MD100

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

A user has a computer that runs Windows 10.When the user connects the computer to the corporate network, the user cannot access the internal corporate servers. The user can access servers on the Internet. You run the ipconfig command and receive the following output. You send a ping request and successfully ping the default gateway, the DNS servers, and the DHCP server. Which configuration on the computer causes the issue?

the DNS servers

You have a Microsoft 365 Enterprise E3 license.You have a computer named Computer1 that runs Windows 10.You need to ensure that you can access the files on Computer1 by using a web browser on another computer. What should you configure?

the Microsoft OneDrive desktop app

You have an Azure Active Directory (Azure AD) tenant named contoso.com. You have a workgroup computer named Computer1 that runs Windows 10. You need to add Computer1 to contoso.com.What should you use?

the Settings app

A user has a computer that runs Windows 10. The user has access to the following storage locations: ✑ A USB flash drive✑ Microsoft OneDrive✑ OneDrive for Business✑ A drive mapped to a network share✑ A secondary partition on the system drive. You need to configure Back up using File History from the Settings app. Which two storage locations can you select for storing File History data? Each correct answer presents a complete solution.

the USB flash drive the secondary partition on the system drive

You have a computer named Computer1 that runs Windows 10. You complete a full back up of Computer1 to an external USB drive. You store the USB drive offsite. You delete several files from your personal Microsoft OneDrive account by using File Explorer, and then you empty the Recycle Bin on Computer1. You need to recover the files 60 days after you deleted them in the least amount of time possible. What should you use?

the full backup on the external USB drive

You have a computer that runs Windows 10 and is joined to Azure Active Directory (Azure AD). You attempt to open Control Panel and receive the error message "this operation has been cancelled due to restrictions in effect on this computer. Please contact your system administartor. What should you modify?

the local Group Policy

Your network contains an Active Directory domain. The domain contains a computer named Computer1 that runs Windows 10. The domain contains users 1, 2, 3 carrying from domain users, guests and domain admins. Computer1 has the local users 4 and 5 that are users and an admin. All users have Microsoft accounts. Which two users can be configured to sign in by using their Microsoft account? Each correct answer presents part of the solution.

user 4 and user 5 Domain Users cannot use a Microsoft account to log on.

You have a computer named Computer1 that runs Windows 10.On Computer1, you create the local users shown below Which three user profiles will persist after each user signs out? Each correct answer presents part of the solution. name.... Member of user1 users user2 users, guests user3 power users, guest user4 guests,users, administrators user 5 users, distributed COM users

user1, user 2, user3

You have a computer named Computer1 that runs Windows10. Computer1 is in a workgroup. Computer1 contains the users. User1, User2, User3 (Group1), User4 - (Users), Admin1(Administrators). You need to apply the same Group Policy settings to only User1, User2 and User3. The solution must use a minimum number of local Group Policy objects (GPOs). How many local GPOs should you create?

1 You can use security filtering to restrict the GPO to the required users. Only users with the Read and Apply Group Policy permissions will have the GPO applied to them.

You have a computer that runs Windows 10 and has File History enabled. File History is configured to save copies of files every 15 minutes. At 07:55, you create a file named D:\Folder1\File1.docx. You add D:\Folder1 to File History and manually run File History at 08:00. You modify File1.docx at the following times: ✑ 08:05✑ 08:12✑ 08:20✑ 08:24✑ 08:50 At 08:55, you attempt to restore File1.docx. How many previous versions of File1.docx will be available to restore?

4 Per the configuration it will save a copy every 15 minutes. The times of changes made are not indicative of when it is saved. Here are the times of saves = 8:00, 08:15, 08:30, 8:45. This means the last working copy will be the 8:24 version.

You have a computer named Computer1. Computer1 runs Windows 10 Pro. You are configuring File history on Computer1. You need to select a storage location for storing File History data. Which two storage locations can you select? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.

A USB flash drive C. A secondary drive

Your network contains an Active Directory domain. The domain contains a computer named Computer1 that runs Windows 10. Computer1 has a Trusted Platform Module (TPM) version 1.2. The domain contains a domain controller named DC1 that has all the Remote Server Administration Tools (RSAT) installed. BitLocker Drive Encryption (BitLocker) recovery passwords are stored in Active Directory. You enable BitLocker on the operating system drive of Computer1. A software update on Computer1 disables the TPM, and BitLocker enters recovery mode. You need to recover your BitLocker password for Computer1. What should you use to retrieve the recovery password?

Active Directory Users and Computers

Your network contains an Active Directory domain. The domain contains 10 computers that run Windows 10. On a different computer named Computer1, you plan to create a collector-initiated subscription to gather the event logs from the Windows 10 computers. You need to configure the environment to support the event log collection. Which two actions should you perform? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.

