Managing Windows Devices
Which role in Microsoft Intune grants its members the ability to make a purchase, manage subscriptions, manage support tickets, and monitor service health?
the Billing Administrator role
Which command can be used to add the EFS certificate of a user to a file?
the CIPHER command
Which command-line utility manages file encryption?
the CIPHER command-line utility
Which utility allows you to submit certificate requests to a Certificate Authority via the command line?
the CertReq utility
Which printer setting allows a salesperson to have different default printer for the different offices to which the salesperson travels?
the Change my default printer when I change networks option
Which group policy setting allows you to configure the encryption type used and the cipher strength?
the Choose drive encryption method and cipher strength setting in the Computer Configuration \ Administrative Templates \ Windows Components \ BitLocker Drive Encryption node
Which group policy setting controls when background synchronization occurs while operating in slow-link mode?
the Configure Background Sync group policy setting under Computer Configuration \ Policies \ Administrative Templates \ Network \ Offline files
Which group policy setting controls the latency and throughput thresholds so that user access to Offline Files is not degraded when connected to slower networks?
the Configure slow-link mode group policy setting under Computer Configuration \ Policies \ Administrative Templates \ Network \ Offline files
Which group policy setting configures how much TPM owner authorization information is stored in the local registry?
the Configure the level of TPM owner authorization information available to the operating system group policy setting
Which group policy setting in the Computer Configuration > Administrative Templates > System > Trusted Platform Module Services node configures how much TPM owner authorization information is stored in the local registry?
the Configure the level of TPM owner authorization information available to the operating system setting
Which wireless network setting will ensure that the computer will connect to and use the wireless network any time it is available?
the Connect automatically setting
Which two commands can be used to add an LOB application to a Windows image?
the DISM command or the Add-AppxProvisionedPackage cmdlet
Which group policy setting prevents all users from copying information to any fixed drive that is not encrypted?
the Deny write access to fixed drives not protected by BitLocker setting in the Computer Configuration \ Administrative Templates \ Windows Components \ BitLocker Drive Encryption \ Fixed Data Drives node
Which group policy setting prevents all users from copying information to any USB drive that is not encrypted?
the Deny write access to removable drives not protected by BitLocker setting in the Computer Configuration \ Administrative Templates \ Windows Components \ BitLocker Drive Encryption \ Removable Data Drives node
Which Microsoft Intune report allows you to view the applications that are installed on your devices?
the Detected Software Report
Which group policy setting in the Computer Configuration / Policies / Administrative Templates / Windows Components / Portable Operating System node controls whether a computer can enter sleep mode states S1-S3?
the Disallow standby sleep states (S1-S3) when starting from a Windows To Go workspace setting
Which group policy setting controls whether UE-V will use the Offline Files feature?
the Do not use Offline Files setting
Which group policy setting determines whether offline files are synchronized in the background when extra charges could occur on cell phone or broadband plans?
the Enable file synchronization on costed networks group policy setting under Computer Configuration \ Policies \ Administrative Templates \ Network \ Offline files
Which Microsoft Intune Agent policy enables monitoring and scanning of all files and applications that are loaded for use?
the Enable real-time protection Microsoft Intune Agent policy
Which group policy setting should you enable to ensure that the offline files that reside on the user's hard drive are encrypted?
the Encrypt the Offline Files cache setting under Computer Configuration \ Policies \ Administrative Templates \ Network \ Offline files
Which policy controls whether disk quota limits are enforced?
the Enforce disk quota limit group policy under the Computer Configuration/Administrative Templates/System/Disk Quotas node
Which feature in Windows 10 retains the file history of user files to ensure that users can recover a previous version of documents, pictures, and other user files?
the File History feature
Which role in Microsoft Intune grants its members the ability to perform all administrative tasks?
the Global Administrator role, also referred to as the Tenant Administrator
Which group policy setting in the Computer Configuration > Administrative Templates > System > Trusted Platform Module Services node controls whether certain TPM commands are blocked?
the Ignore the default list of blocked TPM commands setting
Which method of resetting a Windows 10 computer in the Recovery section on the Update and Security page section of Settings retains all of your personal files and Windows Store applications? restores it to its original factory settings, and requires the Windows product key?
the Keep My Files option
Which method of resetting a Windows 10 computer in the Recovery section on the Update and Security page section of Settings retains all of your personal files and Windows Store applications?
the Keep my files option
Which OneDrive options controls the fetching behavior of OneDrive and is enabled by default when OneDrive is installed?
the Let me use OneDrive to fetch any of my files on this PC option on the Settings tab of the Microsoft OneDrive Properties dialog box
Which group policy setting specifies the amount of total disk space that can be used by Offline Files and the amount of disk space used by auto-cached files?
the Limit disk space used by Offline Files group policy setting under Computer Configuration \ Policies \ Administrative Templates \ Network \ Offline files
Which Microsoft Intune policy template creates policies that you can use to configure the Microsoft Intune Endpoint Protection policy settings and Updates policy settings?
