Managing Windows Devices

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which role in Microsoft Intune grants its members the ability to make a purchase, manage subscriptions, manage support tickets, and monitor service health?

the Billing Administrator role

Which command can be used to add the EFS certificate of a user to a file?

the CIPHER command

Which command-line utility manages file encryption?

the CIPHER command-line utility

Which utility allows you to submit certificate requests to a Certificate Authority via the command line?

the CertReq utility

Which printer setting allows a salesperson to have different default printer for the different offices to which the salesperson travels?

the Change my default printer when I change networks option

Which group policy setting allows you to configure the encryption type used and the cipher strength?

the Choose drive encryption method and cipher strength setting in the Computer Configuration \ Administrative Templates \ Windows Components \ BitLocker Drive Encryption node

Which group policy setting controls when background synchronization occurs while operating in slow-link mode?

the Configure Background Sync group policy setting under Computer Configuration \ Policies \ Administrative Templates \ Network \ Offline files

Which group policy setting controls the latency and throughput thresholds so that user access to Offline Files is not degraded when connected to slower networks?

the Configure slow-link mode group policy setting under Computer Configuration \ Policies \ Administrative Templates \ Network \ Offline files

Which group policy setting configures how much TPM owner authorization information is stored in the local registry?

the Configure the level of TPM owner authorization information available to the operating system group policy setting

Which group policy setting in the Computer Configuration > Administrative Templates > System > Trusted Platform Module Services node configures how much TPM owner authorization information is stored in the local registry?

the Configure the level of TPM owner authorization information available to the operating system setting

Which wireless network setting will ensure that the computer will connect to and use the wireless network any time it is available?

the Connect automatically setting

Which two commands can be used to add an LOB application to a Windows image?

the DISM command or the Add-AppxProvisionedPackage cmdlet

Which group policy setting prevents all users from copying information to any fixed drive that is not encrypted?

the Deny write access to fixed drives not protected by BitLocker setting in the Computer Configuration \ Administrative Templates \ Windows Components \ BitLocker Drive Encryption \ Fixed Data Drives node

Which group policy setting prevents all users from copying information to any USB drive that is not encrypted?

the Deny write access to removable drives not protected by BitLocker setting in the Computer Configuration \ Administrative Templates \ Windows Components \ BitLocker Drive Encryption \ Removable Data Drives node

Which Microsoft Intune report allows you to view the applications that are installed on your devices?

the Detected Software Report

Which group policy setting in the Computer Configuration / Policies / Administrative Templates / Windows Components / Portable Operating System node controls whether a computer can enter sleep mode states S1-S3?

the Disallow standby sleep states (S1-S3) when starting from a Windows To Go workspace setting

Which group policy setting controls whether UE-V will use the Offline Files feature?

the Do not use Offline Files setting

Which group policy setting determines whether offline files are synchronized in the background when extra charges could occur on cell phone or broadband plans?

the Enable file synchronization on costed networks group policy setting under Computer Configuration \ Policies \ Administrative Templates \ Network \ Offline files

Which Microsoft Intune Agent policy enables monitoring and scanning of all files and applications that are loaded for use?

the Enable real-time protection Microsoft Intune Agent policy

Which group policy setting should you enable to ensure that the offline files that reside on the user's hard drive are encrypted?

the Encrypt the Offline Files cache setting under Computer Configuration \ Policies \ Administrative Templates \ Network \ Offline files

Which policy controls whether disk quota limits are enforced?

the Enforce disk quota limit group policy under the Computer Configuration/Administrative Templates/System/Disk Quotas node

Which feature in Windows 10 retains the file history of user files to ensure that users can recover a previous version of documents, pictures, and other user files?

the File History feature

Which role in Microsoft Intune grants its members the ability to perform all administrative tasks?

the Global Administrator role, also referred to as the Tenant Administrator

Which group policy setting in the Computer Configuration > Administrative Templates > System > Trusted Platform Module Services node controls whether certain TPM commands are blocked?

the Ignore the default list of blocked TPM commands setting

Which method of resetting a Windows 10 computer in the Recovery section on the Update and Security page section of Settings retains all of your personal files and Windows Store applications? restores it to its original factory settings, and requires the Windows product key?

the Keep My Files option

Which method of resetting a Windows 10 computer in the Recovery section on the Update and Security page section of Settings retains all of your personal files and Windows Store applications?

the Keep my files option

Which OneDrive options controls the fetching behavior of OneDrive and is enabled by default when OneDrive is installed?

the Let me use OneDrive to fetch any of my files on this PC option on the Settings tab of the Microsoft OneDrive Properties dialog box

Which group policy setting specifies the amount of total disk space that can be used by Offline Files and the amount of disk space used by auto-cached files?

the Limit disk space used by Offline Files group policy setting under Computer Configuration \ Policies \ Administrative Templates \ Network \ Offline files

Which Microsoft Intune policy template creates policies that you can use to configure the Microsoft Intune Endpoint Protection policy settings and Updates policy settings?

the Microsoft Intune Agent Settings template

Which Microsoft Intune policy template creates policies that you can use to configure the support contact information that is shown in Microsoft Intune Center?

