Client Pro Midterm Question Chap 1 - 7

¡Supera tus tareas y exámenes ahora con Quizwiz!

Key Management Services (KMS) activation

Commercial-Volume Licensing

Office deployment is managed from the Office 365 Admin center. What can be done from the Dashboard on Admin center? (Select two.)

Configure Office 365 services through Service Settings. Perform administrative tasks like managing users

Which of the following tasks is associated with the Session layer?

Connection establishment

Which protocol is used to securely browse a website? HTTPS SSH ARP UDP SIP

HTTPS

A user made some modifications on the Advanced tab in Internet Explorer's Internet Options, and now she is having some problems. How do you restore the default Internet Properties settings with the least amount of effort?

In Internet Options on the Advanced tab, click Restore advanced settings

You have a large TCP/IP network and want to keep a host's real time clock synchronized. What protocol should you use? NNTP SMTP SAP SNMP NTP

NTP

You manage a Windows network environment. As part of your IPv6 migration strategy, you have implemented Teredo on your network. You would like to test the communication of a client computer using Teredo. What should you do?

Ping the address beginning with 2001:

Boot from VHD

Pro and Enterprise

Your company has developed and implemented countermeasures for the greatest risks to their assets. However, there is still some risk left. What is the remaining risk called?

Residual risk

You are working on a computer running Windows 10, it is part of a domain. You recently installed Windows 10 Pro. After installation, you are not able to connect to resources on the network. You check Device Manager and see the dialog shown below. (ADBEWK503 is highlighted) What should you do?

Right-click the Broadcom NetXtreme Gigabit Controller and select Update Driver.

After completing a clean installation of Windows 10, you realize your computer is unable to connect to the network. You decide to open Device Manager to see if you can identify the problem. Based on this screenshot of Device Manager, which action should you take to resolve the issue? (The issue is RealTek RTL8139C Fast Ethernet Controller's driver is unavailable.)

Right-click the RealTek RTL8139C Fast Ethernet Controller and click Update Driver Software.

Which steps must you take to uninstall an app you installed from the Windows Store?

Right-click the app tile and click Uninstall

A OneDrive for business account is configured, it's running without problems, and the sync is up-to-date.

Solid blue cloud

You're not signed in or OneDrive setup hasn't completed.

Solid gray cloud

OneDrive is running without problems, and the sync is up-to-date.

Solid white cloud

You need to develop and then install a sideloaded app on the Windows 10 Professional systems within your organization. Which of the following are true regarding this process? (Select two.)

The app may be digitally signed using a self-signed certificate minted by Active Directory Certificate Services on a Windows server. Sideloading must be enabled on the Windows 10 Professional systems using the Settings app.

What is the purpose of using Windows Autopilot?

To make the deployment and management of new Windows 10 new devices easier.

Your Windows workstation has an IP address of 192.168.1.25 assigned to it with a subnet mask of 255.255.255.0. It also has a DNS server address of 137.65.1.10, and it has a default gateway router address of 192.168.1.254 Your workstation needs to send a file to a server that has an IP address of 192.168.2.1 and a subnet mask of 255.255.255.0 Where will the packets be sent first?

To the default gateway router

Which Internet Explorer security feature restricts the browsing session information that can be tracked by external third-arty websites and applications?

Tracking Protection

When working from within the Settings app, some applications include an Advanced options link. Selecting this link allows you to view more details about the application as well as giving you the ability to perform which of the following tasks? (Select two.)

Uninstalling the app Setting the default app

You have fifteen Windows 10 computers in a workgroup. Your task is to create a Local User account on each computer called BackupAdmin. The account must be part of the Backup Operators Group. What should you do?

Use Windows Configuration Designer to create a provisioning package. Run the package on each computer.

Enter the name of the tool that generates an alert when a task or operation requires administrative privileges.

User Account Control

How are provisioning packages distributed?

Using a USB flash drive.

Which of the following offers the weakest form of encryption for an 802.11 wireless network?

WEP

Which of the following editions of Windows 10 is described below? Runs on standard desktop computers and notebooks based on the Intel-compatible x86/x64 architecture Supports traditional desktop applications as well as apps from the Windows Store. Built-in apps include Mail,Calendar,Photos and Microsoft Edge. Cannot connect to a corporate network.

Windows 10 Home

Drag and Drop each component on the left to its description on the right.

Windows SIM: Creates and manages answer files. Sysprep: Removes machine specific information. DISM: Command line tool that can be used to manually capture, modify, and deploy a Windows image. Windows Configuration Designer: Creates provisioning packages. WinPE: A bare minimum version of Windows that can boot a system.

Which service allows a device to set up to a higher version of Windows?

Windows Subscription Activation

How can you add storage space to your OneDrive account?

You can purchase more storage for a monthly-fee

When piloting a deployment, which actions should you consider taking? (select two.)

You should check all third-party encryption tools and switch to BitLocker if needed You should test deployments with small groups

-e

displays Ethernet statistics

netsh

displays TCP/IP information for both IPv4 and IPv6 addresses.

Event Viewer

logs significant events on a computer such as when a process encounters an error.

You want to access your OneDrive account using a web browser. Which URL would you use?

onedrive.live.com

nslookup

resolves the IP address of a hostname

What is the Windows Configuration Designer

A tool used to create provisioning packages

What is the average number of times that a specific risk is likely to be realized in a single year?

Annualized rate of occurrence

Which of the following is an important aspect of evidence gathering?

Backing up all log files and audit trails

You have downloaded a custom app from a vendor that you want to sideload. In PowerShell, you have used the import-module appx and add-appxpackage cmdlets, but you are getting an error. What should you do next?

Check for the root certificate and verify the digital signature for the app.

Software that should be installed on a specific computer

Computer Configuration Policies

If you need to customize the files gathered from the standard user profile folders to be migrated, it is recommended that you edit which of the following files?

Config.xml

You are creating a reference Windows 10 image that will be used on 100 computers. Each of these systems needs a custom app to be sideloaded. Which tool is used to add the sideloaded app package to the image?

Deployment Image Servicing and Management

Which Settings app category would you use to configure accommodations for users with impaired vision or hearing

Ease of Access

A user has complained about not being able to remove a program that is no longer needed on a computer. The Programs and Features page is not available in Control Panel. You suspect that a policy is enabled that hides this page from the user. But after opening the Local Group Policy Editor, you see that the Hide Programs and Features page is set to Not Configured. You know that other users in this domain can access the Programs and Features page. To determine whether the policy is enable, where should you look next?

GPOs linked to organizational units that contain this user's object.

This tool allows a business to create a private store and load it with just the apps needed for their business. What is this tool called?

Microsoft Store for Business

Standard user accounts have the rights and privileges required to perform which of the following tasks? (Select two.)

Modify advanced display settings Troubleshoot network connectivity

Which of the following functions are performed at the Physical layer of the OSI model?

Moving data across networking cables

Your job requires a considerable amount of travel. While working in your office, you use a Windows desktop system. While on the road, you use a Windows tablet device. While traveling, you frequently need to access files stored on the desktop system from your tablet device. Which Windows service can you implement to use your tablet to access files stored on the desktop?

OneDrive

The file or folder has settings that prevent it from syncing.

Padlock

You want to implement 802.1x authentication on your wireless network. Which of the following will be required?

RADIUS

In the OSI model, what is the primary function of the Network layer?

Routes messages between networks

Which of the following are prerequisites to set up a Microsoft Store for Business? (Select three.)

The organization must have a Microsoft Azure Directory domain configured. Each employee must have their own Azure AD user account All employees must be running Windows 10.

If you want to change the background, color, sounds, and mouse cursor at the same time, you might consider using which of the following Personalization options found in the Settings app

Theme

Purchasing insurance is what type of response to risk?

Transference

Which OSI model layer is responsible for guaranteeing reliable message delivery?

Transport

Windows Network Diagnostics

attempts to diagnose connection problems and present possible solutions

-r

displays the routing table

In the OSI Model, which of the following functions are performed at the Application Layer?

-Integration of network functionality into the host operating system -Enabling communication between network clients and services

The file has been download to your local computer.

A white circle with a green border and green checkmark

Which Blu-ray standard defines rewritable disks?

BD-RE

This signifies that a sync is in progress. This includes uploading files or when OneDrive is syncing new files from the cloud to your device.

Cloud icon with arrows forming in a circle

What is a collection of related domain trees?

Forest

Which method can you use to verify that a bit-level image copy of a hard drive is an exact clone of the original hard drive collected as evidence?

Hashing

Cortana

Home,Pro, and Enterprise

Which of the following is *not* an accepted countermeasure to strengthen a cryptosystem?

Keep the cryptosystem a secret

Does not change the current setting for the policy

Not Configured

Your account is blocked.

OneDrive icon with a red "no entry" icon

You want to deploy Windows 10 to multiple computers using a system image. You would like to use an answer file to automate the installation process of a reference computer. What should you do first?