the Microsoft Intune Agent Settings template
Which Microsoft Intune policy template creates policies that you can use to configure the support contact information that is shown in Microsoft Intune Center?
the Microsoft Intune Center Settings template
Which Windows Firewall setting controls the Windows 10 computer's actions that occur when a new app is blocked?
the Notify me when Windows Firewall blocks a new program option for the Private network settings
Which role in Microsoft Intune grants its members the ability to reset passwords, manage service requests, and monitor service health?
the Password Administrator role
Which group policy setting disables the View Files button on the Offline Files tab?
the Prevent use of Offline Files folder setting under either the User Configuration \ Policies \ Administrative Templates \ Network \ Offline files path or the Computer Configuration \ Administrative Templates \ Network \ Offline files path
Which group policy setting prevents users from enabling, disabling, or changing the Offline Files configuration?
the Prevent user configuration of Offline Files group policy setting under Computer Configuration \ Administrative Templates \ Network \ Offline files
By default, which network profile is configured with network discovery and file and printer sharing disabled?
the Public network profile
Which settings will prevent a Windows 10 laptop from using the mobile wireless connection to download device, operating system, and application updates?
the Set as metered connection setting
Which group policy setting monitors the size of the settings package for the UE-V agent?
the Settings package size warning threshold setting
Which group policy setting configures the location where the settings package files are stored for UE-V?
the Settings storage path setting
Which group policy setting configures the location where the UE-V settings templates are stored?
the Settings template catalog path setting
Which policy configures the disk quota limit and the warning level?
the Specify the default quota limit and warning level group policy under the Computer Configuration/Administrative Templates/System/Disk Quotas node
Which group policy setting sets a threshold for the maximum number of milliseconds that a computer waits when obtaining user settings from the settings storage location when using UE-V?
the Synchronization timeout setting
Which applet in Control Panel can be used to create a restore point?
the System applet
Which power plan setting is configured for 20 minutes when plugged in and 10 minutes when on battery in the Balanced, High Performance, and Power Saver plans?
the Turn off hard disk after setting
Which group policy controls access to the entire Windows Store?
the Turn off the Store application group policy in the Computer Configuration\Administrative Templates\Windows Components\Store path
Which group policy setting will ensure that the TPM owner information is backed up to a central location?
the Turn on TPM backup to Active Directory Domain Services group policy setting
Which group policy setting in the Computer Configuration > Administrative Templates > System > Trusted Platform Module Services node will ensure that the TPM owner information is backed up to a central location?
the Turn on TPM backup to Active Directory Domain Services setting
Which option on the Security tab of the Broadband Connection Properties dialog box should you select if you need to use certificates?
the Use Extensible Authentication Protocol (EAP) option
Which group policy setting enables or disables UE-V?
the Use User Experience Virtualization (UE-V) setting
Which role in Microsoft Intune grants its members the ability to reset passwords, monitor service health, and manage user accounts, user groups, and service requests?
the User Management Administrator role
Which role in Microsoft Intune grants its members the ability to manage service requests and monitor service health?
the User management administrator role
Which Microsoft Intune policy template controls incoming and outgoing network traffic?
the Windows Firewall Settings template
Which Windows Firewall group policy allows IT technicians to connect to the computer over TCP port 3389?
the Windows Firewall: Allow inbound Remote Desktop exceptions policy in the Network\Network Connections\Windows Firewall\Domain Profile path
When a file is encrypted, who can decrypt the file and access it?
the person who encrypted the file or the person with the Recovery Certificate
Which commands should you run to activate the sideloading product key on a device running Windows 10 Pro if they are not members of a domain?
the slmgr /ipk <sideloading product key> and slmgr /ato ec67814b-30e6-4a50-bf7b-d55daf729d1e commands
Which utility is used to perform a one-time backup of a computer?
the wbadmin utility
How many gestures must a picture password include?
three gestures
What is the main purpose of Remote Assistance?
to allow a remote user to temporarily connect to your computer to complete a task or to demonstrate how to do something
What is the purpose of WiFi Direct in Windows 10?
to allow the user's devices to communicate with each other while they are in close proximity
Where can the startup key for BitLocker encryption be backed up?
to any non-operating system drive, including USB flash drives
What is the main purpose of Remote Desktop?
to connect to a computer from a remote location
What is the purpose of the Desktop Background option on the Experience tab of a remote desktop connection?
to have the desktop background of the server be displayed when you log on to the server with Remote Desktop
How many physical disks are required to create a two-way mirror space?
two or more physical disks
How many devices are supported by broadband tethering in Windows 8.1?
up to 10
When you purchase a Windows Store app for Windows 8.1, how many devices can the app be installed on?
up to 81 devices
Which PowerShell cmdlet creates a new virtual hard disk with the specified path and connects it to the new virtual machine?
-NewVHDPath <String>
With the Remote Business Data Removal (Selective Wipe) feature in Windows 10 and Window Server 2012 R2, which data will NOT be removed with a remote wipe on a corporate device?
user owned data
Which of the following technologies offer authentication protection, confidentiality of the machine and its contents, private keys for security, and encrypted card information that cant be mined or removed?