Add Computer1 to the Event Log Readers group on the Windows 10 computers Enable Windows Remote Management (WinRM) on the Windows 10 computers

You have several computers that run Windows 10. The computers are in a workgroup and have BitLocker Drive Encryption (BitLocker) enabled. You join the computers to Microsoft Azure Active Directory (Azure AD). You need to ensure that you can recover the BitLocker recovery key for the computers from Azure AD. What should you do first?

Add a BitLocker key protector.

You have a computer named LON-CL1.Adatum.com that runs Windows 10. From Event Viewer, you create a custom view named View1 that has the following filter: ✑ User: User1✑ Logged: Any time ✑ Event logs: System ✑ Computer: LON-CL1 Event IDs: 10000 - 11000 -✑ Event level: Error, Verbose You open Event Viewer and discover the event shown in the exhibit. "The server ConrtanaUI.AppXd4taf4dad4wtdbnnmb8v2xtzym8c8c1n8.mca did not register with DCOM within the required timeout. The event does not appear in View1. You need to ensure that the event appears in View1. What should you do?

Add a Task Category setting to the filter.

Your company uses Microsoft Deployment Toolkit (MDT) to deploy Windows 10 to new computers. The company purchases 1,000 new computers.You need to ensure that the Hyper-V feature is enabled on the computers during the deployment. What are two possible ways to achieve this goal? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.

Add a custom command to the Unattend.xml file. Add a task sequence step that runs dism.exe.

You have a computer named Computer1 that runs Windows 10. Computer1 is in a workgroup. Computer1 contains the local users shown below. name.... Member of Administartor. admin, users user1 backup operators, users user2 device owners, users user3 users The Users group has Modify permissions to a folder named D:\Folder1. Which users can take ownership of File1.docx?

Administrator only

Your network contains an Active Directory domain. The domain contains computers that run Windows 10. You need to provide a user with the ability to remotely create and modify shares on the computers. The solution must use the principle of least privilege. To which group should you add the user?

Administrators

our company has an on-premises network that contains an Active Directory domain. The domain is synced to Microsoft Azure Active Directory (Azure AD). All computers in the domain run Windows 10 Enterprise. You have a computer named Computer1 that has a folder named Folder1. You must provide users in group named Group1 with the ability to view the list of files in Folder1. Your solution must ensure that the principle of least privilege is maintained. What should you do?

Assign the 'List folder' permissions for the Folder1 folder to Group1.

You have a computer named Computer1 that runs Windows 10. Several users have signed in to Computer1 and have a profile.You create a taskbar modification file named LayoutModification.xml. You need to ensure that LayoutModification.xml will apply to all users who sign in to Computer1. To which folder should you copy LayoutModification.xml?

C:\Users\Default\AppData\Local\Microsoft\Windows\Shell\

You deploy 100 computers that run Windows 10. Each computer has a cellular connection and a Wi-Fi connection. You need to prevent the computers from using the cellular connection unless a user manually connects to the cellular network. What should you do?

Clear the Let Windows manage this connection check box for the cellular connection

You have a removable USB drive named USBDrive1 that is encrypted by using BitLocker to Go. You plan to use USBDrive1 on Computer1, Computer2, and Computer3. You need to identify on which computers you can enable automatic unlocking of BitLocker on USBDrive1. Computer1 has a bit locker drive encryption enabled on drive c, computer 2 doesn't, computer 3 does. Which computers should you identify?

Computer1 and Computer3 only The BitLocker key is stored in the registry when you enable auto-unlock but only if the operating system drive is encrypted with BitLocker. A TPM is not required.

Your network contains an Active Directory domain. The domain contains the objects shown in the following table. name type user1 user user2 user computer1. computer computer2. computer The domain is configured to store BitLocker Drive Encryption (BitLocker) recovery passwords. User1 encrypts an external disk on Computer1 by using BitLocker to Go. User2 moves the external disk to Computer2 and unlocks the disk. You need to view the BitLocker recovery password. Which objects are used to store the recovery password?

Computer1 only

You have several computers that run Windows 10. All users have Microsoft OneDrive for Business installed.Users frequently save files to their desktop. You need to ensure that all the users can recover the files on their desktop from OneDrive for Business. Which two actions should you perform? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.

Configure the Silently move Windows known folders to OneDrive settings Copy ADMX and ADML files to C:\Windows\PolicyDefinitions

Your company has a main office and a branch office. The offices connect to each other by using a WAN link. Access to the Internet is provided through the main office. The branch office contains 25 computers that run Windows 10. The computers contain small hard drives that have very little free disk space. You need to prevent the computers in the branch office from downloading updates from peers on the network. What should you do?

