Chapter 7: Windows Operating System and File Management (Set-10)
Which NTFS feature can cause “Access denied” even when the user is in the correct group because a deny entry overrides allow
A B) File compression
B C) Indexing service
C A) Explicit Deny ACE
D D) Hidden attribute
In NTFS, an explicit Deny permission entry usually overrides Allow entries. Even if a user is in a permitted group, a Deny ACE can block access, so reviewing effective permissions is important.
When both Share permissions and NTFS permissions apply to a network folder, which rule is generally true for final access
A A) Most restrictive wins
B B) Most permissive wins
C C) Share overrides always
D D) NTFS ignored
For network access, Windows evaluates both share and NTFS permissions and applies the most restrictive combined result. This prevents unintended access if either permission set is tighter.
Which permission setting displays the combined result for a user after groups and inheritance are considered
A B) Basic attributes
B A) Effective Access
C C) Offline settings
D D) Quick Access
Effective Access (or Effective Permissions) shows the net result of permissions from user and group memberships plus inheritance. It helps troubleshoot why access is allowed or denied.
Which Windows recovery option is most appropriate when the PC boots but a recent driver broke stability
A B) Disk Cleanup
B C) Format drive
C D) Reset network
D A) System Restore
System Restore can roll back drivers and system settings to a restore point made earlier. It often fixes instability after driver updates while keeping personal files, though some installed apps may revert.
Which System Protection setting controls whether restore points are created for a drive
A A) Protection On/Off
B B) Wallpaper change
C C) Firewall rule
D D) DPI scaling
System Protection must be enabled for a drive so Windows can create restore points. If it is off, System Restore will not have points to roll back changes after updates or installs.
In Disk Management, which action converts a partition to a different file system and usually erases existing data
A B) Rename volume
B C) Change view
C A) Format volume
D D) Refresh list
Formatting writes a new file system structure to the volume. It usually removes existing file references, so it should be done only after backups and careful selection of the correct partition.
Which file system choice is most likely to fail when copying a single 6 GB file to a USB drive
A A) FAT32
B B) NTFS
C C) exFAT
D D) ReFS
FAT32 has a single-file size limit near 4 GB. Copying a 6 GB file will fail, so exFAT or NTFS should be used for large files on removable storage.
Which Windows feature allows encrypting files transparently at file system level on supported editions
A B) ZIP compression
B C) Hidden attribute
C D) Task view
D A) EFS encryption
Encrypting File System (EFS) can encrypt files/folders on NTFS so they are readable only by authorized accounts. It works transparently after sign-in but needs backups of encryption keys.
In file Properties, which tab would you open first to confirm if a file is encrypted or compressed on NTFS
A B) Sharing tab
B C) Customize tab
C A) General tab
D D) Details tab
The General tab includes Advanced attributes where “Compress contents” and “Encrypt contents” options appear. It’s the quickest place to verify whether NTFS compression or EFS encryption is enabled.
Which Windows setting controls which app opens HTTP links by default
A A) Default apps
B B) Storage Sense
C C) Windows Update
D D) Device Manager
Default apps settings define the default browser and link handlers. This controls which app opens web links and can be changed after installing new browsers or resetting defaults.
Which built-in security feature warns before running an unrecognized downloaded app based on reputation
A B) File History
B A) SmartScreen
C C) Disk Cleanup
D D) Magnifier
SmartScreen checks reputation for apps and sites and warns about suspicious downloads. It helps reduce malware risk by preventing users from easily running unknown or unsafe applications.
Which Windows tool is best for analyzing repeated system crashes by checking logged error events
A B) Notepad
B C) Paint
C A) Event Viewer
D D) Calculator
Event Viewer stores system and application logs with error codes and timestamps. Reviewing these logs helps identify failing drivers, services, or apps causing repeated crashes.
Which Event Viewer log most commonly records driver failures and service startup issues
A A) System log
B B) Security log
C C) Setup log
D D) Clipboard log
The System log includes events from drivers and Windows services. It is often checked for boot problems, device errors, and service failures, providing clues for troubleshooting.
Which command shows active network connections and listening ports from Command Prompt
A B) ipconfig
B C) tasklist
C D) tree
D A) netstat
netstat shows network connections, listening ports, and related statistics. It helps detect suspicious connections, confirm services are listening, and troubleshoot connectivity issues at a deeper level.
Which command shows detailed IP settings including DNS servers on many systems
A B) ipconfig /flush
B A) ipconfig /all
C C) ping /all
D D) dir /all
ipconfig /all displays detailed network information like DNS servers, MAC address, DHCP status, and lease times. It is useful when basic ipconfig output is not enough.
Which command can flush the DNS resolver cache to fix name-resolution issues
A B) ipconfig /renew
B C) taskkill /f
C A) ipconfig /flushdns
D D) netstat /a
Flushing DNS clears cached domain entries. This can fix issues caused by outdated or incorrect cached records, forcing Windows to query DNS servers again for fresh resolution.