A compatible TPM chip and a virtual smart card
Which cryptographic algorithm that works with IPSec uses an encryption key of up to 256 bits?
AES
Where in Settings on a Windows 10 computer do you configure the ability to sync sign-in information for websites, networks, apps and HomeGroups across multiple devices?
Account > Sync your Settings
Which cmdlet would you use to provision an app for all users to be installed at first logon?
Add-AppxProvisionedPackage-Online-PackagePath $PackagePath-DependencyPackagePath $DependencyPackagePath-LicensePath $LicensePath
Which cmdlet would you use to configure a VPN connection that automatically connects a Windows 8.1 client to a VPN when an application is run?
Add-VpnConnectionTriggerApplication
What power shell commands can you use to manage a CA database?
Backup-CARoleService and Restore CARoleService
Which PowerShell cmdlet creates a virtual machine snapshot?
Checkpoint-VM
What should you do to ensure that your clients get critical or security updates as soon as possible using Microsoft Intune?
Configure Microsoft Intune auto-approval rules.
What steps must you take to enable the Office Deployment Tool to configure Click-to-Run for Office 365 clients?
Download the Office Deployment Tool (ODT) to the server. Prepare a configuration file Run the ODT with the configure command (setup.exe /configure)
Which authentication protocol for VPN in Windows 8.1 allows for arbitrary authentication of a remote access connection through the use of authentication schemes, and offers the strongest security of other authentication protocols?
EAP
Which IPSec protocol provides integrity, authentication, and confidentiality?
Encapsulating Security Payload (ESP)
If you want to have the Selective Wipe functionality on a Windows 10 laptop instead of a Windows 8 phone, how do you configure the Windows 10 laptop in Microsoft Intune?
Enroll the laptop as a mobile device and do not install the Intune agent
True or false: You can create a required installation for an app in Microsoft Intune, which will automatically install on devices
False
What criteria does Windows 10 use to adjust the preference of available networks?
It automatically adjusts the preference of the networks based on usage and metering settings.
Which PowerShell cmdlet configures new firewall rules?
New-NetFirewallRule
When creating a system image backup from the File History applet, what are the options for the destination location for the backup?
On a hard disk, on one or more DVDs, or a network location
Which VPN type(s) on the Security tab of the VPN Connection Properties dialog box in Windows 8 uses Microsoft Point-to-Point Encryption (MPPE) that generates keys from the MS-CHAP v2 or EAP-TLS authentication?
PPTP
What are the four types of VPNs that you can configure on the Security tab of the VPN Connection Properties dialog box in Windows 8.1?
PPTP, L2TP, SSTP, or IKEv2
Which of the following is not a type of virtual switch?
Public
Which VPN type(s) on the Security tab of the VPN Connection Properties dialog box in Windows 8.1 encrypts the message with the SSL channel of the HTTPS protocol?
SSTP
What setting ensures that all updates to Windows Store apps will be downloaded?
The Update apps automatically setting in the Apps updates section of the Windows Store, which defaults to On.
What Happens when a user who as been assigned a mandatory user profile makes changes to the desktop background and screensaver?
The changes are not saved to the user profile when the user logs off
How and where do you, as an administrator, provision mobile users for device enrollment if you don't have AD DS in your environment?
You add users manually from the Windows Intune account portal, under Admin, from the Users tab
Which parameter of the CIPHER command displays files with the hidden or system attribute?
the /H parameter
Which Microsoft Intune policy template controls mobile device security settings?
the Mobile Device Security Policy template
Can you access files on a Windows 10 computer with the OneDrive app if the computer does not have Internet connectivity?
yes, if the files are cached locally
Which of the following is true of BitLocker To Go? -BitLocker To Go enables you to protect removable USB devices with BitLocker encryption -A BitLocker To Go device can be a USB flash drive -A BitLocker To Go device can be a removable hard disk -BitLocker To Go drives can be formatted with NTFS, FAT16, FAT32, or exFat file
-BitLocker To Go enables you to protect removable USB devices with BitLocker encryption -A BitLocker To Go device can be a USB flash drive -A BitLocker To Go device can be a removable hard disk -BitLocker To Go drives can be formatted with NTFS, FAT16, FAT32, or exFat file
What steps must you use to have the Office Deployment Tool to generate a Click-to-Run for an Office 365 installation source?
-Download the Office Deployment Tool (ODT) to the server. -Prepare a configuration file -Run the ODT with the download command (setup.exe /download)
Which PowerShell cmdlet specifies the path to a virtual hard disk file?
-VHDPath <String>
What are the qualities of a storage space with the Parity resiliency type?
-You need at least three hard drives. -Data is striped across the disks with the parity information. -If a single disk fails, the data is still available.
Before updating BIOS on a computer that has BitLocker enabled, what should which switch of the manage-bde command should you use to stop encryption?
-disable
What file type is the VM checkpoint differencing file?
.avhd
What file type contains the VM memory content?
.bin
What file type is the VM saved state file?
.vsv
Which VM file types are ONLY created when a checkpoint is taken while the VM is on?