Run Windows System Image Manager (Windows SIM)

The Hide Programs and Features page setting is configured for a specific user as follows: Local Group Policy----> Enabled Default Domain Policy GPO ---> Not Configured GPO linked to the user's organizational unit ---> Disabled After logging in, the user is able to see the Programs and Features page. Why does this happen?

The GPO linked to the user's organizational unit is applied last, so that this setting takes precedence.

Internet Explorer user settings

User Configuration policies

Scripts that should run at logon or logoff

User Configuration policies

Software that should be installed for a specific user

User Configuration policies

Windows Autopilot depends on a variety of internet-based variety. Access to these services must be provided for Autopilot to function properly. Which of the following should you ensure are applied in order to achieve proper Autopilot functionality? (Select two.)

Using DNS name resolution for internet DNS names Having access to all hosts via ports 80,443, and 123

What is the best definition of a security incident?

Violation of a security policy

tracert

tests connectivity between two devices and displays the path between them.

In the OSI Model, which of the following functions are performed at the Presentation Layer?

-Encrypt and compress data -Specify data format (such as file formats)

The Data Link Layer of the OSI model is comprised of two sublayers. What are they?

-MAC (media access control) -LLC (logical link control)

Which of the following functions are performed by the OSI Transport Layer?

-Reliable message delivery -End-to-end flow control -Date segmentation and reassembly

Which of the following are optical storage devices? 1.) BD 2.) SDHC 3.) CD 4.) USB flash drive 5.) DVD 6.) SSD 7.) HDD

1.) BD 3.) CD 5.) DVD

Which data transmission rate is defined by the IEEE 802.1 1b wireless standard?

11 Mbps

Assuming the network is indicated by the default portion of the IP address, which three of the following IP addresses belong to the class A network 114.0.0.0? (3)

114.0.0.15 114.122.66.12 114.58.12.0

You've decided to use a subnet mask of 255.255.192.0 on the 172.17.0.0 network to create four seperate subnets. Which network IDs will be assigned to these subnets in this configuration? (2 answers)

172.17.128.0 172.17.0.0

You are designing a wireless network for a client. Your client needs the network to support a data rate of at least 54 Mbps. In addition, the client already has a wireless telephone system installed that operates at 2.4 GHz. Which 802.11 standards can be used in this situation? (Select two.)

802.11 a 802.11n

You manage a server that uses an IP address of 192.168.255.188 with a mask of 255.255.0.0 Which of the following describes the address type?

Classless

You are performing an installation of Windows 10 on a desktop PC that uses a newly configured RAID 1 disk array. You booted the system from the Windows 10 installation DVD and navigated through the first few screens of the installation wizard. You've reached the following screen. What action should you take?

Click Custom: Install Windows only (Advanced)

Microsoft Active Directory activation

Commercial-Volume Licensing

Can be written, read many times, erased, rewritten, and has a capacity of about 650 MB.

Compact Disc (CD-RW)

First developed to store digital music. Later, was adapter to store digital computer data.

Compact disc (CD)

Network communication security settings

Computer Configuration policies

How can a criminal investigator ensure the integrity of a removable media device found while collecting evidence?

Create a checksum using a hashing algorithm

Using a USB flash drive, you intend to install Windows 10 on several computers. To save time, you would like to automate the installation of Windows 10 for each computer. What should you do?

Create an answer file names unattend.xml. Place the file on a USB flash drive and run setup.exe.

Which of the following measures will make your wireless network invisible to the casual attacker?

Disable SSID broadcast

Prevents the policy from being enforced

Disabled

You are conducting a forensic investigation. The attack has been stopped. Which of the following actions should you perform first?

Document what's on the screen

What is a collection of network resources?

Domain

Your company has asked you to look at strategies for migrating from IPv4 to IPv6. Instead of using IPv6 only, you decided you want to allow hosts to use both IPv4 and IPv6 addresses. Which of the following technologies should you implement to allow hosts to use both IPv4 and IPv6 at the same time?

Dual Stack

How do you configure your Windows system to prompt for additional credentials whenever a sensitive action is taken?

Edit User Account Control (UAC) settings

You are asked to recommend an email retreival protocol for a company's sales team. The sales team needs to access email form various locations and possibly different computers. The sales team does not want to worry about transferring email messages or files back and forth between these computers. Which email protocol is designed for this purpose? MFTP POP3 IMAP4 POP4 SMTP

IMAP4

You manage a Windows computer that is being used by multiple people. One of the users installs a new Internet Explorer add-on that interferes with the browsing functionality of other users on the system, but the add-on is necessary for business purposes. What should you do?

Instruct the other users to log on and disable the add-on

You are using the Privacy category found in the Settings App. If you do not want to send your browsing habits to Microsoft, which option would you turn off?

Let apps use advertising ID to make ads more interesting to you based on your app activity.

You manage the network for your company. You have recently discovered information on a computer hard drive that might indicate evidence of illegal activity. You want to perform forensic activities on the disk to see what kind of information it contains. What should you do first?

Make a bit-level copy of the disk

Hardware manufacturer activation

OEM-Preinstalled

A file or folder cannot be synced.

OneDrive icon with a solid red circle containing a white X

Encrypting File System

Pro and Enterprise

Prior to installing some software on your Windows system, you turn off User Account Control (UAC), reboot the computer, and install the software. You turn UAC back on, but it does not prompt you before performing sensitive actions. How do you make UAC protection work again?

Reboot the machine

Your company has just acquired another company in the same city. You need to integrate the two email systems so that messages can be exchanged between the email servers. Currently, each network uses an email package from a different vendor. Which TCP/IP protocol witl enable message exchange between systems? POP3 FTP ICMP IMAP4 SMTP

Simple mail transfer protocol (SMTP).

Which of the following statements are true regarding creating user accounts? (Select two.)

The Computer Management method allows you to restrict the user from changing their password. The Windows settings app requires you to create three security questions

You have a Windows 10 device that is part of a workgroup. You want to be able to install custom apps directly to a device without going through the Windows Store. What do you do?

Use sideloading to install the apps

You need an app for employees to manage their time off requests with human resources. You find an app that fits your needs perfectly from a website called freeapps4u.ru. You know you could download the app and sideload it onto the Windows 10 devices. What should you do?

Verify that the app is from a trusted source

-p

shows connections for a specific protocol

ping

verifies IP connectivity between two nodes in a network by sending ICMP packets and measuring response time in milliseconds

You have a new Windows notebook system with both wired and wireless network adapters. You want to configure a small wireless network at home. You install an access point/router device that connects your network to the internet. You have turned off SSID broadcast on the access point. You will connect devices using a pre-shared key. You need to configure your notebook to connect to the wireless network. You would like to use the most secure method available as well. What should you do? (Select two. Each option is part of the complete solution.)

- Use WPA2-Personal security - Manually create a network profile.

You have a small wireless network with 10 client computers configured in a Workgroup. You need to secure the wireless network using the most security and least amount of effort. You also want to do this without replacing any of the existing wireless infrastructure. Which tasks should you perform to secure the network? (Select two.)

-Configure each client with the same key. - Implement WPA2-Personal

Which of the following are included as part of Data Link layer specifications?

-Controlling how messages are propagated trough the network. -Identifying physical network devices.

Which of the following are functions of the MAC sublayer?

-Letting devices on the network have access to the LAN -Defining a unique hardware address for each device on the network

You have a notebook computer running Windows that you use both at home and in the office. The laptop has both an Ethernet connection and a wireless network connection. At home, you have created a simple Ethernet network that connects your home computers to the internet through a cable modem. A friend comes over to your house for some help configuring his new laptop computer. His computer has a wireless network adapter, but not an Ethernet network adapter. He wants to connect his laptop to the internet through your network to download some drivers. What should you do? (Select two. Each option is part of the complete solution.)

-On your laptop, configure a network bridge. Set up an ad hoc wireless connection between his computer and yours. -Configure the wireless connection to use WPA2-Personal

What are the most common types of files used to install Windows desktop applications? (Select two.)

.exe .msi

Prior to capturing the system image, you need to use the sysprep utility to prepare a system image for deployment to other computers. Which option must you use with sysprep to remove machine specific information from the installation?

/generalize

Drag each scanstate command option on the left to the description of its function on the right.

/o : allows overwriting of existing data /ue : specifies user(s) to omit from migration /ui : specifies user(s) to be migrated /p : generates a space estimate

Drag each loadstate command line option on the left of its function on the right.

/ui : specifies user(s) to be migrated /ue : specifies user(s) to omit from migration /lac : creates user accounts /lae : enables user accounts

Put the network troubleshooting steps in the proper order.

1)Identify the scope of the problem 2) Check IP address configuration 3) Check hardware configuration 4) Perform communication tests

You want to capture a system image to deploy Windows to multiple computers. You want to install Windows on the reference computer using an answer file. Which set of steps should you follow to create the answer file?