the Microsoft Intune Center Settings template

Which Windows Firewall setting controls the Windows 10 computer's actions that occur when a new app is blocked?

the Notify me when Windows Firewall blocks a new program option for the Private network settings

Which role in Microsoft Intune grants its members the ability to reset passwords, manage service requests, and monitor service health?

the Password Administrator role

Which group policy setting disables the View Files button on the Offline Files tab?

the Prevent use of Offline Files folder setting under either the User Configuration \ Policies \ Administrative Templates \ Network \ Offline files path or the Computer Configuration \ Administrative Templates \ Network \ Offline files path

Which group policy setting prevents users from enabling, disabling, or changing the Offline Files configuration?

the Prevent user configuration of Offline Files group policy setting under Computer Configuration \ Administrative Templates \ Network \ Offline files

By default, which network profile is configured with network discovery and file and printer sharing disabled?

the Public network profile

Which settings will prevent a Windows 10 laptop from using the mobile wireless connection to download device, operating system, and application updates?

the Set as metered connection setting

Which group policy setting monitors the size of the settings package for the UE-V agent?

the Settings package size warning threshold setting

Which group policy setting configures the location where the settings package files are stored for UE-V?

the Settings storage path setting

Which group policy setting configures the location where the UE-V settings templates are stored?

the Settings template catalog path setting

Which policy configures the disk quota limit and the warning level?

the Specify the default quota limit and warning level group policy under the Computer Configuration/Administrative Templates/System/Disk Quotas node

Which group policy setting sets a threshold for the maximum number of milliseconds that a computer waits when obtaining user settings from the settings storage location when using UE-V?

the Synchronization timeout setting

Which applet in Control Panel can be used to create a restore point?

the System applet

Which power plan setting is configured for 20 minutes when plugged in and 10 minutes when on battery in the Balanced, High Performance, and Power Saver plans?

the Turn off hard disk after setting

Which group policy controls access to the entire Windows Store?

the Turn off the Store application group policy in the Computer Configuration\Administrative Templates\Windows Components\Store path

Which group policy setting will ensure that the TPM owner information is backed up to a central location?

the Turn on TPM backup to Active Directory Domain Services group policy setting

Which group policy setting in the Computer Configuration > Administrative Templates > System > Trusted Platform Module Services node will ensure that the TPM owner information is backed up to a central location?

the Turn on TPM backup to Active Directory Domain Services setting

Which option on the Security tab of the Broadband Connection Properties dialog box should you select if you need to use certificates?

the Use Extensible Authentication Protocol (EAP) option

Which group policy setting enables or disables UE-V?

the Use User Experience Virtualization (UE-V) setting

Which role in Microsoft Intune grants its members the ability to reset passwords, monitor service health, and manage user accounts, user groups, and service requests?

the User Management Administrator role

Which role in Microsoft Intune grants its members the ability to manage service requests and monitor service health?

the User management administrator role

Which Microsoft Intune policy template controls incoming and outgoing network traffic?

the Windows Firewall Settings template

Which Windows Firewall group policy allows IT technicians to connect to the computer over TCP port 3389?

the Windows Firewall: Allow inbound Remote Desktop exceptions policy in the Network\Network Connections\Windows Firewall\Domain Profile path

When a file is encrypted, who can decrypt the file and access it?

the person who encrypted the file or the person with the Recovery Certificate

Which commands should you run to activate the sideloading product key on a device running Windows 10 Pro if they are not members of a domain?

the slmgr /ipk <sideloading product key> and slmgr /ato ec67814b-30e6-4a50-bf7b-d55daf729d1e commands

Which utility is used to perform a one-time backup of a computer?

the wbadmin utility

How many gestures must a picture password include?

three gestures

What is the main purpose of Remote Assistance?

to allow a remote user to temporarily connect to your computer to complete a task or to demonstrate how to do something

What is the purpose of WiFi Direct in Windows 10?

to allow the user's devices to communicate with each other while they are in close proximity

Where can the startup key for BitLocker encryption be backed up?

to any non-operating system drive, including USB flash drives

What is the main purpose of Remote Desktop?

to connect to a computer from a remote location

What is the purpose of the Desktop Background option on the Experience tab of a remote desktop connection?

to have the desktop background of the server be displayed when you log on to the server with Remote Desktop

How many physical disks are required to create a two-way mirror space?

two or more physical disks

How many devices are supported by broadband tethering in Windows 8.1?

up to 10

When you purchase a Windows Store app for Windows 8.1, how many devices can the app be installed on?

up to 81 devices

Which PowerShell cmdlet creates a new virtual hard disk with the specified path and connects it to the new virtual machine?

-NewVHDPath <String>

With the Remote Business Data Removal (Selective Wipe) feature in Windows 10 and Window Server 2012 R2, which data will NOT be removed with a remote wipe on a corporate device?

user owned data

Which of the following technologies offer authentication protection, confidentiality of the machine and its contents, private keys for security, and encrypted card information that cant be mined or removed?

A compatible TPM chip and a virtual smart card

Which cryptographic algorithm that works with IPSec uses an encryption key of up to 256 bits?