.vsv and .bin
What file type is the VM configuration file?
.xml
What are the correct steps that you should complete to ensure that a user can access files from another computer when a computer is offline?
1. On the computer that needs access to the folder, establish a sync partnership with the computer on which the files reside normally. 2. From the same computer, navigate to the folder that you need to use offline. 3. Right-click the folder, and select the Always available offline option. 4. Set up a synchronization schedule by clicking the Schedule option in the Sync Center.
On how many devices can you install a Windows Store app?
10
If a 3 GB file is compressed to 2 GB, what file size will count toward the disk quota?
3 GB will be counted toward the disk quota because compressed files are tracked based on their uncompressed sizes.
What content is restored when you restore a system image?
A complete restoration occurs. It is not possible to choose individual items to restore.
What is the difference between a soft quota and a hard quota?
A hard quota type will not allow the users to exceed the quota limit. A soft quota type will allow the user to exceed the quota limit. A soft quota type is used typically for monitoring storage use before implementing a hard quota type.
What is a trusted PC?
A trusted PC is a computer that you've added to the password reset information for your Microsoft account.
What does the term "sideloading" mean?
A way to distribute LOB apps to client computers without using the Microsoft store
Which of the following can you manage in the Office Admin 365 Center?
Active Directory Synchronization, [Valid, expired, and assigned licenses], and User password, including resetting
Which cmdlet would you use to configure a VPN connection that connects automatically to a VPN when a DNS suffix is used?
Add-VpnConnectionTriggerDns
Which group policy setting do you have to enable before you can sideload apps in Windows 10?
Allow All Trusted Apps to Install
What Windows 10 feature can be used to prevent users from installing certain Windows Store apps, without preventing the installation of all Windows Store apps?
An AppLocker Packaged app rule
Which IPSec protocol provides integrity and authentication and protects against replay attacks?
Authentication Header (AH)
What are the three pre-defined power plans in Windows 10?
Balanced, Power saver, and High performance
Which Windows 10 security feature provides data encryption for external hard drives?
BitLocker
Which Windows 10 security feature provides data encryption for portable drives?
BitLocker To Go
How can two users edit a spreadsheet in OneDrive at same time?
By simply editing the spreadsheet. OneDrive supports real time collaboration.
What should you do to prevent data from being forwarded across the VPN connection?
Clear the Use default gateway on remote network setting on the Advanced TCP/IP settings for the VPN connection.
What PowerShell cmdlet will copy a file named junk.txt from the D drive of the host to the C drive of a VM named Win10-wks ?
Copy-VMFile "Win10-wks" -SourcePath "D:\junk.txt" -DestinationPath "C:\junk.txt" -CreateFullPath -FileSource Host
What should you do to ensure that you can restore a virtual machine back to its state before an application was installed?
Create a checkpoint of the virtual machine.
Three family members share a single computer. All of their documents are saved in a single Documents folder, as is the case with their pictures, videos, and music. All of their data is mixed together and is causing problems. You determined that they are all using the same user profile. What should you do to remedy this?
Create a user account for each user
Can Credential Manager and Credential Locker be used to store passwords for Windows Store Apps? Can Credential Manager and Credential Locker be used to store passwords saved for local network resources?
Credential Manager can store Windows Store Passwords as well as passwords for local resources
Which DISM command would you use to provision an app for all users to be installed at first logon?
DISM /Online /Add-ProvisionedAppxPackage /PackagePath:C:\App1.appx /SkipLicense
Which of the following tools and technologies can help you sideload LOB apps for computers in your organization?
DISM, Windows Power Shell, Configuration Manager, Microsoft Intune
What are the three options that can be configured as part of the Roam Windows settings group policy?
Desktop Settings, Ease of access, and Themes
Which feature allows a user to restore a previous version of an updated device driver on a system?
Device Driver Rollback
What must you implement on a Windows Server 2012 R2 server to ensure that specific domain users using a specific device can access highly sensitive data?
Dynamic Access Control (DAC)
What setting must you configure in Group Policy to enable Windows 10 devices to request claims and compound authentication?
Enable the KDC support for claims, compound authentication, and Kerberos armoring policy under Computer Configuration > Administrative Templates > System > Kerberos.
What setting must you configure in Group Policy to enable Windows 10 devices to receive compound authentication?
Enable the Support compound authentication policy under Computer Configuration > Administrative Templates > System > Kerberos.
Which PowerShell cmdlet configures the computer to receive Windows PowerShell remote commands that are sent by using the WS-Management technology?
Enable-PSRemoting
Which Windows 8.1 feature allows a VPN to automatically reconnect when a network connection becomes available?
Fast Reconnect
How long can File History saved versions of files?
Forever
Where can you add multiple email address aliases for an Office365 account?
From the Office 365 portal, modify the Users settings of each user.
What are the available share permissions?
Full Control, Change, and Read
What are the available NTFS permissions?
Full Control, Modify, Write, List Folder Contents, Read & Execute, and Read
Name a template that contains the policy setting User Account Control is not configured for a Windows 10 computer?