1. On a technician computer, insert the Windows product DVD. 2. Run Windows SIM and load a preloaded install image. 3. Select and edit the responses to the questions. 4. Validate the file in Windows SIM. 5. Save the answer file.

Which optical media has the greatest storage capacity? 1.) Single-layer, single-sided Blu-ray disc 2.) Dual-layer, double-sided DVD 3.) Dual-layer, single-sided DVD 4.) Compact disc

1.) Single-layer, single-sided Blu-ray disc

With the free version of OneDrive, your files stay in the Recycle bin anywhere from 3 to 30 days as long as you don't exceed which percentage of your storage?

10%

You need to determine the binary equivalent of the IPv4 address 192.68.1.1. Which is the correct binary version of this IP address?

110000.10101000.00000001.00000001

A host on the network has an IP address of 129.11.99.78 using the default subnet mask, how would you identify the address and mask using CIDR notation?

129.11.99.78/16

Which of the following is the last IP address that can be assigned to hosts on the 166.70.0.0 network using the default subnet mask?

166.70.255.254

Which block of address is defined for use with Automatic Private IP Addressing (APIPA)?

169.254.0.0/16

Your network has been assigned a class B network address of 179.113.0.0 Which three of the following addresses can be assigned to hosts on your network?

179.113.89.0 179.113.65.12 179.113.0.118

Your network has been assigned the class C network address 200.78.151.0 Which of the following addresses can be assigned to hosts on your network? (3 answers)

200.78.151.252 200.78.151.111 200.78.151.12

Consider the following IP address that uses CIDR notation: 172.17.8.5/22 Which subnet mask corresponds to the CIDR notation used in this address?

255.255.252.0

You have conducted a risk analysis to protect a key company asset. You identify ff. values: *Asset value = 400 *Exposure factor = 75 * Annualized Rate of Occurrence =.25 What is the Single Loss Expectancy (SLE)?

300

You have a CD-RW drive that advertises speeds of 32x/12x/48x. What is the read speed of the drive?

48x

A user is allowed to install Office from the cloud on up to how many devices?

5

A OneDrive account is automatically created when you set up an online Microsoft user account. How much storage are you given to use for free?

5 GB

You have conducted a risk analysis to protect a key company asset. You identify ff. values: *Asset value = 400 *Exposure factor = 75 * Annualized Rate of Occurrence =.25 What is the Annualized Loss Expectancy (ALE)?

75

You are using a Premium account for OneDrive. How long will your files stay in the Recycle Bin?

93 days

You want to connect a laptop computer running Windows to a wireless network. The wireless network uses multiple access points and is configured to use WPA2-Personal security. SSID broadcast has been disabled. Which type of authentication method and encryption combination should you use for the strongest security possible?

A pre-shared key and AES encryption

Files that you mark as "Always keep on this device."

A solid green circle with a white checkmark

A file or folder cannot be synced.

A solid red circle with a white X

You want to connect your client computer to a wireless access point connected to your wired network at work. The network administrator tells you that the access point is configured to use WPA2-Personal with the strongest encryption method possible. SSID broadcast is turned off. Which of the following must you configure manually on the client? (Select three.)

AES, Pre-shared key, and SSID

When you initially installed your Windows system, you created a Microsoft online account and received the default allocation of OneDrive storage space. You have found that you are storing enough files in the OneDrive folder that you are nearly out of space. You need to add more capacity, so you have opened the OneDrive Settings dialog as shown below. Which tab contains the option to increase your OneDrive storage capacity?

Account

You purchased a copy of Windows 10 Pro for Workstation from a Microsoft reseller. You need to activate the software. Which methods would you use?

Activate the license over the Internet or call Microsoft.

What is the name of the service included with the Windows Server operating system that manages a centralized database containing user account and security information?

Active Directory

Desktop users access an in-house application that is hosted on your intranet web server. When users click a specific option in the application, they receive an error message that the pop-up was blocked. How do you configure the security settings so that users can see the pop-up without compromising overall security?

Add the URL of the website to the Local intranet zone.

You recently developed a productivity app for your Windows 10 systems and now need to sideload it on the Windows 10 Professional systems in your organization. Which PowerShell cmdlet can be used to do this?

Add-AppxPackage

There are registry-based settings that can be configured within a GPO to control the computer and the overall user experience, such as: Use of WIndows features such as Bitlocker, Office Files, and Parental Controls Customize the Start Menu, taskbar, or desktop environment Control Notifications Restrict access to Control Panel features Configure Internet Explorer features and options What are these settings known as?

Administrative Templates

You recently purchased a large number of Windows 10 systems for deployment in a university writing lab. These system already have Windows 10 Professional installed and configured. You need to customize these systems to work in an open lab environment, where they will be used by many different people. For each system, you need to: Configure a device name Configure Wi-Fi network settings Join an AD domain Configure the device for shared use Configure a test-taking account using the Take a Test app Because of the large number of systems involved, you need to complete these tasks as efficiently as possible. Click the best option in the Windows Configuration Designer start page to do this.

Advanced provisioning

You have two computers. ComputerA is running Windows 8.1, and ComputerB is running Windows 10. You need to migrate all user profiles and data files form ComputerA to ComputerB. In Command Prompt, you have entered the following command: Loadstate f:\UserA_Profile /i:migapp.xml /ui:UserA /ui:* /lac /lae What will the result of this command be?

All of UserA's information is migrated, and UserA's account is disabled

You have booted a new computer (purchased from a manufacture) to PowerShell prior to the computer starting the Out-of-Box Experience. From PowerShell, you run the Set-ExecutionPolicy Unrestricted cmdlet. Which is the function of this cmdlet?

Allows Windows to run scripts.

You try to install internally developed accounting software on several new computers. You discover that the software will not run because User Account Control (UAC) causes it to fail. Because the accounting software will not be upgraded any time soon, you must make it work with UAC as-is. What is the best way to make the application work with UAC?

Alter the program settings to Run this program as an administrator

match each Networking function or device on the left with its associated OSI model

Application--HTTP Presentation--ASCII Session--Session ID Number Transport--Port Numbers Network--Router Data Link--Switch Physical--Modem

You've decided to use a subnet mask of 255.255.192.0 with your 172.17.0.0 network to create four separate subnets. The network ID for one of the subnets is 172.17.0.0. You are installing the first host (a server) on this subnet, and you want to assign the lowest numbered IP address possible to this system. What should you do?

Assign the system an IP address of 172.17.0.1

You've decided to use a subnet mask of 255.255.192.0 with your 172.17.0.0 network to create four separate subnets. The network ID for one of the subnets is 172.17.128.0. You are installing a DNS/DHCP server on this subnet and want to assign the highest numbered host IP address possible to this system. What should you do?

Assign the system an IP address of 172.17.191.254

In the User Account Control policy settings for Behavior of the elevation prompt for standard users, which options can be configured? (Select two.)

Automatically deny elevation requests Prompt for credentials on the secure desktop

You do not want any on-premises servers, and you want users to be able to sign in and access both internal and external resources. Which option would you select for user accounts?

Azure AD accounts

Which of the following is intended for organizations that do not have an on-premises Windows Server, Active Directory Infrastructure?

Azure Activity Directory Join

After an intrusion has occurred and the intruder has been removed from the system, which of the following is the best next step or action to take?

Back up all logs and audits regarding the incident

When duplicating a drive for forensic investigative purposes, which of the following copying methods is most appropriate?

Bit-level cloning

Was originally developed for high definition video (expanded content on movie discs), but can also be used for data storage.

Blu-ray Disc (BD)

Uses blue laser light which has a shorter wavelength, which allows data to be packed more tightly on the disc and is rewritable.

Blu-ray disc (BD-RE)

To deploy Windows 10, you want to use the Windows 10 installation on a selected computer as a system image. After removing machine-specific information from the computer, you are ready to capture the image as a WIM file. What should you do?

Boot to Windows PE and use MDT to capture the Windows installation onto a network share.

Which of the following would require you to enter a product key to activate Windows 10?

Buying a new or refurbished device running Windows 10.

Which of the following are limitations of a standard user account? (Select three.)

Can change some settings that apply only to themselves. Can use applications, but cannot install them. Cannot run applications in an elevated state.

You manage a group of twenty Windows workstations that are currently configured as a workgroup. You have been thinking about switching to an Active Directory configuration. Which advantages would there be to switching to Active Directory? (Select two.)

Centralized authentication and Centralized configuration control

You have been asked to draft a document related to evidence gathering that contains details about personnel in possession and control of evidence from the time of discovery up through the time of presentation in court. What type of document is this?

Chain of custody

What is the most important element related to evidence in addition to the evidence itself?

Chain of custody document

Windows accessibility options can be enabled to support users with physical limitations. Which of the following items can be configures in the Settings app under Ease of Access

Change brightness and automatically or use night light, Select the primary mouse button, Change the size and color of your cursor and mouse pointer.