AES

Where in Settings on a Windows 10 computer do you configure the ability to sync sign-in information for websites, networks, apps and HomeGroups across multiple devices?

Account > Sync your Settings

Which cmdlet would you use to provision an app for all users to be installed at first logon?

Add-AppxProvisionedPackage-Online-PackagePath $PackagePath-DependencyPackagePath $DependencyPackagePath-LicensePath $LicensePath

Which cmdlet would you use to configure a VPN connection that automatically connects a Windows 8.1 client to a VPN when an application is run?

Add-VpnConnectionTriggerApplication

What power shell commands can you use to manage a CA database?

Backup-CARoleService and Restore CARoleService

Which PowerShell cmdlet creates a virtual machine snapshot?

Checkpoint-VM

What should you do to ensure that your clients get critical or security updates as soon as possible using Microsoft Intune?

Configure Microsoft Intune auto-approval rules.

What steps must you take to enable the Office Deployment Tool to configure Click-to-Run for Office 365 clients?

Download the Office Deployment Tool (ODT) to the server. Prepare a configuration file Run the ODT with the configure command (setup.exe /configure)

Which authentication protocol for VPN in Windows 8.1 allows for arbitrary authentication of a remote access connection through the use of authentication schemes, and offers the strongest security of other authentication protocols?

EAP

Which IPSec protocol provides integrity, authentication, and confidentiality?

Encapsulating Security Payload (ESP)

If you want to have the Selective Wipe functionality on a Windows 10 laptop instead of a Windows 8 phone, how do you configure the Windows 10 laptop in Microsoft Intune?

Enroll the laptop as a mobile device and do not install the Intune agent

True or false: You can create a required installation for an app in Microsoft Intune, which will automatically install on devices

False

What criteria does Windows 10 use to adjust the preference of available networks?

It automatically adjusts the preference of the networks based on usage and metering settings.

Which PowerShell cmdlet configures new firewall rules?

New-NetFirewallRule

When creating a system image backup from the File History applet, what are the options for the destination location for the backup?

On a hard disk, on one or more DVDs, or a network location

Which VPN type(s) on the Security tab of the VPN Connection Properties dialog box in Windows 8 uses Microsoft Point-to-Point Encryption (MPPE) that generates keys from the MS-CHAP v2 or EAP-TLS authentication?

PPTP

What are the four types of VPNs that you can configure on the Security tab of the VPN Connection Properties dialog box in Windows 8.1?

PPTP, L2TP, SSTP, or IKEv2

Which of the following is not a type of virtual switch?

Public

Which VPN type(s) on the Security tab of the VPN Connection Properties dialog box in Windows 8.1 encrypts the message with the SSL channel of the HTTPS protocol?

SSTP

What setting ensures that all updates to Windows Store apps will be downloaded?

The Update apps automatically setting in the Apps updates section of the Windows Store, which defaults to On.

What Happens when a user who as been assigned a mandatory user profile makes changes to the desktop background and screensaver?

The changes are not saved to the user profile when the user logs off

How and where do you, as an administrator, provision mobile users for device enrollment if you don't have AD DS in your environment?

You add users manually from the Windows Intune account portal, under Admin, from the Users tab

Which parameter of the CIPHER command displays files with the hidden or system attribute?

the /H parameter

Which Microsoft Intune policy template controls mobile device security settings?

the Mobile Device Security Policy template

Can you access files on a Windows 10 computer with the OneDrive app if the computer does not have Internet connectivity?

yes, if the files are cached locally

Which of the following is true of BitLocker To Go? -BitLocker To Go enables you to protect removable USB devices with BitLocker encryption -A BitLocker To Go device can be a USB flash drive -A BitLocker To Go device can be a removable hard disk -BitLocker To Go drives can be formatted with NTFS, FAT16, FAT32, or exFat file

-BitLocker To Go enables you to protect removable USB devices with BitLocker encryption -A BitLocker To Go device can be a USB flash drive -A BitLocker To Go device can be a removable hard disk -BitLocker To Go drives can be formatted with NTFS, FAT16, FAT32, or exFat file

What steps must you use to have the Office Deployment Tool to generate a Click-to-Run for an Office 365 installation source?

-Download the Office Deployment Tool (ODT) to the server. -Prepare a configuration file -Run the ODT with the download command (setup.exe /download)

Which PowerShell cmdlet specifies the path to a virtual hard disk file?

-VHDPath <String>

What are the qualities of a storage space with the Parity resiliency type?

-You need at least three hard drives. -Data is striped across the disks with the parity information. -If a single disk fails, the data is still available.

Before updating BIOS on a computer that has BitLocker enabled, what should which switch of the manage-bde command should you use to stop encryption?

-disable

What file type is the VM checkpoint differencing file?

.avhd

What file type contains the VM memory content?

.bin

What file type is the VM saved state file?

.vsv

Which VM file types are ONLY created when a checkpoint is taken while the VM is on?

.vsv and .bin

What file type is the VM configuration file?

.xml

What are the correct steps that you should complete to ensure that a user can access files from another computer when a computer is offline?