General Configuration does contain the policy setting User Account Control Trusted Certificate Profile
You are creating a VM and need it to be backward compatible with operating systems prior to Windows Server 2012 and Windows 8. Which of the following describes the type of VM you need to create?
Generation 1
In which four ways can you view the update history in Windows Update to find a list of updates that have been applied to your computer?
Go to Settings -> Update and Security -> Advanced Options-> View your update history Go to Control Panel, select Programs and Features, and choose View Installed Updates Open Event Viewer, expand Applications and Services Logs, expand Microsoft, expand Windows, expand WindowsUpdateClient, and expand Operational. View the ReportingEvents.log file under the C:\Windows\SoftwareDistribution directory.
If your PC isn't running well, how can you refresh Windows 10 without losing your photos, music, videos, or other personal files?
Go to Settings, choose Update and Security, choose Recovery, choose Reset this PC, and choose Keep my files
What should you do to perform a push-button refresh on a Windows 10 computer?
Go to Settings, choose Update and Security, choose Recovery, choose Reset this PC, and choose Keep my files
What should you do to perform a push-button reset on a Windows 10 computer?
Go to Settings, choose Update and Security, choose Recovery, choose Reset this PC, and choose Remove everything
What integration service must be enabled to copy files to a running VM from the host without shutting the VM down?
Guest Services
Which cryptographic algorithm that works with IPSec uses a 160-bit encryption key?
HMAC
Which Windows 10 feature is used to share files over a local wired or wireless network?
HomeGroup
Which VPN protocol is used by VPN Reconnect?
IKEv2
Where can you configure a group policy that restricts the use of Microsoft accounts for a specific group of users in an Active Directory Domain
In the group Policy Management Editor window, by expanding Computer / Configuration / Policies / Windows Settings / Security Settings / Local Policies / Security Options
Where can users associate a Microsoft account with a domain account?
In the settings app, on the Accounts page
By default, what does File History back up?
It backs up important files stored in Libraries, Desktop, Favorites, and Contacts.
What is the purpose of the Roam Windows settings group policy?
It ensures that users' themes, ease of access, and desktop settings are included as part of the Microsoft User Experience Virtualization (UE-V).
What are the hard drive requirements for the File History feature?
It requires a hard drive or network location as the destination
What happens if you disable the Turn off the Store application group policy in the Computer Configuration\Administrative Templates\Windows Components\Store path?
It will allow access to the Windows Store application.
Which VPN type(s) on the Security tab of the VPN Connection Properties dialog box in Windows 8.1 encrypts the message by using AES 256, AES 192, AES 128, or 3DES encryption algorithms?
L2TP or IKEv2
You want to enable your domain users to access the same desktop background, app settings, browser history, and so on so they see on their main computers at home. What should they do?
Let users associate their Microsoft accounts with their domain accounts
Which command shows how to enable encryption and thus BitLocker on drive D on a Windows 10 computer, and add numerical and external key protectors?
Manage-bde -on D: -enable -RecoveryKey f:\ -recoverypassword and -recoverykey are both key protectors
Which component of the Microsoft Desktop Optimization Pack (MDOP) allows administrators to manage the drive encryption settings, including the encryption method and cipher strength, at the enterprise level for all computers on a network?
Microsoft BitLocker Administration and Monitoring (MBAM)
Which tool enables administrators to automate the process of encrypting volumes on client computers across the enterprise?
Microsoft BitLocker Administration and Monitoring (MBAM) 2.5
Which tool enables end users to recover encrypted devices independently by using the Self-Service Portal?
Microsoft BitLocker Administration and Monitoring (MBAM) 2.5
Which tool enables security officers to easily audit access to recover key information?
Microsoft BitLocker Administration and Monitoring (MBAM) 2.5
Which tool provides enterprise management capabilities for BitLocker and BitLocker to Go?
Microsoft BitLocker Administration and Monitoring (MBAM) 2.5
What is not supported for management using Microsoft Intune?
Microsoft Intune does not support Windows XP SP1
What PowerShell cmdlet would move a VM named AppServer to the F drive while the VM is still running?
Move-VMStorage "AppServer" DestinationStoragePath F:\AppServer
What is the first thing end users need to do before they configure sync options in Sync Center?
Navigate to a share on a different computer or file server, right click that share, and click always available offline
Which PowerShell cmdlet can add both inbound and outbound firewall rules?
New-NetFirewallRule
Which Power Shell cmdlet creates a new IPv4 address or IPv6 address when the IP address is already configured?
New-NetIPAddress
Which PowerShell cmdlet creates a virtual machine on a Windows 10 computer?
New-VM
Can encrypted files be backed up using File History?
No
What option do you choose in PC Settings on a Windows 8.1 computer to sync PC settings across all of your devices?
OneDrive > Sync Settings
What devices can you use to access files in OneDrive?
OneDrive is accessible from the Web, a desktop, mobile devices, and the Xbox One and Xbox 360 consoles
If you consider all the recovery methods with Windows 10, when should you use a recovery drive to perform a System Image Recovery?
Only if other recovery methods are unsuccessful
How many system image backups per computer can be kept at a backup location?
