Domain 1: Windows Installation and Configuration
Domain 2: Application and Peripheral Management
Domain 3: Data Access and Management
Domain 4: Device Security
Domain 5: Troubleshooting
100

An account that exists on a single computer What is

Local Account?

100

This connector can deliver both power and data

USB-C


100

A Microsoft cloud-based file storage service used to store and share files.

One Drive

100

Which type of information about users does biometrics evaluate?

physical characteristics of a user


100

What is a digital storefront that offers applications, games, and music to Windows users?

Microsoft Store

200

What is the ability for a user to access a resource?

Permissions

200

This connector is used by TVs, computers, consoles, and projectors

HDMI

200

Which type of backup, in combination with the full backup, allows you to restore all data most quickly?

Differential Backup

200

Which Microsoft service is used to manage laptop computers and mobile devices?

Microsoft Intune

200

What is the operation that takes an operating system back to the previous version?

Roll Back

300

An individual with the highest level of control and access on a computer

What is the Administrator?

300

This connector is used by monitors and computers but not consoles

DisplayPort

300

What type of backup backs up data that has changed from the last backup?

Incremental Backup

300

Malware that replicates and spreads itself across devices within a network.

Worm

300

What is a Windows general-purpose directory that stores network objectives such as users, accounts, and resources?

Active Directory

400

What is the bar provided on a Windows display that allows users quick access to applications in use and pinned to this bar?

Taskbar

400

This connector is typically found on legacy monitors and computers

VGA

400

A policy that determines what data is stored and archived on a computer along with how long that data is stored and what happens to the data after the retention period is over.

Retention Policy

400

A social engineering attack where individuals make phone calls or leave voice messages to try and trick companies or individuals into revealing personal information.

Vishing


400

Allows administrators to control the working environments of computers and user accounts in active directory.

Site Group Policy 


500

A type of installation that allows administrators to determine the components they want to install and where they want them stored.

Custom Installation

500

What do DisplayPort, HDMI, USB-C all have in common?

Video and Audio


500

A Microsoft cloud computing platform used to build, deploy, and manage applications.

Microsoft Azure 

500

What is the type of spyware where a hacker capture keyboard keystrokes, including the keystrokes used to sign in to accounts?

Keyloggers

500

In what order are Group Policies applied in an Active Directory domain by default?

Local —> Site —> Domain —> Organization

M
e
n
u