Your windows workstation has a binary IP address of 00001010.00000000.00000000.01000001 assigned to it. Which class of IP addresses does this address fall within?

Class A

You recently set up a DHCP server, and you need to configure your computer to start using it. Click the IPv4 Properties option that you would select to use the DHCP server to receive IP configuration information.

Click "Obtain an IP address automatically"

Your organization's security policy prohibits end users from downloading and installing applications on their workstations. To comply with these policies, you need to completely disable access to the Windows Store for the Windows systems you manage. Click the option you would use in the Group Policy Editor to enable the Turn off the Store application policy.

Click "Store"

Several weeks ago, you installed a desktop application on your Windows system using the default parameters suggested by the application installer. After using the application for a time, you realize that you need an optional application feature that wasn't included in the default installation. You have opened the Settings app and have navigated to the Apps & features page. You have also selected the application. Using the least amount of effort, what would you do to add the optional features?

Click Modify

Several weeks ago, you installed a desktop application on your Windows system. Yesterday, you installed another desktop application on your system that was developed in-house. After doing so, you notice that the first application behaves erratically and frequently locks up. You have opened Control Panel on your Windows system, accessed Programs and Features, and selected the application. What should you do?

Click Repair

You've been using a Windows Store app and need to exit out of it. What should you do?

Click the close button in the app window

You are consulting a small startup company that needs to know which kind of Windows computer network model they should implement. The company will start small, with only twelve employees, but they plan to double or triple in size within 12 months. The company founders want to make sure they are prepared for growth. Which networking model should they implement?

Client-Server

Password restrictions that must be met for all user accounts

Computer Configuration Policies

Scripts that should run at startup or shutdown

Computer Configuration policies

Your organization's security policy dictates that users are not allowed to load Windows Connect Now (WCN) settings from a USB drive to connect to a wireless network. Which Group Policy contains settings that can be enabled to block this functionality?

Configurations of wireless settings using Windows Connect Now

You have just received a new laptop that you will use on your company network and at home. The company network uses dynamic addressing, and your home network uses static addressing. When you connect the laptop to the company network, everything works fine. When you take your laptop home, you cannot connect to devices on your home network or to the internet. You run ipconfig on the laptop and receive the following output: Connection-specific DNS Suffix . . :IPv4 Address. . . . . . . . . . . . : 169.254.22.74Subnet Mask . . . . . . . . . . . . : 255.255.0.0Default Gateway . . . . . . . . . . : You need to be able to connect to both the company network and your home network with the least amount of configuration and cost. What should you do?

Configure an alternate TCP/IP configuration

An employee in your organization has started to work from home two days a week. The employee uses the same company laptop at the office and at home. The laptop automatically connects to the wireless network in the office, but it does not automatically connect to the employee's home wireless network. The employee would like the laptop to connect automatically both at home and at work. What should you do?

Configure an alternate TCP/IP configuration on the laptop's wireless adapter to use a static IP address that is compatible with the home network

The UDP transport protocol provides which of the following features? (Select all that apply.) Sequence numbers and acknowledgements. Connectionless datagram services. Low overhead Guaranted delivery

Connectionless datagram services. Low overhead.

What is the basic purpose of the OSI Physical layer

Coordinates rules for transmitting bits.

You are using Cortana, and you would like to configure it to respond even when the screen on your device is locked. Which Settings app category would you use to make the changes?

Cortana

Your company has started the transition to IPv6. You need to configure records on the DNS server so that clients can submit a hostname query and receive back an IPv6 address for the specified host. What should you do?

Create AAAA records

Your company has started the transition to IPv6. You need to configure records on the DNS server so that clients can submit an IPv6 address and receive the hostname for that computer. What should you do?

Create PTR records

You have two computers. ComputerA is running Windows 8.1, and ComputerB is running Windows 10. You are using USMT to migrate the user profiles and the default date files from ComputerA to ComputerB. The user works with graphics, so you must also include .jpg files. Which actions should you take to specify that the migration includes all .jpg files?

Create a custom XML file

All your users work remotely. One of your users buys a notebook computer with Windows 10 Pro from an online store. The computer is to be used for company business. You need to upgrade the computer to Windows 10 Enterprise and join it to the CorpNet.xyz domain. You have the proper Microsoft 365 subscription and all other required licenses. What do you do?

Create a provisioning package and email it to the user with instructions on how to run it.

You need to install Windows 10 Enterprise edition on multiple computers. Each computer has a single SATA hard drive, a PXE-compliant network card, a DVD drive, and several open USB ports. You will not use WDS or MDT for the installation. When you start each computer, you would like the computer to boot and start the installation process automatically without any intervention. You want to minimize the actions that you must perform on each computer. What should you do next?

Create an Unattend file on a USB drive. On each computer, edit the BIOS to boot from the optical drive first. Insert the Windows installation disk into the DVD drive and the USB drive into a USB port.

You are using the Office 365 Admin center to deploy Microsoft Office 365 to your end users. You need to assign each user a license to use Microsoft Office. Click on the options in the Office 365 Admin center that you could use to do this. (Select two.)

Dashboard, Users

You manage a large number of workstations that belong to a Windows domain. You want to prevent anyone that might try to gain access to a computer from guessing login information by trying multiple passwords. Which GPO contains a policy you can enable to guard all computer in the domain against this security breach?

Default Domain Policy

You have a small network as shown, you have configured the IP address and subnet mask on wrk1. You want to be able to use wrk1 to browse the Internet to connect to sites like cisco.com Which other parameters are required on the workstation? (2 answers)

Default gateway DNS server address

Which of the following describes the role of a DHCP server (select two.) ?

Delivers DNS server addresses and other configuration information to hosts. Automates the process of assigning IP Addresses, subnet masks, and default gateway addresses to network hosts.

To determine the value of the company assets, an anonymous survey was used to collect the opinions of all senior and mid-level managers. Which asset valuation method was used?

Delphi method

Which of the following is *not* an appropriate response to a risk discovered during a risk analysis?

Denial

You have just finished installing Windows 10 on a reference system from which you need to capture an image. You've already removed device-specific information from the system and are ready to capture the image files. Which tools can you use to do this?

Deployment Image Servicing and Management

Single- sided discs can hold about 4.7 GB of data. Dual-layer discs can hold up to 8.5 GB of data.

Digital Versatile Disc (DVD)

Dual-layer version employs two recordable dye layers, each capable of strong data.

Digital Versitile Disc (DVD-RW)

Your Windows workstation has an IP address of 192.168.1.35 with a subnet mask of 255.255.255.0. It also has a DNS server address of 192.168.1.1 and a default gateway router address of 192.168.1.254. Your workstation is a member of the westsim.com domain. The domain controller's address is 192.168.1.3. Your workstation needs to connect to a web server using the HTTP protocol. The web server has an IP address of 192.168.1.2 and a subnet mask of 255.255.255.0. Where will the packets be sent first?

Directly to the web server.

You want to modify the default settings for User Account Control (UAC) on your Windows system to meet the following criteria: Prompts should be shown when programs make changes to your computer and when you make changes to Windows settings. The desktop should not be dimmed and locked out, but should allow you to continue working in other applications without immediately responding to the prompt. Settings should apply to all standard users. Which UAC setting can you use to meet these criteria?

Disable the Switch to the secure desktop when prompting for elevation setting in Group Policy

During a recent site survey, you find a rogue wireless access point on your network. Which of the following actions should you take first to protect your network, while still preserving evidence?

Disconnect the access point from the network

You want to prepare a USB flash drive that you can use as a Windows 10 installation source. Which of the following tools can be used to prepare the USB flash drive? (select three)

DiskPart, WIndows 7 USB/DVD Download Tool, Media Creation Tool

Which of the following statements is true regarding risk analysis? (Select two.)

Don't implement a countermeasure if the cost is greater than loss; Annualized rate of Occurrence (ARO) identifies how often the successful threat attack will occur in a single year.

You are performing a clean installation of Windows 10 on a notebook computer. The notebook system has one SATA hard disk installed. You want to divide the hard disk into two volumes. The C: volume should be 150 GB in size. The D: volume should consume the remaining available space on the drive. Click the option you would use in the Windows installer to implement this configuration.

Drive 0 Unallocated Space

You manage a Windows system connected to a business network that uses switches and multiple subnets. You connect a workstation to the 192.168.1.0/24 subnet. The workstation can communicate with some hosts on the private network, but it cannot communicate with other hosts. You enter ipconfig /all in Command Prompt and see the following output: Ethernet adapter Local Area Connection: Connection-specific DNS Suffix . : mydomain.local Description . . . . . . . . . : Broadcom network adapter Physical Address . . . . . . . : 00-AA-BB-CC-74-EF DHCP Enabled . . . . . . . . . : No Autoconfiguration Enabled. . . : Yes IPv4 Address . . . . . . . . . : 192.168.1.102(Preferred) Subnet Mask . . . . . . . . . : 255.255.255.0 Default Gateway. . . . . . . . : 192.168.2.1 DNS Servers. . . . . . . . . . : 192.168.2.20 What should you do?