1. On the computer that needs access to the folder, establish a sync partnership with the computer on which the files reside normally. 2. From the same computer, navigate to the folder that you need to use offline. 3. Right-click the folder, and select the Always available offline option. 4. Set up a synchronization schedule by clicking the Schedule option in the Sync Center.

On how many devices can you install a Windows Store app?

10

If a 3 GB file is compressed to 2 GB, what file size will count toward the disk quota?

3 GB will be counted toward the disk quota because compressed files are tracked based on their uncompressed sizes.

What content is restored when you restore a system image?

A complete restoration occurs. It is not possible to choose individual items to restore.

What is the difference between a soft quota and a hard quota?

A hard quota type will not allow the users to exceed the quota limit. A soft quota type will allow the user to exceed the quota limit. A soft quota type is used typically for monitoring storage use before implementing a hard quota type.

What is a trusted PC?

A trusted PC is a computer that you've added to the password reset information for your Microsoft account.

What does the term "sideloading" mean?

A way to distribute LOB apps to client computers without using the Microsoft store

Which of the following can you manage in the Office Admin 365 Center?

Active Directory Synchronization, [Valid, expired, and assigned licenses], and User password, including resetting

Which cmdlet would you use to configure a VPN connection that connects automatically to a VPN when a DNS suffix is used?

Add-VpnConnectionTriggerDns

Which group policy setting do you have to enable before you can sideload apps in Windows 10?

Allow All Trusted Apps to Install

What Windows 10 feature can be used to prevent users from installing certain Windows Store apps, without preventing the installation of all Windows Store apps?

An AppLocker Packaged app rule

Which IPSec protocol provides integrity and authentication and protects against replay attacks?

Authentication Header (AH)

What are the three pre-defined power plans in Windows 10?

Balanced, Power saver, and High performance

Which Windows 10 security feature provides data encryption for external hard drives?

BitLocker

Which Windows 10 security feature provides data encryption for portable drives?

BitLocker To Go

How can two users edit a spreadsheet in OneDrive at same time?

By simply editing the spreadsheet. OneDrive supports real time collaboration.

What should you do to prevent data from being forwarded across the VPN connection?

Clear the Use default gateway on remote network setting on the Advanced TCP/IP settings for the VPN connection.

What PowerShell cmdlet will copy a file named junk.txt from the D drive of the host to the C drive of a VM named Win10-wks ?

Copy-VMFile "Win10-wks" -SourcePath "D:\junk.txt" -DestinationPath "C:\junk.txt" -CreateFullPath -FileSource Host

What should you do to ensure that you can restore a virtual machine back to its state before an application was installed?

Create a checkpoint of the virtual machine.

Three family members share a single computer. All of their documents are saved in a single Documents folder, as is the case with their pictures, videos, and music. All of their data is mixed together and is causing problems. You determined that they are all using the same user profile. What should you do to remedy this?

Create a user account for each user

Can Credential Manager and Credential Locker be used to store passwords for Windows Store Apps? Can Credential Manager and Credential Locker be used to store passwords saved for local network resources?

Credential Manager can store Windows Store Passwords as well as passwords for local resources

Which DISM command would you use to provision an app for all users to be installed at first logon?

DISM /Online /Add-ProvisionedAppxPackage /PackagePath:C:\App1.appx /SkipLicense

Which of the following tools and technologies can help you sideload LOB apps for computers in your organization?

DISM, Windows Power Shell, Configuration Manager, Microsoft Intune

What are the three options that can be configured as part of the Roam Windows settings group policy?

Desktop Settings, Ease of access, and Themes

Which feature allows a user to restore a previous version of an updated device driver on a system?

Device Driver Rollback

What must you implement on a Windows Server 2012 R2 server to ensure that specific domain users using a specific device can access highly sensitive data?

Dynamic Access Control (DAC)

What setting must you configure in Group Policy to enable Windows 10 devices to request claims and compound authentication?

Enable the KDC support for claims, compound authentication, and Kerberos armoring policy under Computer Configuration > Administrative Templates > System > Kerberos.

What setting must you configure in Group Policy to enable Windows 10 devices to receive compound authentication?

Enable the Support compound authentication policy under Computer Configuration > Administrative Templates > System > Kerberos.

Which PowerShell cmdlet configures the computer to receive Windows PowerShell remote commands that are sent by using the WS-Management technology?

Enable-PSRemoting

Which Windows 8.1 feature allows a VPN to automatically reconnect when a network connection becomes available?

Fast Reconnect

How long can File History saved versions of files?

Forever

Where can you add multiple email address aliases for an Office365 account?

From the Office 365 portal, modify the Users settings of each user.

What are the available share permissions?

Full Control, Change, and Read

What are the available NTFS permissions?

Full Control, Modify, Write, List Folder Contents, Read & Execute, and Read

Name a template that contains the policy setting User Account Control is not configured for a Windows 10 computer?

General Configuration does contain the policy setting User Account Control Trusted Certificate Profile

You are creating a VM and need it to be backward compatible with operating systems prior to Windows Server 2012 and Windows 8. Which of the following describes the type of VM you need to create?