Only one system image per computer can be kept at a backup location
What steps should you perform to create a system image with a GUI utility in Windows 10?
Open Backup and Restore (Windows 7) in Control Panel and select Create a system image on the left-hand side.
How can you disable automatic updates to Windows Store apps on a Windows 10 computer?
Open Windows Store and navigate to Settings, then App Updates. Change the option Automatically Update My Apps to No.
Which authentication protocols do Windows 8.1 and Windows Server 2012 R2 support for VPN?
PAP, CHAP, MS-CHAPv2, EAP, and Digital Certificates
What are some advantages of using VHDX format for your VHD files (Instead of the VHD format?)
Protection against data corruption when there is a power failure, Improved performance on large sector disks, and Larger block sizes for dynamic and differencing disks to enhance performance
Which security feature in Windows 10 and Window Server 2012 R2 can you use to classify and flag corporate files, and to differentiate between these files and user files?
Remote Business Data Removal, also referred to as Selective Wipe
Which PowerShell cmdlet deletes firewall rules?
Remove-NetFirewallRule
Which cmdlet removes a physical disk from a specified storage pool?
Remove-PhysicalDisk
How do you prevent a Windows update from being shown in the Available Updates list?
Right-click the update, and select Hide update.
You want to secure communications over an untrusted network for applications that need internet access. You want to user TLS and SSL to achieve this. Which of the following technologies offer this?
Secure Channel
What should you do to ensure that licenses for Windows Store apps are synchronized between devices?
Select the Sync licenses setting in the Apps updates section of the Windows Store.
How does Selective Wipe only destroy corporate data and not personal data on a device?
Selective Wipe associates the corporate data, not personal data, with a symmetric key to an Internet domain, destroying the key that is associated with the domain revokes all access to the protected content.
What should you do to ensure that all Windows To Go implementations are able to enter hibernate mode?
Set the Allow hibernate (S4) when starting from a Windows To Go workspace setting in the Computer Configuration / Policies / Administrative Templates / Windows Components / Portable Operating System node to Enabled.
What PowerShell cmdlet would allow a user named Adele to use a Windows Store application named Moneytracker?
Set-AssignedAccess -UserName Adele -AppName Moneytracker
Which PowerShell cmdlet enables the domain, public, or private profiles?
Set-NetFirewallProfile
Which PowerShell cmdlet modifies existing firewall rules?
Set-NetFirewallRule
Which PowerShell cmdlet that changes the subnet mask or default gateway for an IPv4 or IPv6 address?
Set-NetIPAddress
Which PowerShell command sets a Windows 8.1 computer's IPv6 configuration?
Set-NetIPv6Protocol
What is the appropriate method for adding a sideloading product key?
Sideloading product keys must be first added using slmgr /ipk and then activated using slmgr /ato.
What are the three authentication factors?
Something the user knows - password, PIN, picture password, Microsoft Account Something the user has - smart card, ATM card Something the user is - biometrics
Which BIOS component is required to offer full BitLocker support in Windows 10?
TPM
In which pane of Hyper-V Manager do you configure host networking and settings, import virtual machines, and create new virtual machines?
The Actions Pane offers a list of tasks you can perform
Name an account type has the ability to enroll more than five devices?
The Device Enrollment Manager can enroll large numbers of devices, and is typically used specifically for that purpose
By default, where are the local copies of Work Folders stored on a Windows 10 device?
The Files are stored in %USERPROFILE%\Work Folders
What is the rule when combining NTFS and share permissions?
The MOST restrictive permission is the one that applies.
What utility do you use to create a recovery drive on a Windows 10 computer?
The Recovery Drive wizard
What must you configure on a client to allow the client to use applications on a Remote Desktop Web Access server in a remote location?
The connection URL in the RemoteApp and Desktop Connections applet in Control Panel
Where do you configure the folder location?
The location tab in the Properties dialog box of the default folder
You are trying to install Hyper-V and Control Panel, using the Turn Windows Feature On or Off option, on a computer running Windows 10 Professional. However, Hyper-V Platform is unavailable and can's be enabled. What is the reason for this?
The processor does not support SLAT
What command-line utility can be used with the wbadmin utility to perform full backups of a Windows 10 computer on a daily basis?
The schtasks utility
You create a homegroup on one computer and join it from another. This process goes smoothly. However, when you try to access data shared with the homegroup from the second computer, you cant. What is most likely the problem?
The time is configured incorrectly on the second computer
Which of the following describes the purpose of deep linking an app
To make specific Windows Store apps available through the company portal
Which cryptographic algorithm that works with IPSec uses an encryption key of up to 156 bits?
TripleDES
What are the four types of resiliency that can be used in Windows 10 storage spaces?
Two-way mirror resiliency type Three-way mirror resiliency type Parity resiliency type Simple (no resiliency) resiliency type
You want to ensure that a user who is signed on to a computer can control whether Windows restarts after the installation of scheduled updates deployed from Intune. Which of the following would you configure to accomplish this goal?
