You are on page 1of 22

chapter 6

1. How can you enable remote desktop


How can you enable remote desktop rules if you reset the
Windows Firewall? (Choose 2)
Student Response Value Correct Answer Feedback
1. Resetting firewall does not disable rules
2. Re-enable manually 50%
3. Disable and enable Remote Desktop 50%
4. Must Reboot
Score: 10/10
Comments:

2. You can disable the Windows 7


You can disable the Windows 7 stealth feature.
Student Response Value Correct Answer
True 0% False
Score: 0/10
Comments:

3. You have to be running what


You have to be running what protocol to use Easy Connect?
Student Response Value Correct Answer Feedback
1. Peer Protocol
2. Peer Name Resolution Protocol 100%
3. Remote Desktop Protocol
4. Advanced Remote Protocol
Score: 10/10
Comments:

4. Choose two (2) items you can


Choose two (2) items you can create rules for Windows 7 firewall?
Student Response Value Correct Answer Feedback
1. Port addresses
2. Programs 50%
3. Services
4. Features 50%
Score: 10/10
Comments:

5. What is the bad result of Remote


What is the bad result of Remote Desktop?
Student Response Value Correct Answer Feedback
1. Desktop support is easier
2. Desktop support technician gets little or no exercise doing the job. 100%
3. Its faster
4. Its quicker
Score: 10/10
Comments:

6. You can talk to a user using Remote


You can talk to a user using Remote Assistance with a voice client in Windows
7
Student Response Value Correct Answer
False 100% False
Score: 10/10
Comments:

7. What new feature in Windows 7 prevents


What new feature in Windows 7 prevents attackers from accessing your system wh
ile the network interface is becoming active?
Student Response Value Correct Answer Feedback
1. Port filtering
2. OS Fingerprinting
3. Boot Time filtering 100%
4. Constant Filtering
Score: 10/10
Comments:

8. What is the ICMP protocol


What is the ICMP protocol mainly used to do?
Student Response Value Correct Answer Feedback
1. Broadcast
2. Multicast
3. Data
4. Diagnostics 100%
Score: 10/10
Comments:

9. Using Remote Assistance requires


Using Remote Assistance requires you provide a password.
Student Response Value Correct Answer
True 100% True
Score: 10/10
Comments:

10. You can make a Remote Desktop connection


You can make a Remote Desktop connection to which editions of Windows 7 (Choos
e 2)
Student Response Value Correct Answer Feedback
1. Ultimate 50%
2. Starter
3. Home Premium
4. Professional 50%
Score: 10/10
Comments:

chapter 7
1. How can you enable remote desktop
How can you enable remote desktop rules if you reset the
Windows Firewall? (Choose 2)
Student Response Value Correct Answer Feedback
1. Resetting firewall does not disable rules
2. Re-enable manually 50%
3. Disable and enable Remote Desktop 50%
4. Must Reboot
Score: 10/10
Comments:

2. You can disable the Windows 7


You can disable the Windows 7 stealth feature.
Student Response Value Correct Answer
True 0% False is correct
Score: 0/10
Comments:

3. You have to be running what


You have to be running what protocol to use Easy Connect?
Student Response Value Correct Answer Feedback
1. Peer Protocol
2. Peer Name Resolution Protocol 100%
3. Remote Desktop Protocol
4. Advanced Remote Protocol

Score: 10/10
Comments:

4. Choose two (2) items you can


Choose two (2) items you can create rules for Windows 7 firewall?
Student Response Value Correct Answer Feedback
1. Port addresses
2. Programs 50%
3. Services
4. Features 50%
Score: 10/10
Comments:
5. What is the bad result of Remote
What is the bad result of Remote Desktop?
Student Response Value Correct Answer Feedback
1. Desktop support is easier
2. Desktop support technician gets little or no exercise doing the job. 100%
3. Its faster
4. Its quicker
Score: 10/10
Comments:

6. You can talk to a user using Remote


You can talk to a user using Remote Assistance with a voice client in Windows
7
Student Response Value Correct Answer
False 100% False

Score: 10/10
Comments:

7. What new feature in Windows 7 prevents


What new feature in Windows 7 prevents attackers from accessing your system wh
ile the network interface is becoming active?
Student Response Value Correct Answer Feedback
1. Port filtering
2. OS Fingerprinting
3. Boot Time filtering 100%
4. Constant Filtering
Score: 10/10
Comments:

8. What is the ICMP protocol


What is the ICMP protocol mainly used to do?
Student Response Value Correct Answer Feedback
1. Broadcast
2. Multicast
3. Data
4. Diagnostics 100%
Score: 10/10
Comments:

9. Using Remote Assistance requires


Using Remote Assistance requires you provide a password.
Student Response Value Correct Answer
True 100% True
Score: 10/10
Comments:

10. You can make a Remote Desktop connection


You can make a Remote Desktop connection to which editions of Windows 7 (Choos
e 2)
Student Response Value Correct Answer Feedback
1. Ultimate 50%
2. Starter
3. Home Premium
4. Professional 50%
Score: 10/10
Comments:

chapter 8
1. What can you use to determine
What can you use to determine what network you are currently joined?

Student Response Value Correct Answer Feedback


1. Network Center
2. Network Location
3. Network and Sharing Center 100%
4. Sharing Center
Score: 6.25/6.25
Comments:

2. You can cofigure BranchCache


You can cofigure BranchCache from the command line using?
Student Response Value Correct Answer Feedback
1. Net Cache
2. Net Share
3. Net use
4. Netsh 100%
Score: 6.25/6.25
Comments:

3. You can share folders by right clicking


You can share folders by right clicking the folder then selecting either of tw
o of the following:
Student Response Value Correct Answer Feedback
1. Security
2. Customize
3. Share 50%
4. Advanced Sharing 50%
Score: 6.25/6.25
Comments:
4. Newly created files inherit what
Newly created files inherit what permissions?
Student Response Value Correct Answer Feedback
1. None
2. Folder Permissions 100%
3. All Permissions
4. Read only
Score: 6.25/6.25
Comments:

5. The Net Share command can


The Net Share command can be used to do all of the following except:
Student Response Value Correct Answer Feedback
1. Share folder
2. Delete folder 100%
3. Assign Permissions
4. Configure Caching options

Score: 6.25/6.25
Comments:

6. How many standard file and folder


How many standard file and folder permissions are avaailable?
Student Response Value Correct Answer Feedback
1. 2
2. 4
3. 5
4. 6 100%
Score: 6.25/6.25
Comments:

7. Sharing options in Windows 7


Sharing options in Windows 7 apply to what?
Student Response Value Correct Answer Feedback
1. Per interface basis 100%
2. Per use basis
3. Per internet basis
4. Per computer basis
Score: 6.25/6.25
Comments:

8. Robocopy.exe works just like copy and


Robocopy.exe works just like copy and move in GUI.
Student Response Value Correct Answer
False 100% False
Score: 6.25/6.25
Comments:
9. Copy and move permissions of a
Copy and move permissions of a file are always the same no matter where copied
.
Student Response Value Correct Answer
False 100% False
Score: 6.25/6.25
Comments:

10. Which additional permissions are


Which additional permissions are applied when you assign modofy permission? (c
hoose 2)
Student Response Value Correct Answer Feedback
1. Read 50%
2. Deny
3. Create
4. Execute 50%

Score: 6.25/6.25
Comments:

11. File sharing encryption can use all of


File sharing encryption can use all of the following except:
Student Response Value Correct Answer Feedback
1. 40-bit
2. 56-bit
3. 64-bit 100%
4. 128-bit
Score: 6.25/6.25
Comments:

12. What new feature is included


What new feature is included in Windows 7 that simplifies the process of shari
ng files on a small network?

Student Response Value Correct Answer Feedback


1. Shared folders
2. HomeGroups 100%
3. NetworkGroups
4. PeerGroup
Score: 6.25/6.25
Comments:

13. What file type can you set file and


What file type can you set file and folder permissions?
Student Response Value Correct Answer Feedback
1. FAT
2. NTFS 100%
3. Fat32
4. Fat16
Score: 6.25/6.25
Comments:

14. You can create a HomeGroup


You can create a HomeGroup on a domain network.
ans.
Student Response Value Correct Answer
False 100% False
Score: 6.25/6.25
Comments:

15. What can you use to tell how many


What can you use to tell how many and who are connected to your shared folders
?