Generation 1

In which four ways can you view the update history in Windows Update to find a list of updates that have been applied to your computer?

Go to Settings -> Update and Security -> Advanced Options-> View your update history Go to Control Panel, select Programs and Features, and choose View Installed Updates Open Event Viewer, expand Applications and Services Logs, expand Microsoft, expand Windows, expand WindowsUpdateClient, and expand Operational. View the ReportingEvents.log file under the C:\Windows\SoftwareDistribution directory.

If your PC isn't running well, how can you refresh Windows 10 without losing your photos, music, videos, or other personal files?

Go to Settings, choose Update and Security, choose Recovery, choose Reset this PC, and choose Keep my files

What should you do to perform a push-button refresh on a Windows 10 computer?

Go to Settings, choose Update and Security, choose Recovery, choose Reset this PC, and choose Keep my files

What should you do to perform a push-button reset on a Windows 10 computer?

Go to Settings, choose Update and Security, choose Recovery, choose Reset this PC, and choose Remove everything

What integration service must be enabled to copy files to a running VM from the host without shutting the VM down?

Guest Services

Which cryptographic algorithm that works with IPSec uses a 160-bit encryption key?

HMAC

Which Windows 10 feature is used to share files over a local wired or wireless network?

HomeGroup

Which VPN protocol is used by VPN Reconnect?

IKEv2

Where can you configure a group policy that restricts the use of Microsoft accounts for a specific group of users in an Active Directory Domain

In the group Policy Management Editor window, by expanding Computer / Configuration / Policies / Windows Settings / Security Settings / Local Policies / Security Options

Where can users associate a Microsoft account with a domain account?

In the settings app, on the Accounts page

By default, what does File History back up?

It backs up important files stored in Libraries, Desktop, Favorites, and Contacts.

What is the purpose of the Roam Windows settings group policy?

It ensures that users' themes, ease of access, and desktop settings are included as part of the Microsoft User Experience Virtualization (UE-V).

What are the hard drive requirements for the File History feature?

It requires a hard drive or network location as the destination

What happens if you disable the Turn off the Store application group policy in the Computer Configuration\Administrative Templates\Windows Components\Store path?

It will allow access to the Windows Store application.

Which VPN type(s) on the Security tab of the VPN Connection Properties dialog box in Windows 8.1 encrypts the message by using AES 256, AES 192, AES 128, or 3DES encryption algorithms?

L2TP or IKEv2

You want to enable your domain users to access the same desktop background, app settings, browser history, and so on so they see on their main computers at home. What should they do?

Let users associate their Microsoft accounts with their domain accounts

Which command shows how to enable encryption and thus BitLocker on drive D on a Windows 10 computer, and add numerical and external key protectors?

Manage-bde -on D: -enable -RecoveryKey f:\ -recoverypassword and -recoverykey are both key protectors

Which component of the Microsoft Desktop Optimization Pack (MDOP) allows administrators to manage the drive encryption settings, including the encryption method and cipher strength, at the enterprise level for all computers on a network?

Microsoft BitLocker Administration and Monitoring (MBAM)

Which tool enables administrators to automate the process of encrypting volumes on client computers across the enterprise?

Microsoft BitLocker Administration and Monitoring (MBAM) 2.5

Which tool enables end users to recover encrypted devices independently by using the Self-Service Portal?

Microsoft BitLocker Administration and Monitoring (MBAM) 2.5

Which tool enables security officers to easily audit access to recover key information?

Microsoft BitLocker Administration and Monitoring (MBAM) 2.5

Which tool provides enterprise management capabilities for BitLocker and BitLocker to Go?

Microsoft BitLocker Administration and Monitoring (MBAM) 2.5

What is not supported for management using Microsoft Intune?

Microsoft Intune does not support Windows XP SP1

What PowerShell cmdlet would move a VM named AppServer to the F drive while the VM is still running?

Move-VMStorage "AppServer" DestinationStoragePath F:\AppServer

What is the first thing end users need to do before they configure sync options in Sync Center?

Navigate to a share on a different computer or file server, right click that share, and click always available offline

Which PowerShell cmdlet can add both inbound and outbound firewall rules?

New-NetFirewallRule

Which Power Shell cmdlet creates a new IPv4 address or IPv6 address when the IP address is already configured?

New-NetIPAddress

Which PowerShell cmdlet creates a virtual machine on a Windows 10 computer?

New-VM

Can encrypted files be backed up using File History?

No

What option do you choose in PC Settings on a Windows 8.1 computer to sync PC settings across all of your devices?

OneDrive > Sync Settings

What devices can you use to access files in OneDrive?

OneDrive is accessible from the Web, a desktop, mobile devices, and the Xbox One and Xbox 360 consoles

If you consider all the recovery methods with Windows 10, when should you use a recovery drive to perform a System Image Recovery?

Only if other recovery methods are unsuccessful

How many system image backups per computer can be kept at a backup location?

Only one system image per computer can be kept at a backup location

What steps should you perform to create a system image with a GUI utility in Windows 10?