Configure the computers to use BranchCache in hosted cache mode

Your company has a Remote Desktop Gateway (RD Gateway). You have a server named Server1 that is accessible by using Remote Desktop Services (RDS) through the RD Gateway. You need to configure a Remote Desktop connection to connect through the gateway. Which setting should you configure?

Connect from anywhere

You have 20 computers that run Windows 10. The computers are in a workgroup. You need to create a local user named User1 on all the computers. User1 must be a member of the Remote Management Users group. What should you do?

Create a Group Policy object (GPO) that contains the Local User Group Policy preference.

You have a computer named Computer1 that runs Windows 10. You deploy an application named Application1 to Computer1. You need to assign credentials to Application1. You need to meet the following requirements: Ensure that the credentials for Application1 cannot be used by any user to log on to Computer1. Ensure that the principle of least privilege is maintained.What should you do?

Create a user account for Application1 and assign that user account the Deny log on locally user right By using the Service1 account as the identity used by Application1, we are applying the principle of least privilege as required in this question.

You need to enable BitLocker Drive Encryption (BitLocker) on a computer named Computer1 that runs Windows 10. Computer1 has the following configurations: ✑ Contains only one 200-GB NTFS volume named C:\ ✑ Contains 50 GB of unallocated disk space✑ Is the member of a workgroup✑ Has TPM enabled What should you do first?

Create an additional volume. Two partitions are required to run BitLocker because pre-startup authentication and system integrity verification must occur on a separate partition from the encrypted operating system drive. This configuration helps protect the operating system and the information in the encrypted drive.

You have 100 computers that run Windows 10. The computers are in a workgroup. The computers have a low-bandwidth metered Internet connection. You need to reduce the amount of Internet bandwidth consumed to download updates. What should you configure?

Delivery Optimization

You have a computer that runs Windows 10. You sign in by using your Microsoft account and set up the Microsoft OneDrive sync app to connect to your personal OneDrive account. You plan to configure OneDrive to back up the important PC Folders. Which three folders can be backed up by OneDrive?

Desktop, Documents, and Pictures

Your company has a computer named Computer1 that runs Windows 10. Computer1 is used to provide guests with access to the Internet. Computer1 is a member of a workgroup. You want to configure Computer1 to use a user account sign in automatically when the computer is started. The user must not be prompted for a user name and password. What should you do?

Edit the Registry.

Your network contains an Active Directory domain. The domain contains a user named User1.User1 creates a Microsoft account.User1 needs to sign in to cloud resources by using the Microsoft account without being prompted for credentials. Which settings should User1 configure?

Email & app accounts in the Settings app

Your network contains an Active Directory domain. The domain contains computers that run Windows 10. You must ensure that Windows BitLocker Drive Encryption is enabled on all client computers, even though a Trusted Platform Module (TPM) chip is installed in only some of them. You need to accomplish this goal by using one Group Policy object (GPO). What should you do?

Enable the Require additional authentication at startup policy setting, and select the Allow BitLocker without a compatible TPM check box We need to allow Windows BitLocker Drive Encryption on all client computers (including client computers that do not have Trusted Platform Module (TPM) chip).

You have a computer named Computer1 that runs Windows 10. From Event Viewer on Computer1, you have a task named Action1 that is attached to the following event: ✑ Log: System ✑ Source: Kernel-General ✑ Event ID: 16 You need to modify the settings of Action1. What should you use?

Event Viewer

You are a network administrator at your company. The company uses an application that checks for network connectivity to a server by sending a ping request to the IPv6 addres s of the server. If the server replies, the application loads. A user cannot open the application.You manually send the ping request from the computer of the user and the server does not reply. You send the ping request from your computer and the server replies.You need to ensure that the ping request works from the user's computer. Which Windows Defender firewall rule is a possible cause of the issue?

File and Printer Sharing (Echo Request ICMPv6-In)

You deploy Windows 10 to several computers. The computers will be used by users who frequently present their desktop to other users. You need to prevent applications from generating toast notifications in the notification area. Which settings should you configure from the Settings app?

Focus Assist. Focus assist will automatically hide incoming notifications, so they don't pop up and distract you while you're playing a game, giving a presentation, or using a full- screen application.

You have several computers that run Windows 10. The computers are in a workgroup. You need to prevent users from using Microsoft Store apps on their computer.What are two possible ways to achieve the goal? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.

From Administrative Templates in the local Group Policy, configure the Store settings. From Security Settings in the local Group Policy, configure Application Control Policies.

