MD100 Practice Questions

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

You are a network admin at your company. A user attempts to start a computer and receives the following error message: "Bootmgr is missing". You need to resolve the issue. You start the computer in the recovery mode. Which command should you run next? Part 1: A. Bootrec B. Diskpart C. Sfc Part 2: A. /FixMbr B. /RebuildBCD C. /ScanNow D. /OffBootDir

"Bootrec /RebuildBCD" Part 1 = A. BootRec Part 2 = B. /RebuildBCD

Your network contains an Active Directory Forest. The first contains a root domain named contest.com and a child domain named corp.contoso.com. You have a computer named Computer1 that runs Windows 10. Computer1 is joined to the corp.contoso.com domain. Computer1 contains a folder named Folder1. In the Security settings of Folder1, Everyone is assigned the Full control permissions. On Computer1, you share Folder1 as Share1 and assign the Read permissions for Share1 to the Users group. For each of the following statements, select yes if the statement is true. Otherwise select No. 1. All local users on Computer1 have read access to \\Computer1\Share1 - ______ 2. All users in the corp.contoso.com Domain have read access to \\Computer1\Share1 - ______ 3. All the users in the contoso.com Domain have read access to \\Computer1\Share1 - ______

1. All local users on Computer1 have read access to \\Computer1\Share1 - YES 2. All users in the corp.contoso.com Domain have read access to \\Computer1\Share1 - YES 3. All the users in the contoso.com Domain have read access to \\Computer1\Share1 - NO

Your network contains an Active Directory domain. THe domain contains the users shown in the following table: User1 = Group 1 User2 = Group 1 and Group 2 User3 = Group 2 The domain contains a computer named Computer1 that runs Windows 10. Computer1 contains a folder named Folder1 that has the following permissions: -User2: Deny Write -Group 1: Allow Read -Group 2: Allow Modify Folder1 is shared as Share1$. Share1$ has the following configurations: -Everyone: Allow Full Control -Access-based enumeration: Enabled For each of the following statements select yes or No. 1. User1 can list files in \\Computer1\Share1$ 2. User2 can list files in \\Computer1\Share1$ 3. If User3 connects to Computer1 from File Explorer, Share1$ will be visible.

1. YES 2. YES 3. NO - "$" in the share name keeps the path always hidden.

Your network contains an Active Directory domain. The domain contains 10 computers that run Windows 10. On a different computer named Computer1, you plan to create a collector-initiated subscription to gather the event logs from the Windows 10 computers. You need to configure the environment to support the event log collection. Which two actions should you perform? Each correct answer presents part of the solution. A. Add Computer1 to the Event Log Readers group on the Windows 10 Computers. B. Add Computer1 to the Event Log Readers group on Computer1 C. On the Windows 10 Computers, change the Startup Type of Windows Event Collector to Automatic. D. Enable Windows Remote Management (WinRM) on the Windows 10 Computers. E. Enable Windows Remote Management (WinRM) on Computer1.

A. Add Computer1 to the Event Log Readers group on the Windows 10 Computers. D. Enable Windows Remote Management (WinRM) on the Windows 10 Computers.

You have a public computer named Computer1 that runs Windows10. Computer1 contains a folder named Folder1. You need to provide a user named User1 with the ability to modify the permissions of Folder1. The solution must use the principle of least privilege. Which NTFS permission should you assign to User1? A. Full Control. B. Modify. C. Write. D. Read & Execute.

A. Full Control. - In order to change permissions of others, you need the "Full Control" user right. Modify does NOT allow permission level changes.

Your network contains an Active Directory domain named contoso.com. The domain contains two computers named Computer1 and Computers2 that run Windows 10. On Computer1, you need to run the Invoke-Command cmdlet to execute several Powershell commands on Computer2. What should you do first? A. On Computer2, run the Enable-PSRemoting cmdlet B. From Active Directory, configure the Trusted for Delegation setting for the computer account of COmputer2. C. On Computer1, run the New-PSSession cmdlet. D. On COmputer2, add Computer1 to the Remote Management Users group.

A. On Computer2, run the Enable-PSRemoting cmdlet

Your network contains an Active Directory domain that is synced to a Microsoft Azure ACtive Directory (Azure AD) tenant. You company purchases a Microsoft 365 subscription. You need to migrate the Documents folder of users to Microsoft OneDrive for Business. What should you Configure? A. One Drive Group Policy Settings. B. roaming user profiles. C. Enterprise state Roaming. D. Folder Redirection Group Policy Settings.

