients and
servers to exchange data immediately as it becomes available without
the overhead created by HTTP and TCP?
⢠Question 23
What PowerShell cmdlet can you use to enable Client Hyper-
V?
10. ⢠Question 24
Snapshot data files are stored using what file format?
⢠Question 25
What Hyper-V feature helps you use physical memory more
efficiently for your VMs?
********************************************************
CIS 329 Week 6 Quiz 2
For more classes visit
www.snaptutorial.com
⢠Question 1
When considering an upgrade to Windows 8, several critical
questions must be considered. Which of the following is not one of these
questions to consider?
11. ⢠Question 2
Which edition of Windows 8 includes Office 2013 installed
already but does not offer a choice of 32-bit or 64-bit versions?
⢠Question 3
What are the buttons called in the Windows 8 edge UI that
provide access to common operating system functions such as Search
and Settings?
⢠Question 4
Which of the following should be used to locate hardware
inadequacies in the computer that might prevent a successful upgrade to
Windows 8?
⢠Question 5
What name is given to a Windows PE installation on a
computer with Windows 8 already installed?
⢠Question 6
During what phase of the Windows 8 startup process is the
Local Security Authority loaded?
⢠Question 7
Computers running Windows PE will automatically shut down
and reboot after how long?
⢠Question 8
What is the name of the USMT application that is used to save
user profile data for a migration?
⢠Question 9
12. In the scenario where you are installing Windows 8 on a new
computer and plan to dispose of an old computer running Windows XP,
which Windows Easy Transfer method would be most appropriate to
use?
⢠Question 10
Your organization currently uses roaming profiles for all
users. All users use Windows 7 computers. Windows 8 will be
introduced shortly in your organization. Given the information
presented, what issue should you be aware of?
⢠Question 11
To communicate with the operating system running on the
computer, each device also requires a software element known as what?
⢠Question 12
What is the value of a protected checksum dependent upon?
⢠Question 13
You have opened the Properties dialog box for an installed
printer on your computer system. On what tab will you find information
that is specific to this piece of installed hardware on your computer
system?
⢠Question 14
You have PhotoShop Elements installed on your Windows 8
computer. You want PhotoShop Elements to automatically be launched
every time you plug in a memory card that contains photos. What setting
do you need modify?
⢠Question 15
13. Windows Installer uses what file format for single package
application installations?
⢠Question 16
What is the name of the Remote Desktop Services feature that
enables clients to run Remote Desktop server applications within an
individual window?
⢠Question 17
What PowerShell cmdlet would you need to use to install a
critical Line of Business (LOB) Windows App that has been created
within your organization?
⢠Question 18
When you create your first new rule in AppLocker, what will
happen if you do not have the default rules in place?
⢠Question 19
By default, Windows 8 is configured to check for updates for
installed apps _________ and then _________ the needed updates.
⢠Question 20
Which of the following is not one of the methods that the
SmartScreen Filter uses to identify potential phishing web sites?
⢠Question 21
When you click the down arrow next to the Print button on the
IE 10 toolbar, you can choose from all of the following options except
which one?
⢠Question 22
14. What new standard defines a protocol that allows clients and
servers to exchange data immediately as it becomes available without
the overhead created by HTTP and TCP?
⢠Question 23
What PowerShell cmdlet can you use to enable Client Hyper-
V?
⢠Question 24
Snapshot data files are stored using what file format?
⢠Question 25
What Hyper-V feature helps you use physical memory more
efficiently for your VMs?
⢠Question 1
What is the largest danger that high-capacity removable
storage devices pose to an enterprise network?
⢠Question 2
0 out of 2 points When none of your configured Software Restriction
Policies are matched, what happens?
⢠Question 3
When using the Allow/Prevent installation of devices that
match any of these device IDs setting in the Device Installation
Restrictions folder of a GPO, what other setting must you ensure you
also configure to provide the intended results?
⢠Question 4
In order to use the Custom Classes: Deny read/write access
setting of the Removable Storage Access policy settings, what will you
15. need to know about each device to which you wish to allow read or write
access?