Edit the IPv4 properties and change the default gateway

You manage a small network with Windows clients, multiple subnets, and servers. You want your computer to be able to resolve a hostname for a server on your network to its IPv4 address. Which should you do? (Select two. Each answer is a complete solution.)

Edit the hosts file on the computer. Add an A record on the DNS server

What's the benefit of using User Account Control (UAC)?

Elevate privileges to complete specific tasks without logging in as admin

You are trying to listen to audio CDs on a Windows system, but no audio is coming from the speakers. After checking the speaker cables, volume level, and the mute feature, you check Device Manager and see the dialog box image shown in the image below. What should you do?

Enable the SoundMAX Integrated Digital HD Audio Driver device

Causes the policy to be enforced

Enabled

Which type of data loss prevention system can be configured to block unauthorized email messages from being sent and, therefore, being subject to email retention rules?

Endpoint DLP

Always on VPN

Enterprise

You need to configure content-based restrictions for apps available to child users in the Windows Store. Which Accounts option do you use to set these restrictions?

Family & other users

What are some reasons that make Microsoft Store for Business so appealing? (Select two.)

Financial Legal

You need to enable sideloading on a Windows 10 system. You have opened the Settings app and have navigated to Update & Security. Click the option that you would use to do this.

For developers

You have a computer on your workbench that has no operating system installed on it. You would like to install Windows 10 Enterprise 32 bit edition on the computer. The computer has the following hardware specifications: Hard drive with 12 GB of free space 1 GB of RAM one additional socket available One Pentium 2.8 GHz processor, one additional socket available Display supports 800x600 pixels What should you do?

Free up some space on the hard drive

You frequently use an app from the Windows Store. How can you configure the app so you can access it without having to open the Start menu? (Select two. Each answers is a complete solutions.

From the Start menu, click and drag the app's tile to the taskbar. From the Start menu, right-click the app s tile and select More > Pin to taskbar.

Administrators can control which Office 365 ProPlus apps users are allowed to download. Once an administrator is logged into their global admin account, what should they do next?

From the home page select Office Software, and then select Software download settings

Phone or Internet activation

Full-Packaged (Retail)

You have a computer that currently has Windows 7 installed on it. You need to perform a clean installation of Windows 10, but it is very important that you are able to continue using this system with the same applications and data. You must retain the existing data files from the Windows 7 installation and be able to continue using the same applications after the Windows 10 clean install is complete. What should you do?

Gather application installation media and product keys. Back up the user data.

Drag each task on the left to the Internet options tab on the right where the task can be performed.

General: Delete temporary internet files, cookies, browsing history, form data, and passwords. Security: Enable Protected Mode Privacy: Configure Pop-up Blocker settings Content: Manage Certificates, trusted root CAs, and trusted publishers Connections: Configure proxy server settings Programs: Add, disable, or remove browser add-ons Advanced: Reset Internet Explorer settings to their default values.

You updated a driver from the manufacturer's website, and not it is making your system unstable. You have decided to restore your system to a restore point. Which two options allow you access the restore points on your system.

Go to System Properties and then System Protection Use your installation media and run a repair.

Installed desktop applications on a Windows system that are displayed in Programs and Features typically have associated entries in which registry key?

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Current Version\Uninstall

Mobile Device Management

Home,Pro, and Enterprise

Which protocol is used on the World WIde Web to transmit pages to web browsers? HTTP NNTP HTML SMTP

Hypertext transfer protocol (HTTP).

Which of the following protocols stores email on the mail server and allows users to access messages from various client devices withouth having to download the emails? IMAP4 SMTP POP3 NTP

IMAP4

You have a workstation connected to a small branch network using a single switch. The network using a single switch. The network does not have any routers and is not connected to the Internet. What are the minimum configuration parameters required on the workstation to be able to communicate with all hosts on the network?

IP address and subnet mask

You recently created a new network segment for Development. Because the hosts are now on a different network segment, they can no longer contact DHCP server. Both network segments are connected wia a Cisco router. Which of the following would be the best action to take in order to fix the problem?

Implement an IP Helper address on the router

You manage several Windows systems that are members of a domain. Your company has an internal website that requires HTTPS. The website's certificate is self-signed. You use HTTP to browse to the website and receive the warning message as seen in the image. What must you do to prevent the warning message from appearing when you access the website?

Import the website's certificate into the Trusted Root CA list.

Two devices connected to your computer are not working properly. You suspect the devices are using the same system resources, and this is creating a conflict. How can you verify whether or not the devices are conflicting with each other? (Select two. Each answer is a complete solution.)

In Device Manager, open the device's Properties window and click the Resources tab. Run System Information (msinfo32)

You have a notebook system running Windows. The laptop has built-in wired and wireless network cards. Recently, the wireless card stopped working, so you connected an external USB wireless adapter to the system. After you install the wireless adapter, it is not displayed in the list of available network adapters in the Network and Sharing Center. What should you do to troubleshoot the problem?

In Device Manager, right-click the wireless device and click Properties. Examine the device configuration.

The audio card in your Windows system is working, but you learn about an updated driver that adds new features. You download and install the new driver. After you restart and sign in to Windows, you can no longer play audio files. Using minimal administrative effort, you need to find a solution so you are able to play audio. What should you do?

In Device Manager, roll back the driver.

You use a Windows computer that is shared by multiple users. The default printer on your computer is a Sharp AL-2040. When you send a print job to the default printer, nothing happens. The other users can send jobs to the same printer without any issues. What should you do?

In Device and Printers, right-click the Sharp AL-2040 icon and click Troubleshoot.

You have been asked to troubleshoot a Windows system that is a member of a workgroup. The director who uses the machine said he is able to install anything he wants and change system settings on demand. He has asked you to figure out why User Account Control (UAC) is not being activated when he performs a sensitive operation. You verify that the director's user account is a standard user and not a member of the local Administrators group. How do you configure UAC so the prompt is activated when he performs a sensitive operation?

In Group Policy, enable the "Run all administrators in Admin Approval Mode" Policy

You manage a Windows system. Multiple people use the computer. Users sometimes allow Internet Explorer to remember passwords when accessing various websites. What can you do to prevent the stored password from being stolen from the system?

In the AutoComplete settings, deselect the Usernames and passwords on forms checkbox.

You have received a new laptop for use at work. It is running Windows. You've configured the wireless adapter to connect to the network at work. You also have a wireless network at home, and you have configured a second profile for your home network. For several weeks, the wireless connection has worked fine. Whether you are at home or at work, you can start your computer and make a connection without browsing for the list of available networks. One day, you come to work to find that you can't connect to the network. You check with the network administrator, and he states that he has prevented the SSID of the company wireless network from being visible. You need to reconfigure your system to connect to the company wireless network now and in the future in the easiest manner possible. What should you do?

In the wireless network profile, select Connect even if the network is not broadcasting its name (SSID)

You have several computers in a domain network. Your company develops software that runs on both Windows 7 and Windows 10. Programmers need to have computers that can dual-boot between Windows 7 and Windows 10. You need to configure each system to meet the programmer's requirements. What should you do?

Install Windows 7 first, and then install Windows 10 on another partition.

Last month, you deployed Windows 10 Enterprise to all of the desktop computers in your company using a single system image. To install this image, you created a WinPE boot CD. You recently received new desktop computers, and one of your colleagues is not able to install the image using the WinPE CD. The WinPE CD cannot boot to the network drive. What should you do?

Install the latest hardware drivers for these new desktop computers on the WinPE image.

Your organization's in-house software development team has written a custom app that allows Windows 10 systems to connect to your company's sales database and update contact information for sales leads. During the process of developing and digitally signing the app, an .appx file and a root certificate were created. The root certificate is self-signed. What must you do before you can install the app on users' workstations?

Install the root certificate into each workstation's Trusted Root Certification Authorities certificate store

Which of the following protocols allows hosts to exchange messages to indicate problems with packet delivery? DHCP IP IGMP ICMP ARP TCP

Internet control message protocol (ICMP).

You have a small network with a single subnet connected to the Internet as shown in the Exhibit. The router has been assigned the 2 addresses shown. You need to manually configure the workstation to connect to the network. The workstation should use RouterA as the default gateway and DNS1 as the DNS server address. From the drop-down options, select the appropriate parameters to configure the workstations TCP/IP settings.

Ip Address 192.168.12.46 Subnet 255.255.255.240 Default gateway 192.168.12.34 DNS Server 198.162.1.22

The Windows Network Diagnostics tool analyzes a computer's network connection and verifies connectivity. When connected to a domain, what does the Network Map display?