You have a computer named Computer1 that runs Windows 10. On Computer1, you turn on File History.You need to protect a folder named D:\Folder1 by using File History. What should you do?

From File Explorer, add D:\Folder1 to the Documents library

You manage devices that run Windows 10. Ten sales users will travel to a location that has limited bandwidth that is expensive. The sales users will be at the location for three weeks. You need to prevent all Windows updates from downloading for the duration of the trip. The solution must not prevent access to email and the Internet. What should you do?

From Network & Internet in the Settings app, set the network connections as metered connections.

You have a computer named Computer1 that runs Windows 10. You test Windows updates on Computer1 before you make the updates available to other computers. You install a quality update that conflicts with a custom device driver. You need to remove the update from Computer1. What are three possible ways to achieve the goal? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.

From Programs and Features, uninstall an update From an elevated command prompt, run the wusa.exe command and specify the /uninstall parameter From System Restore, revert the system state to a restore point that was created before the update was installed

You have a computer named Computer1 that runs Windows 10. You need to enable boot logging on Computer1. What should you do?

From System Configuration configure the Boot settings.

User1 is a member of the Administrators group on a computer that runs Windows 10. When User1 attempts to view the security settings of a folder named C:\SecretData, the user receives the message in the Security exhibit. "you must have read permissions to view the properties of this object" On the computer, you sign in as a member of the Administrators group and view the permissions to C:\SecretData as shown in the Permissions exhibit. "you must have read permissions to view the properties of this object. click continue to attempt the operation with administrative permissions". You need to restore Use1's access to C:\SecretData. What should you do first?

From the Permissions tab of Advanced Security Settings for SecretData, select Continue to attempt the operation by using administrative privileges.

You have a computer named Computer1 that runs Windows 10. On Computer1, you turn on File History.You need to protect a folder named D:\Folder1 by using File History. What should you do?

From the Settings app, configure the Backup settings

You deploy Windows 10 to 20 new laptops.The laptops will be used by users who work at customer sites. Each user will be assigned one laptop and one Android device. You need to recommend a solution to lock the laptop when the users leave their laptop for an extended period.Which two actions should you include in the recommendation? Each correct answer presents part of the solution. MD-100 Exam Preparation Page 13 Which two actions should you include in the recommendation? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.

From the Settings app, configure the Lock screen settings. From the Settings app, configure the Screen timeout settings.

You have a computer that runs Windows 10. You need to configure a picture password. What should you do?

From the Settings app, configure the Sign-in options.

Your network contains an Active Directory domain named contoso.com. A user named User1 has a personal computer named Computer1 that runs Windows 10 Pro. User1 has a VPN connection to the corporate network. You need to ensure that when User1 connects to the VPN, network traffic uses a proxy server located in the corporate network. The solution must ensure that User1 can access the Internet when disconnected from the VPN. What should you do?

From the Settings app, modify the Proxy settings for the local computer

Your network contains an Active Directory domain. The domain contains 10 computers that run Windows 10. Users in the finance department use the computers. You have a computer named Computer1 that runs Windows 10. From Computer1, you plan to run a script that executes Windows PowerShell commands on the finance department computers. You need to ensure that you can run the PowerShell commands on the finance department from Computer1. What should you do on the finance department computers?

From the Windows PowerShell, run the Enable-PSRemoting cmdlet.

You have an Azure Active Directory (Azure AD) tenant that contains a user named [email protected]. You have a computer named Computer1 that runs Windows 10. You join Computer1 to Azure AD. You enable Remote Desktop on Computer1. [email protected] attempts to connect to Computer1 by using Remote Desktop and receives the following error message: 'The logon attempt failed.' You need to ensure that the user can connect to Computer1 by using Remote Desktop. What should you do first?

From the local Group Policy, modify the 'Allow log on through Remote Desktop Services' user right.

You have a computer named Computer1 that runs Windows 10. Computer1 has a folder named C:\Folder1. You need to meet the following requirements:Log users that access C:\Folder1. Log users that modify and delete files in C:\Folder1. Which two actions should you perform?

From the properties of C:\Folder1, configure the Auditing settings. From the Audit Policy in the local Group Policy, you configure Audit object access.

A user named User1 has a computer named Computer1 that runs Windows 10. User1 connects to a Microsoft Azure virtual machine named VM1 by using Remote Desktop. User1 creates a VPN connection named VPN1 to connect to a partner organization. When the VPN1 connection is established, User1 cannot connect to VM1. When User1 disconnects from VPN1, the user can connect to VM1. You need to ensure that User1 can connect to VM1 while connected to VPN1. What should you do?

From the properties of VPN1, clear the Use default gateway on remote network check box.