⢠Question 5
Software restriction policies can work in three ways, based on
the settings you choose for each of the rules. Which of the following is
not one of the settings to choose from?
⢠Question 6
The process of applying a header and footer to a data packet
is known as what?
⢠Question 7
0 out of 2 points
What protocol is responsible for the end-to-end transmission
of a packet, to its final destination on a network?
⢠Question 8
In the OSI model, which layer is at the bottom and represents
the hardware that forms the network?
********************************************************
CIS 329 Week 6 quiz
For more classes visit
16. www.snaptutorial.com
⢠Question 1
What is the largest danger that high-capacity removable
storage devices pose to an enterprise network?
⢠Question 2
0 out of 2 points When none of your configured Software Restriction
Policies are matched, what happens?
⢠Question 3
When using the Allow/Prevent installation of devices that
match any of these device IDs setting in the Device Installation
Restrictions folder of a GPO, what other setting must you ensure you
also configure to provide the intended results?
⢠Question 4
In order to use the Custom Classes: Deny read/write access
setting of the Removable Storage Access policy settings, what will you
need to know about each device to which you wish to allow read or write
access?
⢠Question 5
Software restriction policies can work in three ways, based on
the settings you choose for each of the rules. Which of the following is
not one of the settings to choose from?
⢠Question 6
17. The process of applying a header and footer to a data packet
is known as what?
⢠Question 7
0 out of 2 points What protocol is responsible for the end-to-end
transmission of a packet, to its final destination on a network?
⢠Question 8
In the OSI model, which layer is at the bottom and represents
the hardware that forms the network?
⢠Question 9
0 out of 2 points Most cabled networks today use what type of cabling?
⢠Question 10
What protocol do most devices currently use at the Network
layer?
⢠Question 11
0 out of 2 points What type of attack is occurring when attackers gain
access to otherwise restricted network resources, using a wireless
network?
⢠Question 12
A 2x2 MIMO device has how many total transceivers?
⢠Question 13
Why should you not deploy a wireless network using WEP for
security?
⢠Question 14
18. 802.11n wireless networking equipment uses two, three, or
more different frequencies for transmission and the subsequent receiving
of traffic. The sending system splits its data into multiple signals for
transmission, and the receiving device reassembles the signals into a
single data stream. What is the name of this process?
⢠Question 15
What command can you issue from the command line to view
all configured wireless networks on your Windows 8 computer?
⢠Question 16
When do data protection technologies such as the Windows 8
Encrypting File System (EFS) and BitLocker protect data?
⢠Question 17
What term is given to software that includes viruses, Trojan
horses, worms, spyware, and adware?
⢠Question 18
When using the Windows Firewall with Advanced Security
console, you will see three distinct network locations that impact the
behavior of the Windows Firewall. Which of the following is not one of
these network locations used by the Windows Firewall?
⢠Question 19
Which of the following is not an item that can be used when
building Windows Firewall rules?
⢠Question 20
Which of the following items is not found in the Security
section of the Windows 8 Action Center?
19. ⢠Question 21
Remote Assistance offers several methods to send the
invitation for assistance. Which of the following is not one of those
options?
⢠Question 22
Remote Assistance requires that access to what port be
available on the requesting client?
⢠Question 23
What is the name of the feature that enables an administrator,
trainer, or technical specialist at one location to connect to a distant
userâs computer, chat with the user, and either view all the userâs
activities or take complete control of the system?
⢠Question 24
Why do some snap-ins, such as the Active Directory Domain
Services consoles, not provide a means to redirect the console to
another computer?
⢠Question 25
What makes connecting to a remote computer by redirecting
an existing console an inefficient method over time?
********************************************************
CIS 329 Week 8 Quiz 3
20. For more classes visit
www.snaptutorial.com
⢠Question 1
How do you start the process to modify the default homegroup
sharing configuration?
⢠Question 2
Which of the following statements is true of Public folder
sharing?
⢠Question 3
0 out of 2 points For users at home, which file sharing is most likely the
simplest to setup and use?