It displays your computer, the domain, and the internet.

You have configured a Windows server in you network to provide activation for your Windows workstations using the Key Management Service (KMS) Which of the following are not true concerning activation in this network? (select two)

KMS activations are valid for 180 days. By default, the Windows client systems will attempt to renew their activation status every seven days.

Which of the following activation processes requires one of the following thresholds to be met? 25 or more client systems (physical or virtual) must require activation. 5 or more servers (physical or virtual) must require activation.

Key Management Services (KMS)

Addresses that are valid on only the current subnet are known as:

Link-local

The chain of custody is used for which purposes?

Listing people coming into contact with evidence

You are managing a workstation that is not part of a Windows domain. Users on this computer should not be permitted to download applications from the Windows Store. Which administration tool can you use to enable a policy that turns off the Store application for all users on this computer?

Local Group Policy Editor

You access the WidgetProject share on a server at your organization's headquarters over a WAN link using the following UNC path: \\FS3\WidgetProject. Click the zone this site belongs to by default in Internet options.

Local Intranet

Which of the following can be used to verify that the TCP/IP Protocol stack has been properly installed on the host?

Loopback

You manage a small office network with a single subnet. The network is connected to the internet. All client computers run Windows. A single server runs Windows Server 2016. The client computers are not joined to a domain. All hosts use IPv6 addresses on the private network. All computers on the private network are assigned host names (such as Computer1, Computer2, etc.). All hosts use the DNS server provided by the Internet Service Provider (ISP) to resolve hostnames for internet hosts. You need to implement a solution so that hosts on your private network can resolve hostnames for other hosts on the private network. You want to implement the solution with the least amount of effort. What should you do?

Make sure that LLMNR is enabled on all computers.

What is the cloud computing system that provides services such as Access, Excel, and Outlook called?

Microsoft Office 365 ProPlus

The applications below are only available through the Microsoft Store, and you must be signed into your Microsoft account to download them. Which type of applications are they?

Microsoft Store Apps

You are preparing to install Windows on a new computer. You copy the installation files from a DVD to a USB flash drive and then use bootsect to make the USB drive bootable. Using the RAID controller on the motherboard, you configure three hard disks in a RAID 5 array. Using disk tools, you create a single partition that takes up the entire array. You insert the USB drive and boot the computer. The computer boots and displays the following message: Error loading operating system. Reboot and select proper boot device. What should you do?

Modify the boot order to boot from the USB device in the BIOS.

Your notebook computer is configured to connect to the wireless network at work using a wireless profile named Company1. The profile is configured to connect using 802.11b. During a recent upgrade, your company added an 802.11n wireless access point. The access point is configured to support 802.11n using one radio and 802.11b/g with the other radio. You create a second profile on your computer for the 802.11n network. You notice that your computer is connecting automatically using 802.11b. You want the computer to connect to 802.11n whenever it's available and only use 802.11b if 802.11n is unavailable. What should you do?

Move the 802.11n profile up in the list of preferred networks

Your company wants to activate Enterprise licenses on a one-time basis by calling Microsoft. Which of the following activation processes will they need to use?

Multiple Activation Key (MAK)

If an organization shows sufficient due care, which burden is eliminated in the event of a security breach?

Negligence

Which type of Data Loss Prevention system is usually installed near the network perimeter to detect sensitive data that is being transmitted in violation of organizational security policies?

Network DLP

You are configuring a small Workgroup. You open System Properties on each computer that will be in the Workgroup. Click the System Properties options you can use to configure each computer's workgroup association. (Select two. Each option is a complete solution.)

Network ID and Change

What is a network resource in the directory?

Object

When using Windows Autopilot deployment profiles to customize the Out-of-Box Experience, you can create a default deployment profile of settings for a device group. Which types of groups can you use? (Select two.)

Office 365, Security Group

Office 365 ProPlus can be deployed to your enterprise. When doing so, which tool enables you to choose the language, hardware architecture, and the version of Office you want to install?

Office Deployment Tool

You have two computers. ComputerA is running Windows 7. ComputerB is running Windows 10. You need to migrate all user profiles and data files from Computer A to Computer B. Which command options must you include to ensure the user accounts on the destination computer are created and enabled during the migration?

On ComputerB, run loadstate with the /lae and /lac options

Microsoft Office 365 ProPlus lets you determine where user data is stored. For example, it could be stored on your workstation. Which of the following are your other storage options? (Select two.)

On the cloud On the network

You are installing Windows on a new computer. Using the RAID controller on the motherboard, you configure three hard disks in a RAID S array. You leave the array unpartitioned and unformatted. You edit the BIOS boot order to boot from the optical drive. You insert the installation DVD, boot to the disk, and start the installation. When you are prompted to select the disk where you want to install Windows, the RAID array you created does not show as a possible destination disk. What should you do?

On the screen where you select the disk to install Windows, click Load Driver.

Syncing has been paused. Your files are not currently syncing.

OneDrive icon with a gray circle containing two vertical lines

Your account needs attention. Select the icon to see the warning message displayed in the Activity Center.

OneDrive icon with a yellow triangle containing an exclamation mark

You are using an Android tablet system. You need to get access to some of the files in your OneDrive account. Which option would you use?

OneDrive website

You have several personal mobile devices that you use on a daily basis. You want to be able to authenticate to each device with the same user account so you can share your personal data and apps regardless of which mobile device you use. Which type of user account must you create?

Online user account

Who can access a line-of-business app?

Only the employees of the business who wrote the app

You install a new internal sound card in your Windows system. After you reboot and install the driver, the device does not appear to be working. You need to view information for the device and perform troubleshooting steps. What should you do first?

Open Device Manager to view the status of the sound card.

On your Windows systems, you want to prevent Edge from leaving a trail of your browsing session. What should you do?

Open a new InPrivate window

What is a logical organization of resources?

Organizational Unit

You have a computer running Windows 8.1. You want to migrate to Windows 10 using a wipe-and-load migration to transfer files and folders.. Which of the following methods could you use?

PCmover Express

You have two computers. ComputerA is running Windows 7 Professional, and ComputerB is running Windows 10 Professional. You need to transfer user profiles and data files from ComputerA to ComputerB. Which tool should you use?

PCmover Express

Which of the following TCP/IP protocols do email clients use to download messages from a remote mail server? SMTP POP3 SPC FTP SNMP

POP3

You have discovered a computer that is connected to your network that was used for an attack. You have disconnected the computer from the network to isolate it from the network and stop the attack. What should you do next?

Perform a memory dump

Which Settings app category would you use to customize the appearance and behavior of the Start menu?

Personalization

You manage a Windows network environment. As part of your IPv6 migration strategy, you have implemented ISATAP on your network. You would like to test the communication of a client computer using ISATAP. What should you do?

Ping the address beginning with FE80:

Match each layer of the TCP/IP model on the left with the corresponding layer of the OSI model on the right. Each option on the left can be used more then one.

Presentation--Application Data Link--Network Access Application--Application Session--Application Network--Internet Transport--Host-to-host

Which Settings app category would you use to configure options such as: Letting apps use your advertising ID for experience across apps Letting apps use your camera Letting Windows track app launches to improve Start and search results Inking and Typing personalization Enabling or disabling Location Services

Privacy

On the C: drive, what is the difference between the Program Files folder and the Program Files (x86) folder?

Program Files keeps 64-bit files, while Program Files (x86) keeps 32-bit files

You manage 20 Windows systems in a domain network. You want to prevent the sales team members from making system changes. Whenever a change is initiated, you want to allow only those who can enter administrator credentials to be able to make the change. You open Group Policy Editor to configure the User Account Control: Behavior of the elevation prompt for standard users policy. Which setting should you select for this policy?

Prompt for credentials

You recently installed Windows 10 on a reference system and have captured an image from that system. Since creating the image, you have determined that several customizations need to be made. Rather than reconfigure the reference system and recapture the image, you decide to use the Windows Configuration Designer to create a provisioning package that can be used to apply the customizations after the image has been deployed. Click the options in the Windows Configuration Designer start page that you could use to create this package (select two.)

Provision desktop devices, and advanced provisioning

Management has decided to purchase new desktop systems for the users in the engineering department. A needs assessment has determined that the systems must meet the following requirements: The systems must be joined to the organization's existing Active Directory domain. The systems must support high performance device configuration Whole disk encryption must be implemented with BitLocker. The system must support virtualization technology using Hyper-V Virtual Machine Manager. A sales rep from a computer manufacturer recently offered you a very competitive price on desktop systems with the following specifications: CPU:64 bit AMD 3.0 GHz quad-core RAM:8 GB Hard disk: 1TB Operating system: Windows 10 Pro for Workstations What should you do?

Purchase the desktop systems as configured and implement them in the network

Due to a blackout, power is no longer coming from the wall outlet and your computer is now off. You do not have a UPS and you need to remove a disc out of the DVD drive. What is the easiest method to retrieving the disk?