You have a computer that runs Windows 10. You can start the computer but cannot sign in. You need to start the computer into the Windows Recovery Environment (WinRE). What should you do?

From the sign-in screen, hold the Shift key, and then click Restart.

You have a computer that runs Windows 10. You discover that Windows updates are failing to install on the computer. You need to generate a log file that contains detailed information about the failures. Which cmdlet should you run?

Get-WindowsUpdateLog

Your network contains an Active Directory domain. The domain contains two computers named Computer1 and Computer2 that run Windows 10. You need to modify the registry of Computer1 by using Registry Editor from Computer2. You need to modify the registry of Computer1 by using Registry Editor from Computer2. Which two registry hives can you modify? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.

HKEY_LOCAL_MACHINE HKEY_USERS

Your company deploys Windows 10 Enterprise to all computers. All the computers are joined to Microsoft Azure Active Directory (Azure AD). The company purchases a new computer for a new user and creates an Azure AD account for the user. The user signs in to the computer by using the Azure AD account. The user discovers the activation error code:0x800705b4, you need to activate a windows enterprise on this computer. Running a non-genuine windows can put you at greater risk from viruses and other security threats. What should you do?

In Azure AD, assign a Windows 10 Enterprise license to the user.

You have a computer named Computer1. Computer1 runs Windows 10 Pro. Computer1 is experiencing connectivity issues. You need to view the IP addresses of any remote computer that Computer1 has an active TCP connection to. Should you do?

In Windows Administrative Tools, open Resource Monitor.

You have a computer named Computer1. Computer1 runs Windows 10 Pro. Computer1 is experiencing connectivity issues. You need to view the IP addresses of any remote computer that Computer1 has an active TCP connection to. Should you do?

In Windows Administrative Tools, open Resource Monitor.

You have a file named Reg1.reg that contains the following content. WINDOWS REGISTRY EDITOR VERSION 5.00 [HKEY_CLASSES_ROOT\DIRECTORY\BACKGROUND\SHELL\NOTEPAD] [HKEY_CLASSES_ROOT\Directory\Background\shell\Notepad] @='notepad.exe" what is the effect of importing the file?

In a key named Notepad, the command value will be set to @="notepad.exe".

Your network contains an Active Directory domain that is synced to a Microsoft Azure Active Directory (Azure AD) tenant. All users have been issued with laptop computers as well as desktop computers that run Windows 10 Enterprise. All users have Microsoft 365 E3 licenses. A user named Mia Hamm informs you that she must perform a BitLocker recovery on her laptop but she does not have her BitLocker recovery key. You need to ensure that Mia Hamm can perform a BitLocker recovery on her laptop. What should you do?

Instruct Mia Hamm to log on to her desktop computer and go to https://account.activedirectory.windowsazure.com and view the user account profile.

Your network contains an Active Directory domain. All users have been issued with new computers that run Windows 10 Enterprise. All users have Microsoft 365 E3 licenses. A user named Mia Hamm has an Active Directory user account named MHamm and a computer named Computer1. Mia Hamm reports that Computer1 is not activated. You need to ensure that Mia Hamm can activate Computer1. What should you do?

Instruct Mia Hamm to perform a local AutoPilot Reset on Computer1, and then activate Computer1. This will restore the computer settings to a fully- configured or known IT-approved state. When the user signs in to Computer1 after the reset, the computer should activate.

Your company has an isolated network used for testing. The network contains 20 computers that run Windows 10. The computers are in a workgroup. During testing, the computers must remain in the workgroup. You discover that none of the computers are activated. You need to recommend a solution to activate the computers without connecting the network to the Internet. What should you include in the recommendation?

Key Management Service (KMS)

You have a computer named Computer1 that runs Windows 10. You need to prevent standard users from changing the wireless network settings on Computer1. The solution must allow administrators to modify the wireless network settings. What should you use?

Local Group Policy Editor

You have a workgroup computer that runs Windows 10. You need to set the minimum password length to 12 characters. What should you use?

Local Group Policy Editor

You have a workgroup computer that runs Windows 10. You need to set the minimum password length to 12 characters. What should you use?

Local Security Policy There are several versions of this question in the exam. The question has two possible correct answers: ▪ Local Group Policy Editor ▪ Local Security Policy

Your network contains an Active Directory domain that is synced to a Microsoft Azure Active Directory (Azure AD) tenant. The company plans to purchase computers preinstalled with Windows 10 Pro for all users. The company the following requirements:The new computers must be upgraded to Windows 10 Enterprise automatically. The new computers must be joined to Azure AD automatically when the user starts the new computers for the first time. The users must not be required to accept the End User License Agreement (EULA). You need to deploy the new computers. What should you do?