A. One Drive group Policy Settings.

You have a computer named Computer1 that runs Windows 10 and has an application named App1. You need to use Performance Monitor to collect data about the processor utilization of App1. Which performance object should you monitor? A. Process B. Processor Performance C. Processor Information D. Processor

A. Process

Your company purchases 20 laptops that use a new hardware platform. In a test environment, you deploy WIndows 10 tot he new laptops. Some laptops frequently generate stop errors. You need to identify the cause of the issue. What should you use? A. Reliability Monitor B. Task Manager C. System Configuration D. Performance Monitor

A. Reliability Monitor

You have 15 computers that run Windows 10. Each computer has two network interfaces named Interface1 and Interface2. You need to ensure that network traffic uses Interface1, unless interface1 is unavailable. What should you do? A. Run the Set-NetIPInterface ""InterfaceAlias Interface1 ""InterfaceMetric 1 command. B. Run the Set-NetAdapterBinding ""Name Interface2 ""Enabled $true ""ComponentID ms_tcpip ""ThrottleLimit 0 command. C. Set a static IP address on Interface 1. D. From Network Connections in Control Pane, modify the Provider Order.

A. Run the Set-NetIPInterface ""InterfaceAlias Interface1 ""InterfaceMetric 1 command.

You have 200 computers that run Windows 10 and are joined to an Active Directory domain. You need to enable Windows Remote Management (WinRM) on all the computers by using Groupon Policy. Which three actions should you perform? A. Set the Startup Type of the Windows Remote Management (WS-Management) service to Automatic. B. Enable the Windows Firewall: Allow inbound remote administration exception setting. C. Enable the Allow remote server management through WinRM Setting. D. Enable the Windows Firewall: Allow inbound Remote Desktop exceptions setting. E. Enable the Allow Remote Shell access setting. F. Set the Startup Type of the Remote Registry service to Automatic.

A. Set the Startup Type of the Windows Remote Management (WS-Management) service to Automatic. B. Enable the Windows Firewall: Allow inbound remote administration exception setting. C. Enable the Allow remote server management through WinRM Setting. - Not D. because this question is NOT concerning Remote DESKTOP, just Remote Management.

You have a computer named Computer1 that runs Windows 10. On Computer1, you create the local users shown in the following table. Name: Member Of: User1. Users User2. Users, Guests User3. Power Users, Guest User4. Guests, Users, Administrators User5. Users, Distributed COM Users Which three user profiles will persist after each user signs out? A. User1 B. User2 C. User3 D. User4 E. User5

A. User 1 D. User4 E. User 5 - Users who are not admins and are part of guests get removed after each log off.

Your company has an isolated network used for testing. The network contains 20 computers that run Windows 10. THe computers are in a workgroup. During testing, the computers must remain in the workgroup. You discover that none of the computers are activated. You need to recommend a solution to activate the computers without connecting the network to the internet. What should you include in the recommendation? A. Volume Activation Management Tool (VAMT) B. Key Management Service (KMS) C. Active Directory-Based activation D. The Get-WindowsDeveloperLicense cmdlet

A. Volume Activation Management Tool - It allows for a proxy to reach out on behalf of all devices for activation. (The answer is not KMS requires a minimum of 25 clients before it can be used for activation)

You plan to deploy Windows 10 to 100 secure computers. You need to select a version of Windows 10 that meets the following requirements: -Uses Microsoft Edge as the default browser. -Minimizes the attack surface on the computer. -Supports joining Microsoft Azure Active Directory (Azure AD). -Only allows the installation of applications from the Microsoft Store. What is the best version too achieve the goal? A. Windows 10 Pro in S Mode B. Windows 10 Home in S Mode C. Windows 10 Pro D. Windows 10 Enterprise

A. Windows 10 Pro in S Mode - it supports Domain joining with edge as the default browser. (B. Windows 10 Home in S mode does NOT support Domain Join... C. Windows 10 Pro does NOT support Domain Join Either...)