Open Backup and Restore (Windows 7) in Control Panel and select Create a system image on the left-hand side.

How can you disable automatic updates to Windows Store apps on a Windows 10 computer?

Open Windows Store and navigate to Settings, then App Updates. Change the option Automatically Update My Apps to No.

Which authentication protocols do Windows 8.1 and Windows Server 2012 R2 support for VPN?

PAP, CHAP, MS-CHAPv2, EAP, and Digital Certificates

What are some advantages of using VHDX format for your VHD files (Instead of the VHD format?)

Protection against data corruption when there is a power failure, Improved performance on large sector disks, and Larger block sizes for dynamic and differencing disks to enhance performance

Which security feature in Windows 10 and Window Server 2012 R2 can you use to classify and flag corporate files, and to differentiate between these files and user files?

Remote Business Data Removal, also referred to as Selective Wipe

Which PowerShell cmdlet deletes firewall rules?

Remove-NetFirewallRule

Which cmdlet removes a physical disk from a specified storage pool?

Remove-PhysicalDisk

How do you prevent a Windows update from being shown in the Available Updates list?

Right-click the update, and select Hide update.

You want to secure communications over an untrusted network for applications that need internet access. You want to user TLS and SSL to achieve this. Which of the following technologies offer this?

Secure Channel

What should you do to ensure that licenses for Windows Store apps are synchronized between devices?

Select the Sync licenses setting in the Apps updates section of the Windows Store.

How does Selective Wipe only destroy corporate data and not personal data on a device?

Selective Wipe associates the corporate data, not personal data, with a symmetric key to an Internet domain, destroying the key that is associated with the domain revokes all access to the protected content.

What should you do to ensure that all Windows To Go implementations are able to enter hibernate mode?

Set the Allow hibernate (S4) when starting from a Windows To Go workspace setting in the Computer Configuration / Policies / Administrative Templates / Windows Components / Portable Operating System node to Enabled.

What PowerShell cmdlet would allow a user named Adele to use a Windows Store application named Moneytracker?

Set-AssignedAccess -UserName Adele -AppName Moneytracker

Which PowerShell cmdlet enables the domain, public, or private profiles?

Set-NetFirewallProfile

Which PowerShell cmdlet modifies existing firewall rules?

Set-NetFirewallRule

Which PowerShell cmdlet that changes the subnet mask or default gateway for an IPv4 or IPv6 address?

Set-NetIPAddress

Which PowerShell command sets a Windows 8.1 computer's IPv6 configuration?

Set-NetIPv6Protocol

What is the appropriate method for adding a sideloading product key?

Sideloading product keys must be first added using slmgr /ipk and then activated using slmgr /ato.

What are the three authentication factors?

Something the user knows - password, PIN, picture password, Microsoft Account Something the user has - smart card, ATM card Something the user is - biometrics

Which BIOS component is required to offer full BitLocker support in Windows 10?

TPM

In which pane of Hyper-V Manager do you configure host networking and settings, import virtual machines, and create new virtual machines?

The Actions Pane offers a list of tasks you can perform

Name an account type has the ability to enroll more than five devices?

The Device Enrollment Manager can enroll large numbers of devices, and is typically used specifically for that purpose

By default, where are the local copies of Work Folders stored on a Windows 10 device?

The Files are stored in %USERPROFILE%\Work Folders

What is the rule when combining NTFS and share permissions?

The MOST restrictive permission is the one that applies.

What utility do you use to create a recovery drive on a Windows 10 computer?

The Recovery Drive wizard

What must you configure on a client to allow the client to use applications on a Remote Desktop Web Access server in a remote location?

The connection URL in the RemoteApp and Desktop Connections applet in Control Panel

Where do you configure the folder location?

The location tab in the Properties dialog box of the default folder

You are trying to install Hyper-V and Control Panel, using the Turn Windows Feature On or Off option, on a computer running Windows 10 Professional. However, Hyper-V Platform is unavailable and can's be enabled. What is the reason for this?

The processor does not support SLAT

What command-line utility can be used with the wbadmin utility to perform full backups of a Windows 10 computer on a daily basis?

The schtasks utility

You create a homegroup on one computer and join it from another. This process goes smoothly. However, when you try to access data shared with the homegroup from the second computer, you cant. What is most likely the problem?

The time is configured incorrectly on the second computer

Which of the following describes the purpose of deep linking an app

To make specific Windows Store apps available through the company portal

Which cryptographic algorithm that works with IPSec uses an encryption key of up to 156 bits?

TripleDES

What are the four types of resiliency that can be used in Windows 10 storage spaces?

Two-way mirror resiliency type Three-way mirror resiliency type Parity resiliency type Simple (no resiliency) resiliency type

You want to ensure that a user who is signed on to a computer can control whether Windows restarts after the installation of scheduled updates deployed from Intune. Which of the following would you configure to accomplish this goal?

Update policies specify when and how updates will be deployed, including whether a signed-on user can override a restart required to complete update installation

If a Windows 10 computer does NOT support TPM version 1.2 or higher, how do you encrypt the hard drive?

Use BitLocker and store the startup key on a USB drive

How should you apply security updates to App-V packages?