Make use of Windows Autopilot.

Your company is not connected to the internet. The company purchases several new computers with Windows 10 Pro for its users. None of the new computers are activated. You need to activate the computers without connecting the network to the Internet. What should you do?

Make use of the Key Management Service (KMS).

You have a public computer named Computer1 that runs Windows 10/ Computer1 contains a folder named Folder1. You need to provide a user named User1 with the ability to modify the permissions of Folder1. The solution must use the principle of least privilege. Which NTFS permission should you assign to User1?

Modify

You have a computer named Computer1 that runs Windows 10. Computer1 contains a folder named Folder1. You need to log any users who take ownership of the files in Folder1.Which two actions should you perform? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.

Modify the Advanced Security Settings for Folder1. From a Group Policy object (GPO), configure the Audit File System setting.

Your Prepaway company has an on-premises network that contains an Active Directory domain. The domain is synced to Microsoft Azure Active Directory (Azure AD). All computers in the domain run Windows 10 Enterprise. You have a computer named Computer1 that has a folder named C:\Folder1. You want to use File History to protect C:\Folder1. Solution: You enable File History on Computer1. You then encrypt the contents of Folder1. Does this meet the goal?

NO. File History only backs up copies of files that are in Libraries, and Desktop folders and the OneDrive files available offline on your PC. If you have files or folders elsewhere that you want backed up, you can add them to one of these folders.

Your company has an on-premises network that contains an Active Directory domain. The domain is synced to Microsoft Azure Active Directory (Azure AD). All computers in the domain run Windows 10 Enterprise. You have a computer named Computer1 that has a folder named C:\Folder1. You want to use File History to protect C:\Folder1. Solution: You enable File History on Computer1. You then enable archiving for Folder1. Does this meet the goal?

NO. File History only backs up copies of files that are in Libraries, and Desktop folders and the OneDrive files available offline on your PC. If you have files or folders elsewhere that you want backed up, you can add them to one of these folders.

Your network contains an Active Directory domain. The domain contains a computer named Computer1 that runs Windows 10. Computer1 contains a folder named Folder1. You plan to share Folder1. Everyone will have Read share permissions, and administrators will have Full control share permission. You need to prevent the share from appearing when users browse the network. What should you do?

Name the share Folder1$.

You have 20 computers that run Windows 10. You configure all the computers to forward all the events from all the logs to a computer named Computer1 that runs Windows 10. When you sign in to Computer1, you cannot see any security events from other computers. You can see all the other forwarded events from the other computers. You need to ensure that the security events are forwarded to Computer1. What should you do?

On Computer1, add the account of Computer1 to the Event Log Readers group.

You have an Azure Active Directory (Azure AD) tenant named contoso.com that contains a user named UserA. You have two computers named Computer1 and Computer2 that run Windows 10 and are joined to contoso.com. You need to ensure that UserA can connect to Computer2 from Computer1 by using Remote Desktop. Which three actions should you perform? Each correct answer presents part of the solution.NOTE: Each correct selection is worth one point.

On Computer2, modify the properties of UserA. On Computer 2, enable Remote Desktop. On Computer2, add the Everyone group to the Remote Desktop Users group.

Your network contains an Active Directory domain named contoso.com. The domain contains two computers named Computer1 and Computer2 that run Windows 10. On Computer1, you need to run the Invoke-Command cmdlet to execute several PowerShell commands on Computer2. What should you do first?

On Computer2, run the Enable-PSRemoting cmdlet

Your network contains an Active Directory domain that is synced to a Microsoft Azure Active Directory (Azure AD) tenant. Your company purchases a Microsoft 365 subscription.You need to migrate the Documents folder of users to Microsoft OneDrive for Business.What should you configure? What should you configure?

One Drive Group Policy settings

Your company has several mobile devices that run Windows 10. You need configure the mobile devices to meet the following requirements: Windows updates may only be download when mobile devices are connect to Wi-Fi. Access to email and the Internet must be possible at all times. What should you do?

Open the Setting app and select Network & Internet. Then select Change connection properties, and set the Metered connection option for cellular network connections to On.

You have a computer named Computer1 that runs Windows 10 and has an application named App1. You need to use Performance Monitor to collect data about the processor utilization of App1. Which performance object should you monitor?

Process

You have a Microsoft Azure Active Directory (Azure AD) tenant.Some users sign in to their computer by using Windows Hello for Business.A user named User1 purchases a new computer and joins the computer to Azure AD.User1 is not able to use Windows Hello for Business on his computer. User1 sign-in options are shown on the exhibit. You open Device Manager and confirm that all the hardware works correctly. You need to ensure that User1 can use Windows Hello for Business facial recognition to sign in to the computer. What should you do first?