Update policies specify when and how updates will be deployed, including whether a signed-on user can override a restart required to complete update installation
If a Windows 10 computer does NOT support TPM version 1.2 or higher, how do you encrypt the hard drive?
Use BitLocker and store the startup key on a USB drive
How should you apply security updates to App-V packages?
Use the Open for Package Upgrade feature.
What should you do to allow a user to sync data and settings between two computers via a cloud?
Use the same Microsoft account on both computers, and configure both computers as trusted computers.
How do you enable Always Offline Mode?
User Group Policy to enable the Configure Slow-Line mode policy setting and set the latency to 1 millisecond
What action could be taken to prevent all users of a non-domain-joined computer from installing Windows Store apps?
Using Local Group Policy Editor, set the Turn off the Store application setting to Enabled
Which new feature of the Windows 8.1 Remote Access client allows you to connect automatically through VPN when applications or network locations are used that require organizational network resources?
VPN Auto-Trigger
What feature of Windows 8 and Windows 10 allows you to connect different laptops that support IEEE 802.11 without a Wi-Fi router or joining a Wi-Fi network?
Wi-Fi Direct
Which of the following devices is not supported for MDM in Microsoft Intune?
Windows 7 devices are not supported, only Windows 8 and later devices are supported by MDM in Microsoft Intune.
Which Windows operating systems support IKEv2?
Windows 7, Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, Windows Server 2012 R2, Windows 8, and Windows 8.1
What happens by default when the user is using a metered connection and is near or over their bandwidth limit or roaming on another provider's network?
Windows 8.1 will switch to Offline mode and disable background synchronization.
What operating system version(s) must your VPN server run to support VPN Reconnect in your enterprise?
Windows Server 2012 R2, Windows Server 2012, or Windows Server 2008 R2
What are limitations of Windows To Go?
Windows To Go is only available for Enterprise customers who are part of the Microsoft Software Assurance Program, TPM can't be used because it is tied to a specific computer and Windows to go drives are used on multiple computers, and the windows recovery environment is not available, and neither is refreshing or resetting. If there is a problem with Windows To Go, it needs to be reimaged
Which of the following network types is a distributed concept, in which users manage their own data sharing?
Workgroup and Homegroup
To configure broadband tethering, how must you configure the network connection from the Network item in Control Panel?
You must enable Internet Sharing for the network
You are trying to configure Group Policy to set an account lockout duration when users try and fail to authenticate their computers after a specific number of events. The options are greyed out, Why?
You must first configure the policy Account Lockout Threshold
What are the requirements to sideload LOB apps to client computers?
You must have enabled sideloading by editing GPO settings, and the LOB apps must be digitally signed
You want computers running Windows 8.1 in your organization's London branch office to install critical operating system updates automatically. Computers running Windows 8.1 in your organization's Liverpool office should install critical operating system updates only if an administrator manually approves those updates. What should you configure to accomplish this goal?
You need to configure a group for the Melbourne computers and then configure an automatic approval rule
You have noticed that updates for Windows 8 and 8.1 are present within a list of available updates in the Intune console, but updates for Windows 10 are not present. What should you configure to resolve this problem?
You need to configure update categories and classifications to ensure that updates for Windows 10 will be available to your Intune deployment.
When using Bit Locker To Go in an enterprise, how can you prevent users from copying data to USB drives that are not encrypted with BitLocker To Go?
You need to enable the Group Policy setting Deny Write Access To Removable Drives Not Protected By Bitlocker
You opted to store your startup key on a USB flash drive when you set up BitLocker. Which of the following is true?
You need to insert that drive every time you want to access the computer and enter the key If you lose the startup key, you'll need to unlock the drive using a recovery key. This is a 48 digit number that can be stored in numerous ways, including on a USB drive.
What is minimum size of a USB flash drive that can be used as recovery drive?
a 512 MB flash drive
Which file can be used to resolve the host names of servers that have an A (IPv4 host record) or AAAA (IPv6 host record) in DNS?
a HOSTS file
Which Microsoft Intune report will allow you to view information about application licenses used by your devices?
a License Report
What must you have to sign-in to a Windows 10 computer, access OneDrive, Mail, Calender and install apps from the Windows Store?
a Microsoft account
Which security rule type in Windows Firewall with Advanced Security is used to authenticate a connection between two specific computers?
a Server-to-Server connection rule
Which security rule type in Windows Firewall with Advanced Security is used to authenticate a connection between two gateway computers?
a Tunnel connection rule
What must be issued to allow a Windows 8.1 computer to be able to establish a VPN Reconnect connection?
a computer certificate
Which virtual switch connection type isolates the virtual machines, meaning that the virtual machines can only communicate with each other?
a private network connection type
What must you create as a prerequisite before performing a System Image Recovery on a Windows 10 computer?
a recovery drive
What tool can you use to run Windows RE and troubleshoot a Windows 10 installation even if the computer cannot start from the hard drive?
a recovery drive
Which type of network connection is required to use the metered/non-metered setting?
a wireless connection
Which security rule type in Windows Firewall with Advanced Security is used when you do NOT want to authenticate connections from certain computers?