⢠Question 4
What is the net effect of the following combination of share
and NTFS permissions when the share is accessed over the network?
⢠Share permission (Share tab)âSales group: Full Control
⢠NTFS permission (Security tab)âSales group: Read & Execute,
Modify, Write
⢠Question 5
21. It is possible to create a share that is invisible to users
browsing the network simply by appending what character to the end of
the share name?
⢠Question 6
What is the maximum support file name length in the NTFS file
system?
⢠Question 7
When deciding what your auditing policy should be, there are
some key things to consider to help you decide which computers,
resources, and events you want to audit. Which of the items listed is not
one of the items typically considered?
⢠Question 8
If you apply a change to a folder to enable EFS for the folder
only, what happens to the files currently in the folder?
⢠Question 9
0 out of 2 points Regarding NTFS permissions, when you move NTFS
files or folders from one volume to another, which of the following
statements is true?
⢠Question 10
When using the iacls.exe utility, what flag (e.g., /?) is used to
specify that the command should be executed on all files and subfolders
contained in the starting folder location?
⢠Question 11
What is the default setting for UAC in Windows 8?
⢠Question 12
22. What is the most common method by which phishing attacks
are launched?
⢠Question 13
What is the intended function of the User Account Control
(UAC) feature in Windows?
⢠Question 14
How long after you complete the configuration of local
security policies on a computer will it take for those policies to become
effective?
⢠Question 15
How can you fully disable UAC in Windows 8?
⢠Question 16
What must you do, at a minimum, before you can manage
domain objects on a Windows 8 workstation
⢠Question 17
Where are user accounts stored for computers that are in a
workgroup?
⢠Question 18
Which of the following is not an allowed gesture for a picture
password?
⢠Question 19
Which of the following items is not supported as a method of
authentication in Windows 8?
23. ⢠Question 20
Generally speaking, which of the following password
conditions is not considered to be part of a strong password?
⢠Question 21
If you have Windows 8 Professional workstation clients on
your network, what single BranchCache protocol will they be limited to
using?
⢠Question 22
When using distributed-cache mode for BranchCache, where
is the cache hosted in the branch office?
⢠Question 23
You must deploy at least one or more BranchCache-enabled
servers at your main office to enable BranchCache. Which of the
following server types is not an option as a BranchCache-enabled
server?
⢠Question 24
What is the main difference between BranchCache version 1
and version 2?
⢠Question 25
What advantage does the usage of SSTP for VPN connections
offer firewall administrators?
********************************************************
24. CIS 329 Week 10 Assignment 1 Preparing for a
Company-Wide Migration to Windows 8
For more classes visit
www.snaptutorial.com
Assignment 1: Preparing for a Company-Wide Migration to Windows 8
Due Week 10 and worth 160 points
Crescent Manufacturing Inc. (CMI) is a luxury leader in crafted and
customized home furnishings. The corporate headquarters and a
production facility are located in Texas, with additionalmanufacturing
facilities located in Nebraska and Maryland.
There are 250 employees in the Texas location, 175 in Maryland, and 25
in Nebraska. All locations use Windows 7 as the primary client
operating system. The systems at the Maryland location are over five (5)
years old. CMIâs Information Technology (IT) department upgraded the
computer systems with new hardware within the past year at all other
company locations. These upgraded computer systems are capable of
running Windows 8. CMI recently upgraded all of its servers to run
Windows Server 2012 in an Active-Directory-based environment.
The Operations, Marketing, Administration, IT Support, and Finance
departments are located in the Texas location. Nebraska is primarily a
manufacturing location that is staffed by production line employees, a
25. line supervisor, and a plant manager. The Maryland office also includes
an operations component (i.e., production line employees, line
supervisor, and plant manager), a small IT department, and the
companyâs human resources department.