Student Response Value Correct Answer Feedback


1. Shares node
2. Open Files node
3. Performance
4. Sessions node 100%
Score: 6.25/6.25
Comments:

16. What is a library?


What is a library?
Student Response Value Correct Answer Feedback
1. Folders
2. Collection
3. Virtualized Collection of Folders 100%
4. Books on a shelf
Score: 6.25/6.25
Comments:

chapter 9
1. What can you require to
What can you require to logon to ensure security? (Choose 2)
Student Response Value Correct Answer Feedback
1. Strong Password 50%
2. Logon
3. Smart Card 50%
4. Credit Card
Score: 10/10
Comments:
2. Promping for credentials require
Promping for credentials requires administrator to?
Student Response Value Correct Answer Feedback
1. Consent
2. Consider
3. Reply
4. Enter Password 100%
Score: 10/10
Comments:

3. Where does the Windows 7 Credential


Where does the Windows 7 Credential Manager store passwords?
Student Response Value Correct Answer Feedback
1. Security Access Manager (SAM)
2. On Credential Manager Server
3. Windows Vault 100%
4. In System Restore

Score: 10/10
Comments:

4. How many settings are available for UAC?


How many settings are available for UAC?
Student Response Value Correct Answer Feedback
1. 2
2. 3
3. 4 100%
4. 5
Score: 10/10
Comments:

5. How many policies are available


How many policies are available in the User Rights Assignment node of group po
licy?

Student Response Value Correct Answer Feedback


1. 4
2. 44 100%
3. 8
4. 24
Score: 10/10
Comments:

6. You can create a user reset


You can create a user reset password to a ?
Student Response Value Correct Answer Feedback
1. Floppy Disk
2. Restore partition
3. USB Drive 100%
4. New partition
Score: 10/10
Comments:

7. The Runas allows a user to?


The Runas allows a user to?
Student Response Value Correct Answer Feedback
1. Run a program with a different account 100%
2. Run all programs
3. Run instead of execute
4. No change when using Runas
Score: 10/10
Comments:

8. Complexity of password requires


Complexity of password requires at least __ of the following: lowercase, upper
case, numbers, symbols.
Student Response Value Correct Answer Feedback
1. 4
2. 3 100%
3. 2
4. 1
Score: 10/10
Comments:

9. Which of the following tools can users


Which of the following tools can users use to back up EFS certificates created
when they encrypt a file on a stand-alone computer running Windows 7? (Choose a
ll that apply)
Student Response Value Correct Answer Feedback
1. Credential Manager
2. Manage File Encryption tool 34%
3. Certificate Manager Console 33%
4. Cipher.exe 33%

Score: 10/10
Comments:

10. What group cannot be used to assign


What group cannot be used to assign specific rights in Group Policy in the bui
lt-in groups of Windows 7?
Student Response Value Correct Answer Feedback
1. Replicator
2. Power Users
3. Event Log Readers
4. Guest user 100%
Score: 10/10
chapter 10
1. Which of the following is not a VPN
Which of the following is not a VPN solution in use today prior to Windows 7?

Student Response Value Correct Answer Feedback


1. Point-to-Point Tunneling Protocol
2. Layer 2 Tunneling Protocol
3. Direct Access 100%
4. Secure Socket Tunneling
Score: 10/10
Comments:

2. Which Direct Access connection provides


Which Direct Access connection provides the poorest performance?

Student Response Value Correct Answer Feedback


1. IP-HTTPS 100%
2. Teredo
3. 6 to 4
4. Public IPv6 address
Score: 10/10
Comments:

3. You know you have made a successful


You know you have made a successful Direct Access connection by clicking on th
e Network Access icon and it says?
Student Response Value Correct Answer Feedback
1. Local and Internet Access
2. Local Access
3. Internet and Corporate Access 100%
4. Internet Access
Score: 10/10
Comments:

4. Not all editions of Windows 7 supports VPN


Not all editions of Windows 7 supports VPN
Student Response Value Correct Answer
False 100% False
Score: 10/10
Comments:

5. The most secure protocol for VPN


The most secure protocol for VPN is?
Student Response Value Correct Answer Feedback
1. PPTP
2. SSTP
3. L2TP/IPsec
4. IKEv2 100%
Score: 10/10
Comments:

6. Which of the following authentication


Which of the following authentication protocols can you use to connect to an I
KEv2 VPN? (Choose 3)
Student Response Value Correct Answer Feedback
1. PEAP 33%
2. EAP-MSCHAPv2 34%
3. Microsoft Smart Card or Certificate 33%
4. CHAP
Score: 10/10
Comments:

7. Which of the following is not a requiremen


Which of the following is not a requirement for Direct Access?
Student Response Value Correct Answer Feedback
1. Server must have two NIC's
2. Must have a direct connection to the internet
3. Must have a direct connection to corporate intranet
4. Must have hardware firewall 100%
Score: 10/10
Comments:

8. Direct Access is configured through


Direct Access is configured through?
Student Response Value Correct Answer Feedback
1. Automatic Configuration
2. Group Policy 100%
3. Manual Configuration
4. Connection manager kit

Score: 10/10
Comments:

9. NAP restricts access based on all


NAP restricts access based on all of the following except
Student Response Value Correct Answer Feedback
1. Anti virus up to date
2. No firewall enabled 100%
3. Automatic updates enabled
4. Anti spyware up to date
Score: 10/10
Comments:
10. Direct Access is automatic
Direct Access is automatic
Student Response Value Correct Answer
True 100% True
Score: 10/10
Comments:

chapter 11
1. Kim_Akers has an user account running
Kim_Akers has an user account running on Windows 7. The account is not a membe
r of the administrators group. Which of the following power settings ca Kim perf
orm? (Choose 3)
Student Response Value Correct Answer Feedback
1. Choose a different power plan 33%
2. Create a new power plan 34%
3. Change what the power buttons do 33%
4. Change the Require A Password On Wakeup Setting
Score: 10/10
Comments:

2. Which of the following BitLocker policies


Which of the following BitLocker policies should you configure to ensure that
BitLocker To Go Reader is available on all FAT-formatted removable devices prote
cted with BitLocker?
Student Response Value Correct Answer Feedback
1. Configure Use of Passwords for Removable Data Drives
2. Allow access to BitLocker-Protected Removable Data Drives from earlier vers
ions of Windows 100%
3. Choose How BitLocker-Protected Removable Drives can be Recovered
4. Control use of BitLocker on Removable Drives
Score: 10/10
Comments:

3. Which of the following policies should


Which of the following policies should you configure to allow a computer witho
ut a TPM chip that is running Windows 7 Enterprise to utilize BitLocker to prote
ct its hard drive?
Student Response Value Correct Answer Feedback
1. Require Additional Authentication at startup
2. Allow Enhanced PINs for startup 100%
3. Configure TPM Platform Validation Profile
4. Configure Minimum PIN Length for startup
Score: 10/10
Comments:
4. Transparent Caching is the same
Transparent Caching is the same as BranchCache
Student Response Value Correct Answer
False 100% False
Score: 10/10
Comments:

5. BitLocker is to protect computers


BitLocker is to protect computers running Windows 7 from online attacks
Student Response Value Correct Answer
False 100% False
Score: 10/10
Comments:

6. Which of the following is not a benefit


Which of the following is not a benefit of BitLocker?
Student Response Value Correct Answer Feedback
1. Prevents attacker from recovering data from a stolen computer
2. Protects the integrity of the boot environment
3. It makes hard disk disposal very difficult 100%
4. It simplifies hard disk disposal
Score: 10/10
Comments:

7. You cannot use BitLocker if you don't


You cannot use BitLocker if you don't have a TPM module
Student Response Value Correct Answer
False 100% False
Score: 10/10
Comments:

8. If Bitlocker is working properly then


If Bitlocker is working properly then all users can read files on the disk if
not otherwise encrypted
Student Response Value Correct Answer
True 100% True
Score: 10/10
Comments:

9. Which of the following tools can


Which of the following tools can you use to determine the identification strin
g assigned to a BitLocker-protected volume
Student Response Value Correct Answer Feedback
1. Manage-bde.exe 100%
2. Cipher.exe
3. Bcdedit.exe
4. Sigverif.exe
Score: 10/10
Comments:

10. Sync Center can be used for all


Sync Center can be used for all of the following except?
Student Response Value Correct Answer Feedback
1. Disable offline files
2. View offline files
3. Configure Encryption for offline files
4. Compress offline files 100%
Score: 10/10

chapter 12
1. Which policies should you configure if
Which policies should you configure if you want to use a WSUS server as a sour
ce instead of Microsoft Update servers?
Student Response Value Correct Answer Feedback
1. Turn off software notification
2. Automatic Updates Detection Frequency
3. Configure Automatic Updates
4. Specify Intranet Microsoft Update Service Location 100%
Score: 10/10
Comments:

2. Internet Explorer Compatibility View can


Internet Explorer Compatibility View can be enabled by clicking the broken pag
e icon.
Student Response Value Correct Answer
True 100% True

Score: 10/10
Comments:

3. Smart Screen Filter keeps people


Smart Screen Filter keeps people from viewing your screen except when straight
on
Student Response Value Correct Answer
False 100% False
Score: 10/10
Comments:
4. Which of the following actions should you
Which of the following actions should you take , after starting Internet Explo
rer third party Web sites do not track your browsing session?
Student Response Value Correct Answer Feedback
1. Start InPrivate Browsing session
2. Enable InPrivate filtering 100%
3. Disable Pop-up Blocker
4. Disable Smart Screen filter
Score: 10/10
Comments:

5. Which of the following is not an Internet


Which of the following is not an Internet Explorer security zone?
Student Response Value Correct Answer Feedback
1. Local Internet 100%
2. Trusted Sites
3. Restricted Sites
4. Internet

Score: 10/10
Comments:

6. When Windows 7 is configured according


When Windows 7 is configured according to its default settings, which of the f
ollowing Tasks can a standard user perform with respect to Windows Update?
Student Response Value Correct Answer Feedback
1. Uninstall updates
2. Install updates 100%
3. Change when updates are installed
4. Hide updates
Score: 10/10
Comments:

7. What are the two main sections in the Action


What are the two main sections in the Action Center?
(Choose Two)

Student Response Value Correct Answer Feedback


1. Firewall
2. Security 50%
3. Maintenance 50%
4. Virus Protection
Score: 10/10
Comments:

8. What tool can you use to to determine


What tool can you use to to determine if a particular software update is missi
ng from a client computer?
Student Response Value Correct Answer Feedback
1. Microsoft Update
2. WSUS
3. Group Policy Management
4. MBSA 100%
Score: 10/10
Comments:

9. If Windows 7 updates are set for 3 a.m.


If Windows 7 updates are set for 3 a.m. and the computer is off when will upda
tes occur?
Student Response Value Correct Answer Feedback
1. Never
2. 3 a.m.
3. 3 p.m.
4. When turned on 100%
Score: 10/10
Comments:

10. What are the three default security


What are the three default security levels?
Student Response Value Correct Answer Feedback
1. Medium 33%
2. Low 0%
3. High 34%
4. Medium-High
5. Medium-Low
Score: 6.7/10

chapter 13
1. You want use Performance Monitor to display
You want use Performance Monitor to display performance data captured in a DCS
. You open the tool and access Performance Monitor Properties dialog box. On whi
ch tab can you choose whether to display current activity in real time or log fi
les that you have saved using DCS?
Student Response Value Correct Answer Feedback
1. General
2. Source 100%
3. Data
4. Graph
5. Appearance
Score: 10/10
Comments:

2. You have a dual boot system and want


You have a dual boot system and want to make Windows 7 the default operating s
ystem. What tool do you use to accomplish
Student Response Value Correct Answer Feedback
1. Services Console
2. Performance Options
3. Task Manager
4. System Configuration 100%
Score: 10/10
Comments:

3. You are configuring a client running


You are configuring a client running Windows 7 named Canberra to retrieve even
ts from a computer Running Windows 7 named Aberdeen. Both computers are one the
same workgroup. Which of the following commands would you run on the collector c
omputer to configure Event Collector service?
Student Response Value Correct Answer Feedback
1. wecutil qc 100%
2. winrm qc
3. winrm qc -q
4. %SystemRoot%\System32\gpedit.msc
Score: 10/10
Comments:

4. Which Windows Performance Analysis


Which Windows Performance Analysis tool captures user and kernel traces and ca
n merge them to form a combined trace?
Student Response Value Correct Answer Feedback
1. Perfomance Analyzer
2. On/Off Transition Trace Capture
3. Trace Capture, Processing and Command-Line Analysis 100%
4. Visual Trace Analysis
Score: 10/10
Comments:

5. A client running Windows 7 is experiencing


A client running Windows 7 is experiencing intermittent performance problems.
You suspect the problems might be caused by an application that you recently ins
talled but can't remember exactly when. Which tool or feature would you use to d
etermine when the application was installed?
Student Response Value Correct Answer Feedback
1. Reliability Monitor 100%
2. Action Center
3. DCS's
4. Performance Monitor
Score: 10/10
Comments:

6. Which of the following are built-ins


Which of the following are built-ins in DCS's? (Choose 2)
Student Response Value Correct Answer Feedback
1. System Reliability
2. System Performance 50%
3. System Diagnostics 50%
4. System Monitor
Score: 10/10
Comments:

7. What WIM tool do you use to view


What WIM tool do you use to view Windows Management-generated events and event
information, such as the events date and time, class, point of origin, and desc
ription?
Student Response Value Correct Answer Feedback
1. WMI CIM Studio
2. WMI Object Browser
3. WMI Event Registration Tool
4. WMI Event Viewer 100%

Score: 10/10
Comments:

8. You have upgraded the hardware


You have upgraded the hardware on a computer. The Windows Experience Index gen
erates a new experience score. The subscores are as follows: Processpr 5.1, Memo
ry 3.3, Graphics 3.6, Gaming Graphics 2.3, Primary Hard Disk 5.3 What is the Win
dows Experience Base Score?
Student Response Value Correct Answer Feedback
1. 2.3 100%
2. 3.9
3. 3.3
4. 4.4
Score: 10/10
Comments:

9. You have a dual processor computer that


You have a dual processor computer that is using only one processor. How do yo
u ensure that these processes use whatever processor is available?
Student Response Value Correct Answer Feedback
1. Configure Process Affinity on the Processes tab of Task Manager 100%
2. Configure Priority Affinity on the Processes tab of Task Manager
3. Select Adjust for Best Performance of Programs on the Advanced tab of the Pe
rformance Options tool
4. Reconfigure Virtual Memory settings
Score: 10/10
Comments:

10. Which tool provided by Windows 7 helps


Which tool provided by Windows 7 helps you determine which applications are re
sponsible for activity on your hard disk, including which files and folders are
being accessed?
Student Response Value Correct Answer Feedback
1. Process Explorer
2. Resource Monitor 100%
3. Task Manager
4. Windows Experience Index
Score: 10/10
chapter 14
1. How many different Recovery tools
How many different Recovery tools are available?
Student Response Value Correct Answer Feedback
1. 3
2. 4
3. 5 100%
4. 6

Score: 10/10
Comments:

2. What file does Enable Boot Logging


What file does Enable Boot Logging create?
Student Response Value Correct Answer Feedback
1. Bootlog.txt
2. Ntbtlog.txt 100%
3. Ntbtlog.doc
4. Bootup.log
Score: 10/10
Comments:

3. Windows 7 backs up files even


Windows 7 backs up files even if they are open
Student Response Value Correct Answer
True 100% True

Score: 10/10
Comments:

4. Backup and Restore supports what


Backup and Restore supports what kind of backups? (Choose 2)
Student Response Value Correct Answer Feedback
1. Repair disk
2. Files and Folders 50%
3. System Restore
4. System Image 50%
Score: 10/10
Comments:
5. Advanced Recovery Methods may
Advanced Recovery Methods may not keep user data.
Student Response Value Correct Answer
True 100% True
Score: 10/10
Comments:

6. Where do you not want to place


Where do you not want to place your system backup?
Student Response Value Correct Answer Feedback
1. DVD-ROM
2. Network drive
3. A separate partition on your drive 100%
4. External hard drive
Score: 10/10
Comments:

7. System Restore does not backup


System Restore does not backup what?
Student Response Value Correct Answer Feedback
1. System Files
2. User Files 100%
3. Programs
4. Registry Settings
Score: 10/10
Comments:

8. Make sure that the Backup destination


Make sure that the Backup destination has BitLocker enabled.
Student Response Value Correct Answer
False 100% False

Score: 10/10
Comments:

9. What command can you use to disable


What command can you use to disable kernel debugging?
Student Response Value Correct Answer Feedback
1. bcedit /debug off
2. bcdedit /debug off 100%
3. bcdedit /debug kernel off
4. bcdedit /debug disable
Score: 10/10
Comments:
10. A System Image is a copy of folders
A System Image is a copy of folders on the system disk.
Student Response Value Correct Answer
False 100% False
Score: 10/10

You might also like