Book Image

Installing and Configuring Windows 10: 70-698 Exam Guide

Book Image

Installing and Configuring Windows 10: 70-698 Exam Guide

Overview of this book

The Installing and Configuring Windows 10: 70-698 Exam Guide is designed to confirm what you already know, while also updating your knowledge of Windows 10. With its easy-to-follow guidance, you will quickly learn the user interface and discover steps to work efficiently in Windows 10 to rule out delays and obstacles. This book begins by covering various ways of installing Windows 10, followed by instructions on post-installation tasks. You will learn about the deployment of Windows 10 in Enterprise and also see how to configure networking in Windows 10. You’ll understand how to leverage Disk Management and Windows PowerShell to configure disks, volumes, and file system options. As you progress through the chapters, you will be able to set up remote management in Windows 10 and learn more about Windows update usage, behavior, and settings. You will also gain insights that will help you monitor and manage data recovery and explore how to configure authentication, authorization, and advanced management tools in Windows 10. By the end of this book, you will be equipped with enough knowledge to take the 70-698 exam and explore different study methods to improve your chances of passing the exam with ease.
Table of Contents (25 chapters)
Title Page
Copyright and Credits
Dedication
About Packt
Contributors
Preface
Index

Questions


  1. The IPv4 address is a logical element that consists of 32 bits and is organized into four octets (each octet has eight bits), separated by a period. 
    1. True
    2. False
  2. For a computer to be able to communicate in a computer network requires two logical elements: _______________ and an __________________.
  3. Which of the following are advanced VPN profile features? (Choose two)
    1. App-triggered VPN
    2. Lockdown VPN
    3. Remote access VPN
    4. Site-to-site VPN
  4. The firewall is a computer that protects your computer and network from malware and security breaches based on preconfigured security rules.
    1. True
    2. False
  5. The ______________________ is a logical connection on the internet for transmitting data securely.
  6. Which of the following are steps in the troubleshooting process?
    1. Identify the problem
    2. Test your theories
    3. Verify full functionality
    4. All of the above
  7. Wi-Fi is a networking technology that uses a coaxial cable as a communication medium.
    1. True
    2. False
  8. The ______________________ is a suite of protocols that enables secure network...