The current IT support staff comprises a seasoned group of individuals
that collectively have over ten (10) years of experience in network
administration and working with Microsoft operating systems. Many of
the IT staff have recently completed training on the Windows 8
operating system and are well-versed in supporting Windows Server
2008 and 2012. The remainder of the companyâs employees has only a
basic knowledge of Windows 7 and relies on the companyâs help desk to
solve a majority of its computer problems. CMI has a team of 50
salespeople who use laptops and tablets while working from their home
offices. These employees, who travel extensively with their laptops, must
have their systems secured in case of loss or theft. The laptops,
purchased over five (5) years ago, run the Windows 7 operating system.
The tablets, used only by a subset of the sales staff, are iPads running
iOS 7.
The Chief Information Officer (CIO) is concerned about employees
installing non-standard company applications downloaded from the
Windows Store both while at work and when they have their devices at
home. The CIO also wants to ensure that those persons on the IT staff
are the only individuals authorized to update Windows Store apps. The
CIO has an IT support staff of ten (10) employees and does not want to
increase the number of applicationsthat need to be supported via the
companyâs help desk. The help desk is currently staffed by three (3)
employees from 8:00 a.m. â 5:00 p.m. (CST).
Hardware and software compatibility issues experienced during the
upgrade to Windows 7 several years earlier resulted in the company
going over budget by several thousands of dollars. The CFO stated that
the reason for going over budget was directly related to problems with
their business critical applications not being fully compatible with
26. Windows 7. The applications are used by the Operations department to
track inventory, schedule production runs, handle purchase orders, and
track product shipments. Senior management wants to address software
compatibility testing prior to moving the entire company to Windows 8.
They are also concerned about the time it might take to migrate user
settings and applications over to the new Windows 8 operating system,
the time to train employees on using the new interface, the overall
impact on the companyâs help desk, and day-to-day operations.
The CIO and Chief Financial Officer (CFO) want more information
before making the decision to upgrade to Windows 8 and have asked you
to write a report that addresses their concerns and also includes your
recommendations on how best to proceed, should the project be
approved.
Write an eight to ten (8-10) page paper in which you:
Develop a SWOT analysis on the viability of upgrading to Windows 8
for the organization as a whole.
Provide a detailed upgrade plan for the organization, including the sales
staff. At a minimum:
Identify the number of systems, by location and / or departments that IT
must replace with new or compatible hardware.
Recommend whether the organization should use a phased-in approach
(i.e., upgrades are sequenced by departments and / or locations) or a
flash-cut approach (i.e., all at once) in order to upgrade to Windows 8.
If a phased-in approach is recommended, identify the departments and /
or locations you would upgrade, and describe the preferred upgrade
sequence. Support your recommendations.
Address the length of time in which the upgrade should occur, and
identify the main issues which could impact the specified time frame.
27. Describe one (1) approach that IT could use in order to ensure that they
thoroughly test business critical applications.
Describe three (3) best practices for securing the laptops and tablets for
the sales staff after the upgrade is complete.
Examine the pros and cons of configuring AppLocker to standardize the
software used by employees across the organization.
Explain the process and options available for managing application
installations and updates via the Windows Store, and thus addressing
the concerns voiced by the CIO.
Use at least three (3) quality resources in this assignment.Note:
Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with
one-inch margins on all sides; citations and references must follow APA
or school-specific format. Check with your professor for any additional
instructions.
Include a cover page containing the title of the assignment, the studentâs
name, the professorâs name, the course title, and the date. The cover
page and the reference page are not included in the required assignment
page length.
The specific course learning outcomes associated with this assignment
are:
Demonstrate the ability to install and configure a client operating
system, applications, and associated updates as well as designing a
client operating system installation strategy.
Validate and successfully install a computer client operating system.
28. Demonstrate the ability to discuss the migration phases and
considerations in a client operating system installation to include virtual
machines and the cloud infrastructure.
Demonstrate the ability to apply technology tools to monitor and
configure applications and network performance.
Use technology and information resources to research issues in
operating system environments.
Write clearly and concisely about desktop administration and operating
system topics using proper writing mechanics and technical style
conventions.