an Authentication Exemption connection rule
Which Microsoft Intune report will allow you to view the status of any updates, including critical updates, security updates, definition updates, service packs, and update rollups?
an Update Report
Which virtual switch connection type allows the virtual machines to communicate over the network?
an external connection type
In Windows 10, what resource(s) are required to provide multiple copies of the system image?
an external hard drive
Which virtual switch connection type allows communication between the virtual machines and the management operating system?
an internal network connection type
Which security rule type in Windows Firewall with Advanced Security restricts connections to a Windows 10 computer based on domain membership?
an isolation connection rule
Once you have configured broadband tethering, how many characters must the wi-fi network password contain?
at least eight characters
To support static device claims, what type of tokens must a Windows 10 client or Windows Server 2012 R2 request?
compound tokens (a token that includes both user details and device details)
When can the startup key for BitLocker encryption be backed up?
during the reboot that is part of the initial BitLocker encryption process
How many physical disks are required to create a three-way mirror space?
five or more physical disks
In which type of file should you save your remote desktop settings?
in an .rdp file
Where are the UE-V group policies located after they are installed?
in the Computer Configuration > Policies > Windows Settings > Administrative Templates > Windows Components node
What are the two types of synchronization schedules that you can configure for Offline Files?
on a regular schedule or when certain events occur (such as when a user logs on or when the computer has been idle for 15 minutes)
Where should the User Experience Virtualization (UE-V) Agent be deployed?
on all the client computers
After upgrading from Windows 8 to Windows 10, how long does the Windows.old folder remain on your computer?
one month
What type of device can be used to create a recovery drive?
only a USB flash drive
When saving system images on a network location, which system image is stored?
only the latest version of the system image
Which Windows 10 authentication method requires that you input a series of gestures as part of the authentication process so the user must select the picture to use and enter the gestures at enrollment time?
picture passwords
Which Windows 10 security feature requires that you input a series of gestures as part of the authentication process so the user must select the picture to use and enter the gestures at enrollment time?
picture passwords
What command should you run from the command prompt to view a list of the hardware devices that can wake your computer?
powercfg -devicequery wake_armed
What command should you run from the command prompt to determine why your Windows 10 computer woke up?
powercfg -lastwake
You need to export a power plan you've created in the Power Options pane. What two commands do you use to achieve this?
powercfg.exe -list powercfg.exe -export power.pow GUID
Which option retains all the user files: push-button refresh or push-button reset?
push-button refresh
Which option resets to factory settings: push-button refresh or push-button reset?
push-button reset
What Group Policy action, taken at the domain level, will prevent users from installing Windows Store apps?
set the Turn off the Store application setting to Enabled
Your company has deployed a LOB application using sideloading. What command will activate a product key that has been installed? (Hint: The activation GUID will always be ec67814b-30e6-4a50-bf7b-d55daf729d1e)
slmgr /ato ec67814b-30e6-4a50-bf7b-d55daf729d1e
Your company has deployed a LOB application using sideloading. What command will install the app if it has a product key of xpw3334Polhzz?
slmgr /ipk xpw3334Polhzz
Before updating BIOS on a computer that has BitLocker enabled, what should you do?
suspend BitLocker encryption before you update the BIOS
Which parameter of the Set-NetIPAddress PowerShell cmdlet configures whether IPv4 or IPv6 is used?
the -AddressFamily<AddressFamily[]> parameter
Which parameter of the New-NetFirewallRule PowerShell cmdlet specifies whether an inbound or outbound rule is created?
the -Direction<Direction> parameter
Which parameter of the Set-NetIPv4Protocol PowerShell cmdlet disables multicast communication on a Windows 10 computer?
the -IGMPLevel<None> parameter
Which parameter of the CIPHER command encrypts specified files?
the /E parameter
Which group policy controls the installation properties of Windows Store apps on Windows To Go workspaces?
the Allow Store to install apps on Windows To Go workspaces group policy
Which group policy setting must be enabled to allow computers that are members of a domain to sideload a line of business (LOB) Windows Store app?
the Allow all trusted apps to install setting
Which option will allow a Windows 10 computer to wake when it is time for updates to occur, and is enabled by default?
the Allow scheduled maintenance to wake up my computer at the scheduled time group policy setting in the Maintenance section in Action Center
Which tab of Task Manager displays statistics for each Windows Store application?
the App History tab
Which policy allows you to enable auditing on files and registry keys?
the Audit object access group policy under the Computer Configuration/Windows Settings/Security Settings/Local Policies/Audit Policy node
Which policy audits attempts to change user rights assignment policy, audit policy, account policy, or trust policy?
the Audit policy change group policy under the Computer Configuration/Windows Settings/Security Settings/Local Policies/Audit Policy node
Which policy audits each instance of a user exercising a user right, but does not audit attempts to edit the registry?
the Audit privilege use group policy under the Computer Configuration/Windows Settings/Security Settings/Local Policies/Audit Policy node
Which Windows 10 power plans include the Require a password on wakeup setting?
the Balanced, High Performance, and Power Saver plans