Which Command Prompt tool lists running processes and is useful when Task Manager cannot open
A A) tasklist
B B) dir
C C) cls
D D) cd
tasklist displays a list of running processes and their PIDs. It helps identify stuck apps or unknown processes and supports command-line troubleshooting when the GUI is unresponsive.
Which command can force-close a frozen app when you know its process name
A B) attrib
B C) xcopy
C A) taskkill
D D) chkdsk
taskkill terminates a process by name or PID. It is effective for frozen apps, but it can cause loss of unsaved data, so it should be used only when necessary.
Which Windows protection feature prompts for permission when an app tries to change system settings
A B) Sticky Keys
B C) Screen saver
C D) Magnifier
D A) User Account Control
UAC reduces risk by requiring consent (and sometimes admin credentials) for system-level changes. It helps prevent silent installs and unauthorized modifications by malware or standard users.
Which account type typically cannot install system-wide software without admin approval
A A) Standard user
B B) Administrator
C C) Built-in SYSTEM
D D) TrustedInstaller
Standard users have limited privileges. They can run apps and change personal settings, but installing system-wide software or changing protected settings usually requires administrator permission.
Which Windows tool is most suitable for disabling a startup program while also seeing “startup impact”
A B) Disk Management
B A) Task Manager
C C) Control Panel
D D) Device Manager
Task Manager’s Startup tab lists startup programs and shows impact ratings like low or high. Disabling unnecessary items can improve boot speed and reduce background resource usage.
Which keyboard shortcut opens the Task Manager fastest without additional screens
A B) Ctrl+Alt+Del
B C) Alt+Tab
C A) Ctrl+Shift+Esc
D D) Win+Tab
Ctrl+Shift+Esc launches Task Manager directly. It is useful when the system is slow, because it avoids the extra menu shown by Ctrl+Alt+Del.
Which Windows key shortcut opens clipboard history when it is enabled
A A) Win + V
B B) Win + C
C C) Ctrl + V
D D) Alt + V
Win+V opens clipboard history and shows multiple copied items. It improves productivity by allowing you to paste older content without copying again.
Which Windows feature can prevent ransomware by blocking unauthorized changes to protected folders
A B) Task view
B A) Controlled folder access
C C) Storage Sense
D D) Night light
Controlled folder access limits which apps can modify protected folders like Documents. It helps reduce ransomware damage by stopping untrusted programs from encrypting or changing important files.
Which file attribute setting hides files but does not secure them from other users with access
A B) NTFS permissions
B C) EFS encryption
C D) Firewall rules
D A) Hidden attribute
Hidden only affects visibility in normal views. It does not protect data from access. Real protection requires NTFS permissions or encryption, especially on shared computers.
Which Windows mechanism applies parent folder permissions automatically to subfolders and files
A B) File indexing
B C) Disk caching
C A) Permission inheritance
D D) Display scaling
Inheritance copies parent permissions to child items. It simplifies security management but can also spread incorrect permissions widely, so changes should be reviewed carefully before applying.
Which File Explorer feature shows whether a file is “Read-only” or “Hidden” quickly in Properties
A A) Attributes
B B) Ownership
C C) Sharing level
D D) DNS settings
Attributes in Properties show flags like Read-only and Hidden. They control basic behavior and visibility but are not the same as NTFS permissions, which control user access rights.
Which operation is safest to avoid breaking application shortcuts when reorganizing installed program folders
A B) Rename drive letter
B A) Avoid moving Program Files
C C) Convert to FAT32
D D) Disable indexing
Moving installed program folders can break shortcuts, registry references, and update paths. Proper uninstall/reinstall or using supported relocation methods is safer than manual folder moving.
Which Windows feature helps find files faster by maintaining a searchable index database
A B) ZIP compression
B C) Task view
C A) Windows Search indexing
D D) Print spooler
Indexing stores file and content references in a database to speed searches. It can improve performance in large libraries, though indexing too many locations may use extra disk and CPU.
Which file path beginning with “\Server\Share” is best described as
A A) UNC path
B B) Relative path
C C) Short path
D D) Root path
A UNC path specifies a network resource location using \Server\Share. It avoids drive-letter mapping and is commonly used for shared folders in business networks.
Which keyboard method selects multiple adjacent files in Explorer efficiently
A B) Ctrl selection
B C) Alt selection
C D) Esc selection
D A) Shift selection
Shift selection chooses a continuous range between two points. It is useful for selecting many files in order, such as a block of images or documents for copying or deletion.
Which keyboard method selects multiple non-adjacent files in Explorer
A A) Ctrl selection
B B) Shift selection
C C) Alt selection
D D) Tab selection
Ctrl selection lets you pick individual files that are not next to each other. This avoids selecting unwanted files in between, making selective copying or deletion easier.
Which File Explorer action can show file extensions to reduce risk of disguised malware
A B) Hide taskbar
B C) Disable firewall
C A) Enable extensions view
D D) Turn off UAC
Showing extensions reveals true file types like .exe. This helps spot dangerous files disguised as documents and reduces the chance of opening malware by mistake.