You have a computer that runs Windows 10. You use the computer to test new Windows features. You need to I configure the computer to receive preview builds of Windows 10 as soon as possible. What should you configure from Update & Security in the Settings app? A. Windows Insider Program B. Windows Update C. Delivery Optimization D. For Developers

A. Windows Insider Program

A user named User1 has a computer named COmputer1 that runs Windows 10. Computer1 is joined to an Azure Active Directory tenant and named contoso.com. User1 joins cComputer1 to contoso.com by using [email protected] COmputer1 contains a folder named Folder1. Folder1 is in drive C and is shared as Share1. Share1 has the permission shown in the following table: Everyone = Full control. AzureAD\[email protected] = Owner A user named User2 has a computer named COmputer2 that runs Windows 10. User2 joins Computer2 to Contoso.com by using [email protected]. User 2 attempts to access Share1 and receives the following error message: "The username or password is incorrect." Solution: In Azure AD, you create a group named Group1 that contains User1 and User2. You grant Group1 Modify access to Folder1. Does this meet the goal? A. Yes B. No

A. Yes

You deploy Windows 10k to a computer named Computer1. Computer1 contains a folder named C:\Folder1. Folder1 contains multiple documents. You need to ensure that you can recover the files in Folder1 by using the Previous Versions tab. Solution: You enable File History and add Folder1 in the Documents Library. Does this meet the goal? A. Yes B. No

A. Yes

You have a computer that runs Windows 10. The computer contains a folder named D:\Scripts. D:\Scripts contains several PowerShell scripts. You need to ensure that you can run the PowerShell scripts without specifying the full path to the scripts. The solution must persist between PowerShell sessions. Solution: From Powershell, you run $env:Path += ";d:\scripts". Does this meet the goal? A. Yes B. No

A. Yes

You have a laptop named Computer1 that runs Windows 10. When in range, Computer1 connects automatically to a Wi-if network named Wireless1. You need to prevent Computer1 from automatically connecting to Wireless1. Solution: From a command Prompt, you run "Nets wlan delete profile name="wireless1". Does this meet the goal? A. Yes B. No

A. Yes

You have two computers named Computer1 and Computer2 that run Windows 10. You have an Azure AD user account named [email protected] that is in the local Admin group on each computer. You sign in to Computer1 by using [email protected]. You need to ensure that you can use Event Viewer on Computer1 to connect to the event logs on Computer2. Solution: On Computer2, you run the Enable-PSRemoting cmdlet. Does this meet the goal? A. Yes B. No

A. Yes - You can view Event logs/pull event logs via powershell removing.

You have a computer named Computer1 that runs Windows 10. The computer contains a folder that contains sensitive Data. YOu need to log which user reads the contents of the folder and modifies and deletes files in the folder. Solution: From the properties of the folder, you configure the auditing settings and from Audi Policy in the local group Policy you configure Audit Object Access. Does this meet the goal? A. Yes. B. No.

A. Yes.

You have a computer named Computer1 that runs Windows 10. You test Windows updates on Computer1 before you make the updates available to other users at your company. You install a quality update that conflicts with a customer device driver. You need to remove the update from Computer1. Solution: From an elevated command prompt, you run the wuss.exe command and specify the /uninstall parameter. Does this meet the goal? A. Yes B. No

A. Yes. You must specify the parameter "/update?

You have a computer that runs Windows 8.1. When you attempt to perform an in-place upgrade to Windows10, the computer fails to start after the first restart. You need to view the setup logs on the computer. Which folder contains the logs? A. \$Windows.~BT\Sources\Panther\ B. \Windows\Logs C. \Windows\Temp D. \$Windows.~BT\Inf

A. \$Windows.~BT\Sources\Panther\

You have several computers that run Windows 10. The Computers are in a workgroup and have BitLocker Drive Encryption enabled. You join the computers to Microsoft Azure AD. You need to ensure that you can recover the BitLocker recovery key for the computers from Azure AD. What should you do first? A. Disable BitLocker. B. Add a BitLocker Key Protector. C. Suspend BitLocker. D. Disable the TMP Chip.

B. Add a BitLocker Key Protector.

You have several computers that run Windows 10. THe computers are in a workgroup and have BitLocker Drive Encryption enabled. You join the computers to Microsoft Azure AD. You need to ensure that you can recover the BitLocker recovery key for the computers from Azure AD. What Should you do first? A. Disable BitLocker. B. Add a BitLocker key protector. C. Suspect BitLocker. D. Disable the TPM chip.

B. Add a BitLocker key Protector.

Your network contains an Active Directory domain. The domain contains a user named User1. User1 creates a Microsoft Account. User1 needs to sign in to cloud resources by using the Microsoft account without being prompted for credentials. Which settings should User1 configure? A. User Account in Control Panel. B. Email & app accounts in the Settings app. C. Users in Computer Management. D. Users in Active Directory Users and Computers.