Use the Open for Package Upgrade feature.

What should you do to allow a user to sync data and settings between two computers via a cloud?

Use the same Microsoft account on both computers, and configure both computers as trusted computers.

How do you enable Always Offline Mode?

User Group Policy to enable the Configure Slow-Line mode policy setting and set the latency to 1 millisecond

What action could be taken to prevent all users of a non-domain-joined computer from installing Windows Store apps?

Using Local Group Policy Editor, set the Turn off the Store application setting to Enabled

Which new feature of the Windows 8.1 Remote Access client allows you to connect automatically through VPN when applications or network locations are used that require organizational network resources?

VPN Auto-Trigger

What feature of Windows 8 and Windows 10 allows you to connect different laptops that support IEEE 802.11 without a Wi-Fi router or joining a Wi-Fi network?

Wi-Fi Direct

Which of the following devices is not supported for MDM in Microsoft Intune?

Windows 7 devices are not supported, only Windows 8 and later devices are supported by MDM in Microsoft Intune.

Which Windows operating systems support IKEv2?

Windows 7, Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, Windows Server 2012 R2, Windows 8, and Windows 8.1

What happens by default when the user is using a metered connection and is near or over their bandwidth limit or roaming on another provider's network?

Windows 8.1 will switch to Offline mode and disable background synchronization.

What operating system version(s) must your VPN server run to support VPN Reconnect in your enterprise?

Windows Server 2012 R2, Windows Server 2012, or Windows Server 2008 R2

What are limitations of Windows To Go?

Windows To Go is only available for Enterprise customers who are part of the Microsoft Software Assurance Program, TPM can't be used because it is tied to a specific computer and Windows to go drives are used on multiple computers, and the windows recovery environment is not available, and neither is refreshing or resetting. If there is a problem with Windows To Go, it needs to be reimaged

Which of the following network types is a distributed concept, in which users manage their own data sharing?

Workgroup and Homegroup

To configure broadband tethering, how must you configure the network connection from the Network item in Control Panel?

You must enable Internet Sharing for the network

You are trying to configure Group Policy to set an account lockout duration when users try and fail to authenticate their computers after a specific number of events. The options are greyed out, Why?

You must first configure the policy Account Lockout Threshold

What are the requirements to sideload LOB apps to client computers?

You must have enabled sideloading by editing GPO settings, and the LOB apps must be digitally signed

You want computers running Windows 8.1 in your organization's London branch office to install critical operating system updates automatically. Computers running Windows 8.1 in your organization's Liverpool office should install critical operating system updates only if an administrator manually approves those updates. What should you configure to accomplish this goal?

You need to configure a group for the Melbourne computers and then configure an automatic approval rule

You have noticed that updates for Windows 8 and 8.1 are present within a list of available updates in the Intune console, but updates for Windows 10 are not present. What should you configure to resolve this problem?

You need to configure update categories and classifications to ensure that updates for Windows 10 will be available to your Intune deployment.

When using Bit Locker To Go in an enterprise, how can you prevent users from copying data to USB drives that are not encrypted with BitLocker To Go?

You need to enable the Group Policy setting Deny Write Access To Removable Drives Not Protected By Bitlocker

You opted to store your startup key on a USB flash drive when you set up BitLocker. Which of the following is true?

You need to insert that drive every time you want to access the computer and enter the key If you lose the startup key, you'll need to unlock the drive using a recovery key. This is a 48 digit number that can be stored in numerous ways, including on a USB drive.

What is minimum size of a USB flash drive that can be used as recovery drive?

a 512 MB flash drive

Which file can be used to resolve the host names of servers that have an A (IPv4 host record) or AAAA (IPv6 host record) in DNS?

a HOSTS file

Which Microsoft Intune report will allow you to view information about application licenses used by your devices?

a License Report

What must you have to sign-in to a Windows 10 computer, access OneDrive, Mail, Calender and install apps from the Windows Store?

a Microsoft account

Which security rule type in Windows Firewall with Advanced Security is used to authenticate a connection between two specific computers?

a Server-to-Server connection rule

Which security rule type in Windows Firewall with Advanced Security is used to authenticate a connection between two gateway computers?

a Tunnel connection rule

What must be issued to allow a Windows 8.1 computer to be able to establish a VPN Reconnect connection?

a computer certificate

Which virtual switch connection type isolates the virtual machines, meaning that the virtual machines can only communicate with each other?

a private network connection type

What must you create as a prerequisite before performing a System Image Recovery on a Windows 10 computer?

a recovery drive

What tool can you use to run Windows RE and troubleshoot a Windows 10 installation even if the computer cannot start from the hard drive?

a recovery drive

Which type of network connection is required to use the metered/non-metered setting?

a wireless connection

Which security rule type in Windows Firewall with Advanced Security is used when you do NOT want to authenticate connections from certain computers?

an Authentication Exemption connection rule

Which Microsoft Intune report will allow you to view the status of any updates, including critical updates, security updates, definition updates, service packs, and update rollups?

an Update Report

Which virtual switch connection type allows the virtual machines to communicate over the network?