Which Windows built-in feature reduces disruptions by silencing notifications during set times
A B) Sticky Keys
B A) Focus assist
C C) Magnifier
D D) Task Scheduler
Focus assist filters notifications by mode (priority-only or alarms-only) and can be scheduled. It prevents pop-ups during meetings or presentations while still allowing urgent alerts if configured.
Which Windows setting adjusts size of text and UI without changing resolution
A B) Screen saver
B C) Power plan
C D) Default apps
D A) Display scaling
Scaling makes text and interface elements larger or smaller while keeping the same resolution. It improves readability on high-resolution screens without making the display blurry.
Which tool shows detailed BIOS and hardware component information for troubleshooting
A A) System Information
B B) Device Manager
C C) Disk Cleanup
D D) Paint
System Information (msinfo32) shows detailed hardware resources, BIOS version, components, and software environment. It is useful for diagnosing issues and providing accurate system specs.
Which Run command opens System Information quickly
A B) msconfig
B C) mspaint
C A) msinfo32
D D) mstsc
Typing msinfo32 in Run opens System Information. It provides detailed reports about hardware, BIOS, drivers, and system environment useful for advanced troubleshooting.
Which Windows tool is best to manage “default printer” selection in Settings
A B) Device Manager
B A) Printers & scanners
C C) Disk Management
D D) Event Viewer
Printers & scanners settings let you add/remove printers and set a default printer. It also helps access queues and troubleshoot printing issues from one central location.
Which Windows feature stores deleted files temporarily so they can be restored easily
A A) Recycle Bin
B B) Task Scheduler
C C) Clipboard history
D D) Safe mode
Recycle Bin holds deleted items until emptied. Restoring returns them to the original folder, which provides simple recovery from accidental deletions without special software.
Which delete method typically bypasses Recycle Bin and deletes immediately
A B) Delete key
B C) Ctrl + Delete
C A) Shift + Delete
D D) Alt + Delete
Shift+Delete deletes files without placing them in Recycle Bin. It is more permanent and risky, so it should be used only when you are sure the file is not needed.
Which system tool shows a list of installed updates and can help identify a recently installed patch
A B) File History
B C) Disk Defrag
C D) Task View
D A) Update history
Update history lists installed Windows updates with dates and sometimes details. It helps determine whether a recent update may have caused problems and supports troubleshooting steps like uninstalling.
Which Windows option helps remove large amounts of temporary storage automatically over time
A B) SmartScreen
B A) Storage Sense
C C) Narrator
D D) Sticky Keys
Storage Sense can automatically clear temporary files and manage Recycle Bin content. It helps avoid running out of disk space without needing manual cleanup frequently.
Which shortcut captures a selected screen area and copies it to clipboard
A A) Win+Shift+S
B B) Win+Shift+E
C C) Ctrl+Shift+S
D D) Alt+Shift+S
Win+Shift+S opens the snipping overlay for region capture. The image goes to clipboard and can be pasted into email, chat, or documents quickly.
Which shortcut shows open windows and virtual desktops in a grid view
A B) Alt + Tab
B C) Win + D
C A) Win + Tab
D D) Win + E
Win+Tab opens Task View, showing all open windows and virtual desktops. It supports switching, organizing, and moving windows between desktops for better workflow management.
Which Windows feature helps prevent accidents by requiring confirmation before apps change system settings
A A) UAC prompts
B B) ZIP folders
C C) Desktop icons
D D) Screen scaling
UAC prompts appear when an action needs elevated rights. They help prevent silent changes, reduce malware impact, and ensure the user approves important system modifications.
Which Windows file action changes only the file name label, not file contents
A B) Copy
B C) Move
C D) Compress
D A) Rename
Renaming changes how the file is labeled in the folder. It does not change the file data, but changing extensions can confuse Windows and may stop the file opening properly.
Which File Explorer action creates a duplicate file in another folder
A B) Move
B A) Copy
C C) Delete
D D) Lock
Copy places a duplicate of the file in a destination while keeping the original. It is useful for backups and sharing, and is safer than move when unsure.
Which File Explorer action changes location and removes file from old folder
A B) Copy
B C) Rename
C A) Move
D D) Search
Move relocates the file to a new folder and removes it from the old one. After moving, shortcuts or programs referencing the old path may need updating.
Which Windows feature helps you troubleshoot a device problem by updating or rolling back drivers
A A) Device Manager
B B) Disk Cleanup
C C) File History
D D) Task View
Device Manager shows device status and driver details. You can update drivers, disable devices, or roll back to an earlier driver version if a new driver causes problems.
Which Windows tool blocks unauthorized traffic and can allow apps through with rules
A B) Disk Management
B C) Settings app
C A) Windows Firewall
D D) Control Panel
Windows Firewall filters network traffic using rules. You can allow or block apps, helping secure the device while still permitting necessary network communication for trusted programs.