Chapter 7: Windows Operating System and File Management (Set-10)

Which NTFS feature can cause “Access denied” even when the user is in the correct group because a deny entry overrides allow

A B) File compression
B C) Indexing service
C A) Explicit Deny ACE
D D) Hidden attribute

When both Share permissions and NTFS permissions apply to a network folder, which rule is generally true for final access

A A) Most restrictive wins
B B) Most permissive wins
C C) Share overrides always
D D) NTFS ignored

Which permission setting displays the combined result for a user after groups and inheritance are considered

A B) Basic attributes
B A) Effective Access
C C) Offline settings
D D) Quick Access

Which Windows recovery option is most appropriate when the PC boots but a recent driver broke stability

A B) Disk Cleanup
B C) Format drive
C D) Reset network
D A) System Restore

Which System Protection setting controls whether restore points are created for a drive

A A) Protection On/Off
B B) Wallpaper change
C C) Firewall rule
D D) DPI scaling

In Disk Management, which action converts a partition to a different file system and usually erases existing data

A B) Rename volume
B C) Change view
C A) Format volume
D D) Refresh list

Which file system choice is most likely to fail when copying a single 6 GB file to a USB drive

A A) FAT32
B B) NTFS
C C) exFAT
D D) ReFS

Which Windows feature allows encrypting files transparently at file system level on supported editions

A B) ZIP compression
B C) Hidden attribute
C D) Task view
D A) EFS encryption

In file Properties, which tab would you open first to confirm if a file is encrypted or compressed on NTFS

A B) Sharing tab
B C) Customize tab
C A) General tab
D D) Details tab

Which Windows setting controls which app opens HTTP links by default

A A) Default apps
B B) Storage Sense
C C) Windows Update
D D) Device Manager

Which built-in security feature warns before running an unrecognized downloaded app based on reputation

A B) File History
B A) SmartScreen
C C) Disk Cleanup
D D) Magnifier

Which Windows tool is best for analyzing repeated system crashes by checking logged error events

A B) Notepad
B C) Paint
C A) Event Viewer
D D) Calculator

Which Event Viewer log most commonly records driver failures and service startup issues

A A) System log
B B) Security log
C C) Setup log
D D) Clipboard log

Which command shows active network connections and listening ports from Command Prompt

A B) ipconfig
B C) tasklist
C D) tree
D A) netstat

Which command shows detailed IP settings including DNS servers on many systems

A B) ipconfig /flush
B A) ipconfig /all
C C) ping /all
D D) dir /all

Which command can flush the DNS resolver cache to fix name-resolution issues

A B) ipconfig /renew
B C) taskkill /f
C A) ipconfig /flushdns
D D) netstat /a

Which Command Prompt tool lists running processes and is useful when Task Manager cannot open

A A) tasklist
B B) dir
C C) cls
D D) cd

Which command can force-close a frozen app when you know its process name

A B) attrib
B C) xcopy
C A) taskkill
D D) chkdsk

Which Windows protection feature prompts for permission when an app tries to change system settings

A B) Sticky Keys
B C) Screen saver
C D) Magnifier
D A) User Account Control

Which account type typically cannot install system-wide software without admin approval

A A) Standard user
B B) Administrator
C C) Built-in SYSTEM
D D) TrustedInstaller

Which Windows tool is most suitable for disabling a startup program while also seeing “startup impact”

A B) Disk Management
B A) Task Manager
C C) Control Panel
D D) Device Manager

Which keyboard shortcut opens the Task Manager fastest without additional screens

A B) Ctrl+Alt+Del
B C) Alt+Tab
C A) Ctrl+Shift+Esc
D D) Win+Tab

Which Windows key shortcut opens clipboard history when it is enabled

A A) Win + V
B B) Win + C
C C) Ctrl + V
D D) Alt + V

Which Windows feature can prevent ransomware by blocking unauthorized changes to protected folders

A B) Task view
B A) Controlled folder access
C C) Storage Sense
D D) Night light

Which file attribute setting hides files but does not secure them from other users with access