Push an unbent paper clip into the hole on the front of the drive.

You want to set up Office 365 for all employees in your company. You know that you must find out if your devices are compatible with Office 365 ProPlus before deploying it to your end users. Which tool should you use to determine this?

Readiness Toolkit

After you upgrade a video driver on a Windows system, the screen becomes unresponsive. You need to get the system working properly with the least amount of effort and time. Which of the following options can you use to get your Windows system back to a stable state? (Select two. Each option is a complete solution.)

Reboot the computer into Safe Mode and use Device Manager to roll back the driver. Reboot the computer with the Windows installation disk and select Repair Your Computer to launch the System Restore utility.

Your company has started the migration to IPv6 on your network. Your network administrator tells you that the network is using stateless autoconfiguration. You need to configure your computer to use the correct IPv6 address, default gateway address, and DNS server address. The computer is currently configured to get all IPv6 information automatically. What should you do?

Run "netsh interface ipv6 add dnsserver"

You want to capture your Windows installation as a system image. You need to remove any computer-specific information from the computer prior to capturing the image.

Run Sysprep

You have a stand-alone dual-boot system running both Windows 7 and Windows 10. The computer currently boots to Windows 7 by default. You need the computer to boot to Windows 10 by default instead.

Run bcdedit.exe

Your network has just transitioned from using IPv4 to IPv6. IPv6 configuration is performed automatically using information received by network routers. The network does not use a DHCPv6 server. Your Windows system is unable to communicate with a server named Srv1. A ping test to the server works using its IPv6 address, but it fails when you use its hostname. What should you do?

Run netsh with the add dnsserver option

You have a computer that runs Windows 7. You want to perform a clean installation of Windows 10 and maintain as much of the application settings, user profile, and user data as possible. Which steps should you perform to complete the migration with the least amount of effort possible?

Run scanstate in Windows 7. Perform a custom (advanced) installation of Windows to the existing hard drive. Boot into Windows 10 and re-install all applications. Run loadstate.

You need to migrate specific application settings from ComputerA to ComputerB by using USMT. What should you do (Select two. Each answer is part of the complete solution.)

Run scanstate with the /genconfig option. Edit the config.xml file

You have a computer running Windows that is connected to a domain network. After reconfiguring the static address of an internal web server named WEB3, your computer can no longer connect to WEB3. But other users are still able to connect to the same web server. You need to be able to connect to the website on the WEB3 server. Which of the following actions should you take?

Run the ipconfig /flushdns command

You have a computer that runs Windows and is connected to a domain network with a DHCP server. One day you find that your computer cannot connect to any network resources. You run the ipconfig command and find that the network connection has been assigned the address of 169.254.12.155 with a mask of 255.255.0.0. Which of the following actions should you take?

Run the ipconfig /release and ipconfig /renew commands

Your network has just transitioned from IPv4 to IPv6. IPv6 configuration is performed automatically using stateful DHCPv6. A DNS server on your network provides name resolution for IPv6. Your Windows system is having problems communicating on the network. You would like to receive new configuration information from the DHCP server as well as remove all old DNS entries in your local DNS cache. Which of the following actions should you take? (Select two. Each answer is part of the complete solution.)

Run the ipconfig /release6 and ipconfig /renew6 commands. Run the ipconfig /flushdns command

You have a Windows laptop that uses DHCP for IPv4 addressing information. You need to see the IPv4 address, subnet mask, and DNS server addresses that the network connection is currently using. Which of the following actions should you take? (Select two. Each answer is a complete solution.)

Run the netsh command. Run the ipconfig and ipconfig /all commands

What protocol sends email to a mail server? TFTP FTP POP3 SMTP SNMP

SMTP

Which of the following wireless network methods make it easy for clients to find and connect to the wireless network?

SSID broadcast

Which kind of cloud computing system is Microsoft Office 365 ProPlus?

SaaS

You are about to install a new desktop application that you downloaded from a website. What should you do before you start the installation? (Select two.)

Scan the installer for malware. Create a restore point

You have an app installed on your Windows system that has not been pinned to your Start menu. How can you locate the app? (Select two. Each answer is a complete solution.)

Search for the app by typing its name in the search field on the taskbar. Click the Start tile, and then scroll through the list of apps.

Using Internet options, you must set restrictions for downloading unsigned ActiveX controls. Click the tab you would access to set the restrictions.

Security

Your company has started the migration to IPv6 on your network. Your network administrator tells you that the network is using stateless autoconfiguration. You need to reconfigure your computer to use the correct IPv6 address, default gateway address, and DNS server address. After accessing the Internet Protocol Version 6 (TCP/IPv6) properties for the network adapter, what should you do?

Select "Obtain an IPv6 address automatically and Use the following DNS server address".

You are using the Office 365 Admin center to deploy Microsoft Office 365 to your end users. You purchased the Office 365 Business plan, which includes the following versions of Office: Office 2016 Office 2013 Office 2011 You want to limit users to just the Office 2016 version of the product. Click on the option in the Office 365 Admin center that you would use to do this.

Service Settings

During TCP/IP communications between two network hosts, information is encapsulated on the sending host and decapsulated on the receiving host using the OSI model. Match the information format on the left with the appropriate layer of the OSI model on the right. (Not all layers have a matching information format.)

Session Layer--(leave blank) Transport Layer--Segments Network Layer--Packets Data Link Layer--Frames Physical Layer--Bits

Which key combination can you press during the initial boot process to get to Command Prompt prior to the computer running the Out-of-Box Experience

Shift + F10

Network and Sharing Center

Shows the network status and a graphical representation of network connections

Which of the following includes the benefits of free upgrades when the next version of Windows is released and Microsoft Desktop Optimization pack (MDOP)

Software Assurance

You are a contract support specialist managing the computers in a small office. You see that all the computers are only using local user accounts. Which of the following models could this office be using? (Select two.)

Standalone and Workgroup

Which of the following best describes the purpose of using subnets?

Subnets divide an IP network address into multiple network addresses

You manage a subnet that uses subnet address 198.162.1.0/23 Which of the following best describes how addressing is configured for the subnet?

Supernetting

You want to show reminders and incoming VoIP calls on the lock screen. Which of the Settings app categories would you use to make this adjustment.

System

You have just finished installing Windows 10 on a computer that will be the reference system. An i mage needs to be captured from this reference system. You will be deploying the image captured to computers that were made by several different manufacturers and which use a wide range of hardware. Therefore, you need to remove all device-specific information from the reference system prior to capturing the image. Which tool should you use to do this?

System Preparation Tool

Which of the following protocols includes extensive error cheching to ensure that a transmission is sent and received without mistakes? UCP UDP UDB TCP

TCP

You have an IPv4 network that has two IPv6-only hosts that need to be able to communicate with each other. You want to implement a solution that only requires you to configure the two IPv6 hosts. You also want it to work through NAT. Which tunneling method should you use?

Teredo tunneling

You are configuring a provisioning package using the Windows Configuration Designer's Provision desktop devices option. One of the purposes of the package is to give each computer the name TestOut- followed by a random four-digit number. What should you enter for the Device name field?

TestOut-%RAND:4%

You are using a web browser on your Windows notebook to access the http://www.westsim.com website. Your notebook has been configured to use a DNS server that has an IP address of 137.165.1.254 for name resolution. Your notebook sends a name resolution request for www.westsim.com to this DNS server. However, this server isn't authoritative for this domain and doesn't have a record that can be used to resolve this domain name to an IP address. What will happen next?

The DNS server sends a request to a DNS root server for the IP address of a DNS server that is authoritative for the westsim.com domain.

You have a small network connected to the Internet as shown in the exhibit. You need to configure the default gateway address on Wrk1 so that is can communicate with hosts on the Internet. Which address would you use for the default gateway address?

The IP address assigned to Fa0/0 on router one

You have configured a Windows server in your network to provide activation for your Windows workstations through Active Directory using the default settings. Which of the following are true concerning activation in this network? (select two)

The Windows client systems and the Windows server must all be members of the same domain. The Windows client systems will remain activated as long as they stay members of the domain.

The hardware in a user's Windows 10 Professional system is configured as follows: integrated 100 Mbps network card, Integrated sound board, Integrated SATA adapted, 1 TB SSD storage, Rewritable DVD Drive. You recently made the following changes to the system hardware: You installed a new 1000 Mbps network card in an expansion slot in the original motherboard. , You connected a new Blu-ray optical drive to a SATA connector on the original motherboard. , You connected a new 2 TB hard disk to a SATA connector on the original motherboard.

The activation status of Windows has not changed. , The system's hardware ID (HWID) has changed.

While working in Device Manager, you notice the display shown below. What does the icon next to USB Mass Storage Device indicate. (the icon is a yellow triangle with an black exclamation mark in the center)

The driver for the device is unavailable.