********************************************************
CIS 329 Week 10 Assignment 1 Preparing for a
Company-Wide Migration to Windows 8
For more classes visit
www.snaptutorial.com
29. Assignment 1: Preparing for a Company-Wide Migration to Windows 8
Due Week 10 and worth 160 points
Crescent Manufacturing Inc. (CMI) is a luxury leader in crafted and
customized home furnishings. The corporate headquarters and a
production facility are located in Texas, with additionalmanufacturing
facilities located in Nebraska and Maryland.
There are 250 employees in the Texas location, 175 in Maryland, and 25
in Nebraska. All locations use Windows 7 as the primary client
operating system. The systems at the Maryland location are over five (5)
years old. CMIâs Information Technology (IT) department upgraded the
computer systems with new hardware within the past year at all other
company locations. These upgraded computer systems are capable of
running Windows 8. CMI recently upgraded all of its servers to run
Windows Server 2012 in an Active-Directory-based environment.
The Operations, Marketing, Administration, IT Support, and Finance
departments are located in the Texas location. Nebraska is primarily a
manufacturing location that is staffed by production line employees, a
line supervisor, and a plant manager. The Maryland office also includes
an operations component (i.e., production line employees, line
supervisor, and plant manager), a small IT department, and the
companyâs human resources department.
The current IT support staff comprises a seasoned group of individuals
that collectively have over ten (10) years of experience in network
administration and working with Microsoft operating systems. Many of
the IT staff have recently completed training on the Windows 8
operating system and are well-versed in supporting Windows Server
2008 and 2012. The remainder of the companyâs employees has only a
basic knowledge of Windows 7 and relies on the companyâs help desk to
solve a majority of its computer problems. CMI has a team of 50
30. salespeople who use laptops and tablets while working from their home
offices. These employees, who travel extensively with their laptops, must
have their systems secured in case of loss or theft. The laptops,
purchased over five (5) years ago, run the Windows 7 operating system.
The tablets, used only by a subset of the sales staff, are iPads running
iOS 7.
The Chief Information Officer (CIO) is concerned about employees
installing non-standard company applications downloaded from the
Windows Store both while at work and when they have their devices at
home. The CIO also wants to ensure that those persons on the IT staff
are the only individuals authorized to update Windows Store apps. The
CIO has an IT support staff of ten (10) employees and does not want to
increase the number of applicationsthat need to be supported via the
companyâs help desk. The help desk is currently staffed by three (3)
employees from 8:00 a.m. â 5:00 p.m. (CST).
Hardware and software compatibility issues experienced during the
upgrade to Windows 7 several years earlier resulted in the company
going over budget by several thousands of dollars. The CFO stated that
the reason for going over budget was directly related to problems with
their business critical applications not being fully compatible with
Windows 7. The applications are used by the Operations department to
track inventory, schedule production runs, handle purchase orders, and
track product shipments. Senior management wants to address software
compatibility testing prior to moving the entire company to Windows 8.
They are also concerned about the time it might take to migrate user
settings and applications over to the new Windows 8 operating system,
the time to train employees on using the new interface, the overall
impact on the companyâs help desk, and day-to-day operations.
The CIO and Chief Financial Officer (CFO) want more information
before making the decision to upgrade to Windows 8 and have asked you
to write a report that addresses their concerns and also includes your
31. recommendations on how best to proceed, should the project be
approved.
Write an eight to ten (8-10) page paper in which you:
Develop a SWOT analysis on the viability of upgrading to Windows 8
for the organization as a whole.
Provide a detailed upgrade plan for the organization, including the sales
staff. At a minimum:
Identify the number of systems, by location and / or departments that IT
must replace with new or compatible hardware.
Recommend whether the organization should use a phased-in approach
(i.e., upgrades are sequenced by departments and / or locations) or a
flash-cut approach (i.e., all at once) in order to upgrade to Windows 8.
If a phased-in approach is recommended, identify the departments and /
or locations you would upgrade, and describe the preferred upgrade
sequence. Support your recommendations.
Address the length of time in which the upgrade should occur, and
identify the main issues which could impact the specified time frame.