an external connection type

In Windows 10, what resource(s) are required to provide multiple copies of the system image?

an external hard drive

Which virtual switch connection type allows communication between the virtual machines and the management operating system?

an internal network connection type

Which security rule type in Windows Firewall with Advanced Security restricts connections to a Windows 10 computer based on domain membership?

an isolation connection rule

Once you have configured broadband tethering, how many characters must the wi-fi network password contain?

at least eight characters

To support static device claims, what type of tokens must a Windows 10 client or Windows Server 2012 R2 request?

compound tokens (a token that includes both user details and device details)

When can the startup key for BitLocker encryption be backed up?

during the reboot that is part of the initial BitLocker encryption process

How many physical disks are required to create a three-way mirror space?

five or more physical disks

In which type of file should you save your remote desktop settings?

in an .rdp file

Where are the UE-V group policies located after they are installed?

in the Computer Configuration > Policies > Windows Settings > Administrative Templates > Windows Components node

What are the two types of synchronization schedules that you can configure for Offline Files?

on a regular schedule or when certain events occur (such as when a user logs on or when the computer has been idle for 15 minutes)

Where should the User Experience Virtualization (UE-V) Agent be deployed?

on all the client computers

After upgrading from Windows 8 to Windows 10, how long does the Windows.old folder remain on your computer?

one month

What type of device can be used to create a recovery drive?

only a USB flash drive

When saving system images on a network location, which system image is stored?

only the latest version of the system image

Which Windows 10 authentication method requires that you input a series of gestures as part of the authentication process so the user must select the picture to use and enter the gestures at enrollment time?

picture passwords

Which Windows 10 security feature requires that you input a series of gestures as part of the authentication process so the user must select the picture to use and enter the gestures at enrollment time?

picture passwords

What command should you run from the command prompt to view a list of the hardware devices that can wake your computer?

powercfg -devicequery wake_armed

What command should you run from the command prompt to determine why your Windows 10 computer woke up?

powercfg -lastwake

You need to export a power plan you've created in the Power Options pane. What two commands do you use to achieve this?

powercfg.exe -list powercfg.exe -export power.pow GUID

Which option retains all the user files: push-button refresh or push-button reset?

push-button refresh

Which option resets to factory settings: push-button refresh or push-button reset?

push-button reset

What Group Policy action, taken at the domain level, will prevent users from installing Windows Store apps?

set the Turn off the Store application setting to Enabled

Your company has deployed a LOB application using sideloading. What command will activate a product key that has been installed? (Hint: The activation GUID will always be ec67814b-30e6-4a50-bf7b-d55daf729d1e)

slmgr /ato ec67814b-30e6-4a50-bf7b-d55daf729d1e

Your company has deployed a LOB application using sideloading. What command will install the app if it has a product key of xpw3334Polhzz?

slmgr /ipk xpw3334Polhzz

Before updating BIOS on a computer that has BitLocker enabled, what should you do?

suspend BitLocker encryption before you update the BIOS

Which parameter of the Set-NetIPAddress PowerShell cmdlet configures whether IPv4 or IPv6 is used?

the -AddressFamily<AddressFamily[]> parameter

Which parameter of the New-NetFirewallRule PowerShell cmdlet specifies whether an inbound or outbound rule is created?

the -Direction<Direction> parameter

Which parameter of the Set-NetIPv4Protocol PowerShell cmdlet disables multicast communication on a Windows 10 computer?

the -IGMPLevel<None> parameter

Which parameter of the CIPHER command encrypts specified files?

the /E parameter

Which group policy controls the installation properties of Windows Store apps on Windows To Go workspaces?

the Allow Store to install apps on Windows To Go workspaces group policy

Which group policy setting must be enabled to allow computers that are members of a domain to sideload a line of business (LOB) Windows Store app?

the Allow all trusted apps to install setting

Which option will allow a Windows 10 computer to wake when it is time for updates to occur, and is enabled by default?

the Allow scheduled maintenance to wake up my computer at the scheduled time group policy setting in the Maintenance section in Action Center

Which tab of Task Manager displays statistics for each Windows Store application?

the App History tab

Which policy allows you to enable auditing on files and registry keys?

the Audit object access group policy under the Computer Configuration/Windows Settings/Security Settings/Local Policies/Audit Policy node

Which policy audits attempts to change user rights assignment policy, audit policy, account policy, or trust policy?

the Audit policy change group policy under the Computer Configuration/Windows Settings/Security Settings/Local Policies/Audit Policy node

Which policy audits each instance of a user exercising a user right, but does not audit attempts to edit the registry?

the Audit privilege use group policy under the Computer Configuration/Windows Settings/Security Settings/Local Policies/Audit Policy node

Which Windows 10 power plans include the Require a password on wakeup setting?

the Balanced, High Performance, and Power Saver plans


Ensembles d'études connexes

Chapter 2 - Nature and Formation of a Partnership

View Set

Computer Science HTML Study Guide

View Set

Chapter 20 - Accounting for Leases (MC Computational)

View Set

JOHN C. CALHOUN AND THE NULLIFICATION CRISIS

View Set