You need to change the web page that opens when you launch the Edge browser. Click the tool in the Edge browser toolbar that allows you to make this change.

The icon with the three dots

Which of the following is one of the prerequisites for creating a Microsoft Store for Business?

The organization must have a Microsoft Azure Directory domain configured.

You just created a provisioning package for Windows 10 desktops using the Windows Imaging and Configuration Designer (ICD) found within the Windows ADK. Which of the following are true? (Select two.)

The provisioning package can be applied to an existing Windows 10 image. The provisioning package can be applied to a running Windows 10 system.

Which of the following best defines Single Loss Expectancy (SLE)?

The total monetary loss associated with a single occurrence of a threat

Your organization uses an 802.11b wireless network. Recently, other tenants installed the following equipment in your building: -A wireless television distribution system running at 2.4 GHz -A wireless phone system running at 5.8 GHz -A wireless phone system running at 900 MHz -An 802.11a wireless network running in the 5.725 to 5.850 GHz frequency range -An 802.11j wireless network running in the 4.9 to 5.0 GHz frequency range Since this equipment was installed, your wireless network has been experiencing significant interference. Which system is most likely to blame?

The wireless TV system

When conducting a risk assessment, how is the Annualized Rate of Occurrence (ARO) calculated?

Through historical data provided by insurance companies and crime statistics.

You want to change the speech voice from Microsoft David to Microsoft Zira. Under which Settings app category would you locate this option?

Time & Language

You are an application developer, and you are writing a program for exchanging video files through a TCP/IP network. You need to selct a transport protocol that will guarantee delivery. Which TCP/IP protocol provides this capability? RIP UDP TCP TFTP IP FTP

Transmission control protocol (TCP).

What is a group of related domains?

Tree

You do not use the Microsoft XPS Document Writer. Which option could you use to disable it?

Turn Windows features on or off

You have installed the Microsoft Deployment Toolkit (MDT), the Assessment and Deployment Kit (ADK), and the Windows Preinstallation Environment Add-on (WinPE files) on a management machine. Using the Deployment Workbench on this management machine, you have also created and configured a deployment share. Which of the following steps creates the components required to create and capture an image?

Update the deployment share

You manage desktop systems for a small organization. Currently, all of your systems have the following hardware installed: CPU:AMD Sempron 2.8 GHz Memory: 2 GB Hard disk: 500 GB Windows 10 Home Edition came pre-installed on all of the systems, and they are currently configured to run in a workgroup environment. Your organization recently decided to implement a Window Server 2016 with Active Directory installed. Management has asked you to join your Windows 10 client systems to the new domain. What should you do?

Upgrade the desktop systems to Windows 10 Professional

Management has decided to purchase new notebook systems for the users in the marketing and sales department. After conducting a needs assessment, they have determined that the new systems must meet the following requirements: The systems must be joined to the organizations Active Directory domain. Application restrictions must be implemented with AppLocker Whole disk encryption must be implemented with BitLocker. The notebooks must support remote connections to your organization's DirectAccess server, as sales rep travel frequently. A sales rep from a computer manufacturer recently offered you a very competitive price on notebook systems with the following specifications: CPU:64-bit AMD 3.6 GHz quad-core Ram:8GB Hard disk:2TB Operating System: Windows 10 Pro What should you do?

Upgrade the operating system to Windows 10 Enterprise

You have several computers running Windows 10. The computers are members of a domain. For all computers, you want to remove access to administrative tools from the Start menu and hide notifications from the System Tray. What should you do?

Use Group Policy

Your company just installed new wireless access points. The access points use WPA2-Enterpise. The computers you are working with belong in the TestOut workgroup. You are at the point of the process where you need to configure 20 Windows 10 computers to connect to the access point. What should you do?

Use Windows Configuration Designer to create a provisioning package to complete the task. Run the package on each computer.

You have been asked to install Windows 10 on several computers that do not have optical drives. What should you do? (Select three. Each choice is part of the entire solution)

Use a USB flash drive with at least 4 GB of storage space; Copy the product DVD to a USB flash drive and boot from the drive; Use the bootsect command to make the USB flash drive bootable.

Your Windows system has an application installed on it that you no longer need. What should you do?

Using the setting app > apps & features, locate the application and click uninstall

Which of the following terms are often synonymous with or made possible with CIDR? (2 answers)

VLSM Classless

You manage a Windows system connected to a business network that uses switches and multiple subnets. One day you find that the computer is unable to connect to the internet, but it can communicate with a few other computers on the local subnet. You enter ipconfig /all in Command Prompt and see the following output: Ethernet adapter Local Area Connection: Connection-specific DNS Suffix . : mydomain.localDescription . . . . . . . . . . : Broadcom network adapterPhysical Address . . . . . . . . : 00-AA-BB-CC-74-EFDHCP Enabled . . . . . . . . . . : YesAutoconfiguration Enabled. . . . : YesIPv4 Address . . . . . . . . . . : 169.254.155.1(Preferred)Subnet Mask . . . . . . . . . . : 255.255.0.0Default Gateway. . . . . . . . . :DNS Servers. . . . . . . . . . . : What should you do?

Verify that the DHCP server is up and functional

You need to add security for your wireless network. You would like to use the most secure method. Which method should you implement?

WPA2

You can use a Windows notebook system that is a member of the domain on your network at work. You need to configure the wireless network card in the system to connect to the wireless network at work. The connection should require a username and password for authentication using AES encryption. Which type of security standard should you use while configuring the connection?

WPA2-Enterprise

When would choosing to do nothing about an identified risk be acceptable?

When the cost of protecting the asset is greater than the potential loss

The file or folder is only available online when you're connected to the internet.

White cloud with blue borders

The file or folder has been shared with other people.

White cloud with blue borders and a people icon

You are using your Windows 10 notebook computer at a coffee shop. You notice that your notebook has automatically connected to a wireless network that you do not trust. In the Settings app under Network & Internet, which link should you access for the option to disconnect from this wireless network and reconnect to a network you trust?

Wi-Fi

You've just connected a USB wireless network adapter to a Windows desktop system in your home office. You want to use the Windows Connect Now (WCN) push-button connect feature to connect your desktop to your wireless network. Which technology must be implemented on both the wireless access point and the wireless network interface to enable this feature?

Wi-Fi Protected Setup (WPS)

Which of the following is available in all editions of Windows 10 and require special hardware for use?

Windows Hello

With Azure Active Directory join, what does the user need to provide to be automatically joined to Azure AD and enrolled in a mobile device management solution with no additional user interaction?

Work or school user ID and password

Which of the following are networking models that can be used with the Windows operating system? (select two.)

Workgroup and Client-Server

You have a small network with three subnets, as shown in the diagram below. IP addresses for each router interface are also indicated. You need to connect Wrk1 to Subnet A, and you need to connect Wrk5 to Subnet C. Each workstation needs a static IP address that allows it to communicate on the connected subnet. Drag the IP addresses on the left to the workstation it should be assigned to on the right. (Only one IP address is appropriate for each workstation).

Wrk1: 192.168.111.62 Wrk5: 10.155.64.97

You need to develop and install a sideloaded app on the Windows 10 Professional systems within your organization. You plan to use a certificate purchased from Symantec to digitally sign the app prior to sideloading it on your Windows systems. Which of the following is true regarding this process?

You do not need to manually import the certificate used to digitally sign the app on each system.

Which of the following are valid IPv6 addresses? (select two.)

bab3:b834:45a3:0000:0000:762e:0270:5554 35BC:FA77:4898:DAFC:200C:FBBC:A007:8973

Your user account is User1. You want to sign in to the corpwest domain from a computer that you haven't used before. You are at the sign-in screen. Just below the username and password fields, you see that this computer will try to sign in to the corpsouth domain by default. Which of the following should you enter in the username field to change the domain the computer signs onto?

corpwest\User1

-n

displays addresses and port numbers in numerical form

-a

displays all connections and listening ports

ipconfig

displays all current TCP/IP network configuration values and refreshes the DHCP and DNS settings

-s

displays per-protocol statistics

-o

displays the owning process ID associated with each connection

You are using PowerShell cmdlets to sideload an app. Which two cmdlets must you run to complete the task?

import-module appx and add-appxpackage

You use a Windows client system on your desktop. Your company has started the migration to IPv6 on the network. You need to configure your computer with a static IPv6 address. Which command should you use to configure a static IPv6 address?

netsh

You have installed a test network with one server and two Windows workstations. All are running IPv6. You have disabled IPv4 and now want to test to make sure that IPv6 is used to communicate between hosts. You want to ping the link-local address for a host. Which command can you use to do this?

ping FE8-::AB13:7845:410C:9956%12


Conjuntos de estudio relacionados

Exploraciones (2nd edition) Capítulo 6

View Set

Week 2: Data visualization (Pandas, Matplotlib, seaborn) (mlcourse.ai)

View Set