A B) NTFS permissions
B C) EFS encryption
C D) Firewall rules
D A) Hidden attribute

Which Windows mechanism applies parent folder permissions automatically to subfolders and files

A B) File indexing
B C) Disk caching
C A) Permission inheritance
D D) Display scaling

Which File Explorer feature shows whether a file is “Read-only” or “Hidden” quickly in Properties

A A) Attributes
B B) Ownership
C C) Sharing level
D D) DNS settings

Which operation is safest to avoid breaking application shortcuts when reorganizing installed program folders

A B) Rename drive letter
B A) Avoid moving Program Files
C C) Convert to FAT32
D D) Disable indexing

Which Windows feature helps find files faster by maintaining a searchable index database

A B) ZIP compression
B C) Task view
C A) Windows Search indexing
D D) Print spooler

Which file path beginning with “\Server\Share” is best described as

A A) UNC path
B B) Relative path
C C) Short path
D D) Root path

Which keyboard method selects multiple adjacent files in Explorer efficiently

A B) Ctrl selection
B C) Alt selection
C D) Esc selection
D A) Shift selection

Which keyboard method selects multiple non-adjacent files in Explorer

A A) Ctrl selection
B B) Shift selection
C C) Alt selection
D D) Tab selection

Which File Explorer action can show file extensions to reduce risk of disguised malware

A B) Hide taskbar
B C) Disable firewall
C A) Enable extensions view
D D) Turn off UAC

Which Windows built-in feature reduces disruptions by silencing notifications during set times

A B) Sticky Keys
B A) Focus assist
C C) Magnifier
D D) Task Scheduler

Which Windows setting adjusts size of text and UI without changing resolution

A B) Screen saver
B C) Power plan
C D) Default apps
D A) Display scaling

Which tool shows detailed BIOS and hardware component information for troubleshooting

A A) System Information
B B) Device Manager
C C) Disk Cleanup
D D) Paint

Which Run command opens System Information quickly

A B) msconfig
B C) mspaint
C A) msinfo32
D D) mstsc

Which Windows tool is best to manage “default printer” selection in Settings

A B) Device Manager
B A) Printers & scanners
C C) Disk Management
D D) Event Viewer

Which Windows feature stores deleted files temporarily so they can be restored easily

A A) Recycle Bin
B B) Task Scheduler
C C) Clipboard history
D D) Safe mode

Which delete method typically bypasses Recycle Bin and deletes immediately

A B) Delete key
B C) Ctrl + Delete
C A) Shift + Delete
D D) Alt + Delete

Which system tool shows a list of installed updates and can help identify a recently installed patch

A B) File History
B C) Disk Defrag
C D) Task View
D A) Update history

Which Windows option helps remove large amounts of temporary storage automatically over time

A B) SmartScreen
B A) Storage Sense
C C) Narrator
D D) Sticky Keys

Which shortcut captures a selected screen area and copies it to clipboard

A A) Win+Shift+S
B B) Win+Shift+E
C C) Ctrl+Shift+S
D D) Alt+Shift+S

Which shortcut shows open windows and virtual desktops in a grid view

A B) Alt + Tab
B C) Win + D
C A) Win + Tab
D D) Win + E

Which Windows feature helps prevent accidents by requiring confirmation before apps change system settings

A A) UAC prompts
B B) ZIP folders
C C) Desktop icons
D D) Screen scaling

Which Windows file action changes only the file name label, not file contents

A B) Copy
B C) Move
C D) Compress
D A) Rename

Which File Explorer action creates a duplicate file in another folder

A B) Move
B A) Copy
C C) Delete
D D) Lock

Which File Explorer action changes location and removes file from old folder

A B) Copy
B C) Rename
C A) Move
D D) Search

Which Windows feature helps you troubleshoot a device problem by updating or rolling back drivers

A A) Device Manager
B B) Disk Cleanup
C C) File History
D D) Task View

Which Windows tool blocks unauthorized traffic and can allow apps through with rules

A B) Disk Management
B C) Settings app
C A) Windows Firewall
D D) Control Panel

Leave a Reply

Your email address will not be published. Required fields are marked *