Purchase an infrared (IR) camera.

Your company purchases 20 laptops that use a new hardware platform. In a test environment, you deploy Windows 10 to the new laptops. Some laptops frequently generate stop errors. You need to identify the cause of the issue. What should you use?

Reliability Monitor

Your network contains an Active Directory domain. The domain contains a user named Admin1.All computers run Windows 10. You enable Windows PowerShell remoting on the computers. You need to ensure that Admin1 can establish remote PowerShell connections to the computers. The solution must use the principle of least privilege. To which group should you add Admin1?

Remote Management Users

your company has a wireless access point that uses WPA2-Enterprise. You need to configure a computer to connect to the wireless access point. What should you do first?

Request a passphrase.

You have a computer named Computer1 that runs Windows 10. You are troubleshooting connectivity issues on Computer1. You need to view the remote addresses to which Computer1 has active TCP connections. Which tool should you use?

Resource Monitor

You have a computer that runs Windows 10 and has BitLocker Drive Encryption (BitLocker) enabled on all volumes. You start the computer from Windows Recovery Environment (WinRE). You need to read the data on the system drive. What should you do?

Run manage-bde.exe and specify the -unlock parameter

Your network contains an Active Directory domain. All users have been issued with computers that run Windows 8.1. A user named Mia Hamm has a computer named Computer1. You upgrade Computer1 to Windows 10 by performing a clean installation of Windows 10 without formatting the drives. You need to migrate the settings for Mia Hamm from Windows 8.1 to Windows 10. Which two actions should you perform?NOTE: Each correct selection is worth one point.

Run scanstate.exe and specify the C:\Windows.old folder Run loadstate.exe and specify the C:\Users folder

You have 15 computers that run Windows 10. Each computer has two network interfaces named Interface1 and Interface2. You need to ensure that network traffic uses Interface1, unless Interface1 is unavailable. What should you do?

Run the Set-NetIPInterface -InterfaceAlias Interface1 -InterfaceMetric 1 command.

You have a computer named Computer1 that runs Windows 10. You need to configure User Account Control (UAC) to prompt administrators for their credentials. Which settings should you modify?

Security Options in Local Group Policy Editor

You have a VPN server that accepts PPTP and L2TP connections and is configured with the following authentication methods. extensible authentication protocol (EAP) Microsoft encrypted authentication version 2 (MS-CHAP v2) encrypted authentication (CHAP) A user named User1 has a computer that runs Windows 10 and has a VPN connection. Server address 192.168.1.2. User1 fails to establish a VPN connection when connected to a home network. You need to identify which VPN client setting must be modified. What should you identify?

ServerAddress The server address is a private IP address. This needs to be the public IP address of the VPN server.

You have 200 computers that run Windows 10 and are joined to an Active Directory domain. You need to enable Windows Remote Management (WinRM) on all the computers by using Group Policy. Which three actions should you perform? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.

Set the Startup Type of the Windows Remote Management (WS-Management) service to Automatic. Enable the 'Allow remote server management' through WinRM setting. Enable the Windows Defender Firewall: 'Allow inbound remote administration exception' setting.

Your network contains an Active Directory domain named contoso.com. The domain contains a computer named Computer1 that runs Windows 10. On Computer1, you create an NTFS folder and assign Full control permissions to Everyone. You share the folder as Share1 and assign the permissions shown in the following table. name | permissions ---------------------- user1 | full control user2 | change When accessing Share1, which two actions can be performed by User1 but not by User2? Each correct answer presents part of the solution.

Set the permissions for a file. Take ownership of file.

You deploy Windows 10 to a computer named Computer1. Computer1 contains a folder named C:\Folder1. Folder1 contains multiple documents. You need to ensure that you can recover the files in Folder1 by using the Previous Versions tab. What are three possible ways to achieve the goal? Each correct answer presents a complete the solution. NOTE: Each correct selection is worth one point.

Set up Backup and Restore (Windows 7) and include Folder1 in the backup. Enable File History and add Folder1 to File History. Enable File History and include Folder1 in the Documents library.

You have a computer named Computer1. Computer1 runs Windows 10 Pro. You attempt to start Computer1 but you receive the following error message: Bootmgr is missing.You need to be able to start Computer1. What should you do?

Start the computer in recovery mode and run the bootrec /rebuildbcd command.

You have 10 computers that run Windows 10 and have BitLocker Drive Encryption (BitLocker) enabled. You plan to update the firmware of the computers. You need to ensure that you are not prompted for the BitLocker recovery key on the next restart. The drive must be protected by BitLocker on subsequent restarts. Which cmdlet should you run?