Describe one (1) approach that IT could use in order to ensure that they
thoroughly test business critical applications.
Describe three (3) best practices for securing the laptops and tablets for
the sales staff after the upgrade is complete.
Examine the pros and cons of configuring AppLocker to standardize the
software used by employees across the organization.
Explain the process and options available for managing application
installations and updates via the Windows Store, and thus addressing
the concerns voiced by the CIO.
32. Use at least three (3) quality resources in this assignment.Note:
Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with
one-inch margins on all sides; citations and references must follow APA
or school-specific format. Check with your professor for any additional
instructions.
Include a cover page containing the title of the assignment, the studentâs
name, the professorâs name, the course title, and the date. The cover
page and the reference page are not included in the required assignment
page length.
The specific course learning outcomes associated with this assignment
are:
Demonstrate the ability to install and configure a client operating
system, applications, and associated updates as well as designing a
client operating system installation strategy.
Validate and successfully install a computer client operating system.
Demonstrate the ability to discuss the migration phases and
considerations in a client operating system installation to include virtual
machines and the cloud infrastructure.
Demonstrate the ability to apply technology tools to monitor and
configure applications and network performance.
Use technology and information resources to research issues in
operating system environments.
Write clearly and concisely about desktop administration and operating
system topics using proper writing mechanics and technical style
conventions.
33. ********************************************************
CIS 329 Week 11 Quiz
For more classes visit
www.snaptutorial.com
⢠Question 1
Which of the following is not an option on the Second screen
menu of Windows 8?
⢠Question 2
What Windows keyboard combination can you use to project to a
second screen?
⢠Question 3
Which power plan is not shown by default in the Power Options control
panel?
⢠Question 4
34. How does Windows 8 transmit display signals to a network
projector?
⢠Question 5
When using BitLocker To Go, which of the following that is
typically associated with BitLocker is not required to unlock the drive?
⢠Question 6
Of the listed BitLocker authentication methods, which is
considered to be the least secure?
⢠Question 7
What name is given to the user account(s) that have been
authorized to recover BitLocker drives for an organization?
⢠Question 8
If the Configure Automatic Updates policy is not enabled and
applied to the devices along with other Windows Update settings, what
will happen?
⢠Question 9
What is the maximum value of the Delay Restart for scheduled
installations policy?
⢠Question 10
What is the default value of the Delay Restart for scheduled
installations policy?
⢠Question 11
How many active partitions can a hard disk hold?
35. ⢠Question 12
What is a limitation of dynamic disks?
⢠Question 13
What benefit is provided by the new Storage Spaces feature of
Windows 8?
⢠Question 14
What PowerShell cmdlet can be used to display the Event Logs?
⢠Question 15 What keyboard combination will directly
open the Task Manager in Windows 8?
⢠Question 16
You can associate several actions to occur upon a specific event
occurring. Which of the listed actions is not one of the available
options?
⢠Question 17 What name is given to a set of readings, captured
under normal operating conditions, which you can save and compare to
readings taken at a later time?
⢠Question 18
To restore the computer from a system image backup, what must
you do?
⢠Question 19
What is the limitation of using a USB flash drive as the backup
destination when using Windows 7 File Recovery?
⢠Question 20
36. In which Control Panel view will you not be able to find the
Windows 7 File Recovery option?
⢠Question 21
You can use Group Policy to configure how Windows responds
when a user tries to install device drivers that are not digitally signed.
Which of the following options is not available for this configuration?
⢠Question 22
When a startup failure occurs before the logon user interface
appears, the problem could be hardware related, but it is most likely due
to an issue with one of the drivers or services that the kernel is
attempting to load. To locate the offending driver or service, you must
first attempt to get the computer started by using what?
⢠Question 23
What organization is responsible for the testing and verification
of compatibility, reliability, and functionality of drivers for hardware
devices?
⢠Question 24 If File History is enabled, what will be the status
of Windows 7 File Recovery on the computer?
⢠Question 25
What is the primary method of file recovery for a Windows 8
computer
********************************************************