Suspend-BitLocker

Your network contains an Active Directory domain. The domain contains 1,000 computers that run Windows 10. You discover that when users are on their lock screen, they see a different background image every day, along with tips for u sing different features in Windows 10. You need to disable the tips and the daily background image for all the Windows 10 computers. Which Group Policy settings should you modify?

Turn off all Windows spotlight features

Your network contains an Active Directory domain. The domain contains 1,000 computers that run Windows 10. You need to prevent the computers of the research department from appearing in Network in File Explorer. What should you do?

Turn off network discovery.

You have a computer named Computer1 that runs Windows 10 Current branch. Computer1 belongs to a workgroup. You run the following commands on Computer1.New-LocalUser -Name User1 -NoPasswordAdd-LocalGroupMember Users -Member User1 What is the effect of the configurations?

User1 appears on the sign-in screen and must set a new password on the first sign-in attempt.

You have a workgroup computer named Computer1 that runs Windows 10. It has User1, User2, User3, User4, and Administrator. User3, User4, and Administrator sign in and sign out on Computer1. User1 and User2 have never signed in to Computer1. You are troubleshooting policy issues on Computer1. You sign in to Computer1 as Administrator.You add the Resultant Set of Policy (RsoP) snap-in to an MMC console.Which users will be able to sign in on Computer1?

User3, User4, and Administrator only Windows domain by using cached account information. Logon information for domain accounts can be cached locally so that, if a domain controller cannot be contacted on subsequent logons, a user can still log on.

You have a computer named Computer1 that runs Windows 10. Computer1 connects to multiple wireless networks. You need to view the wireless networks to which Computer1 connects. What should you use?

Wi-Fi in the Settings app

You plan to deploy Windows 10 to 100 secure computers. You need to select a version of Windows 10 that meets the following requirements: Uses Microsoft Edge as the default browser✑ Minimizes the attack surface on the computer✑ Supports joining Microsoft Azure Active Directory (Azure AD)✑ Only allows the installation of applications from the Microsoft StoreWhat is the best version to achieve the goal? More than one answer choice may achieve the goal. Select the BEST answer.

Windows 10 Pro in S mode

Your company has an on-premises network that contains an Active Directory domain. The domain is synced to Microsoft Azure Active Directory (Azure AD). The company plans to purchase new computers for all its users. The company has the following requirements:Microsoft Edge must be used as the default browser The attack surface on each of the computers must be minimized The computers must be able to join Microsoft Azure Active Directory (Azure AD) Only applications from the Microsoft Store must be allowed on the new computers You need to plan for the deploy Windows 10 to the new computers. Which version of Windows 10 should you deploy?

Windows 10 Pro in S mode

You have a computer that runs Windows 10. You use the computer to test new Windows features. You need to configure the computer to receive preview builds of Windows 10 as soon as possible. What should you configure from Update & Security in the Settings app?

Windows Insider Program

You customize the Start menu on a computer that runs Windows 10. You need to add Remote Desktop Connection to Group1 and remove Group3 from the Start menu.Which two actions should you perform from the Start menu customizations? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.

You have to unlock Group1 before you can make any changes to it. If you drag the Remote Desktop Connection from Group3 to Group1, Group3 will disappear.

You have a computer that runs Windows 8.1. When you attempt to perform an in-place upgrade to Windows 10, the computer fails to start after the first restart. You need to view the setup logs on the computer. Which folder contains the logs?

\$Windows.~BT\Sources\Panther\

You have a workgroup computer named Computer1 that runs Windows 10. You need to configure Windows Hello for sign-in to Computer1 by using a physical security key. What should you use?

a USB device that supports FIDO2 (enables users to leverage common devices to easily authenticate to online services in both mobile and desktop environments).

You have a computer that runs Windows 10. The computer fails to start, and you receive the following error message: 'BOOTMGR image is corrupt. The system cannot boot'. You need to repair the system partition.Which command should you run from Windows Recovery Environment (WinRE)?

diskpart.exe DiskPart, which has replaced fdisk, is a command-line utility that provides the ability to manage disks, partitions or volumes in your computer running all versions of operating system since Windows 2000.

Your network contains an Active Directory domain. The domain contains a computer named Computer1 that runs Windows 10. You need to view the settings to Computer1 by Group Policy objects (GPOs) in the domain and local Group Policies. Which command should you run?

gpresult


Ensembles d'études connexes

Comprehensive physical assessment of an adult post test

View Set

Patho Ch. 11 - Malignant Disorders of White Blood Cells

View Set

Chapter 30: Lung cancer and other noninfectious lower resp

View Set

Chapter 18. Disorders of Aging and Cognition

View Set