B. Email & app accounts in the settings app.

You have several computers that run Windows 10. The computers are in a workgroup. You need to prevent users from using Microsoft Store Apps on their computer. What are two possible ways to achieve the goal? A. From Security Settings in the local Group Policy, configure Security Options. B. From Administrative Templates in the local Group Policy, configure the Store settings. C. From Security Settings in the local Group Policy, configure Software Restriction Policies. D. From Security Settings in the local Group Policy, configure Application Control Policies.

B. From Administrative Templates in the local Group Policy, configure the Store settings. D. From Security Settings in the local Group Policy, configure Application Control Policies.

You have a computer named Computer1 that runs Windows 10. On Computer1, you turn on File History. You need to protect a folder named D:\Folder1 by using File History. What should you do? A. From File Explorer, modify the Security settings of D:\Folder1. B. From the File Explorer, add D:\Folder1 to the Documents library. C. From the Settings app, configure the Recovery settings. D. From File History in Control Panel, configure the Select drive settings.

B. From the File Explorer, add D:\Folder1 to the Documents library. - D. Is where you select WHERE to Backup TO.

A user named User1 has a computer named Computer1 that runs Windows10. Users1 connects to a Microsoft Azure virtual machine named VM1 by using Remote Desktop. User1 creates a VPN connection to a partner organization. When the VPN connection is stabled, User1 cannot connect to VM1. When User1 disconnects from the VPN, the user can connect to VM1. You need to ensure that User1 can connect to VM1 while connected to the VPN. What should you do? A. From the proxy Settings, Add the IP address to VM1 to the bypass list to bypass the proxy. B. From the properties of VPN1, clear the Use Default gateway on Remote network check box. C. From the properties of the Remote Desktop connection to VM1, specify a Remote Desktop Gateway (RD Gateway). D. From the properties of VPN1, configure a static default gateway address.

B. From the Properties of VPN1, clear the Use default gateway on remote network check box. - It is called "Split-tunneling" and it allows you to change default gateway and allows internet access.

You deploy Windows 10 to 20 new laptops. THe laptops will be used by users who work at customer sites. Each user will be assigned one laptop and one Android device. You need to recommend a solution to lock the laptop when the users leave their laptop for an extended period. Which two actions should you include in the recommendation? A. Enable Bluetooth discovery. B. From the Settings app, configure Dynamic lock settings. C. From Sign-in options, configure Windows Hello settings. D. From the Settings app, configure the Lock screen settings. E. Pair the Android device and the laptop. F. From the Settings app, configure the Screen timeout settings.

B. From the Settings app, configure Dynamic lock settings. E. Pair the Android device and the laptop.

You have a computer named Computer1 that runs Windows 10. Computer1 contains a folder named Folder1. You need to log any users who take ownership of the files in Folder1. Which two actions should you perform? A. Modify the folder attributes of Folder1. B. Modify the advanced Security Settings for Folder1. C. From a Group Policy Object (GPO), Configure the Audit Sensitive Privilege User Settings. D. From a Group Policy Object (GPO), Configure the Audit File System Setting. E. Install the Remote Server Administration Tools (RSAT).

B. Modify the advanced Security Settings for Folder1. C. From a Group Policy Object (GPO), Configure the Audit Sensitive Privilege User Settings.

Ten sales users will travel to a location that has limited bandwidth that is expensive. THe sales users will be at the location for three weeks. You need to prevent all Windows updates from downloading for the duration of the trip. The solution must not prevent access to email and the Internet. Solution: From Network & Internet in the Settings app, you set a data limit. Does this meet the goal? A. Yes B. No

B. No

You deploy Windows 10k to a computer named Computer1. Computer1 contains a folder named C:\Folder1. Folder1 contains multiple documents. You need to ensure that you can recover the files in Folder1 by using the Previous Versions tab. Solution: You set up Backup and Restore (Win7) and include Folder1 in the backup. Does this meet the goal? A. Yes B. No

B. No

You have a computer that runs Windows 10. The computer contains a folder named D:\Scripts. D:\Scripts contains several PowerShell scripts. You need to ensure that you can run the PowerShell scripts without specifying the full path to the scripts. The solution must persist between PowerShell sessions. Solution: At a command Prompt, you run set.exe path=d:\scripts. Does this meet the goal? A. Yes B. No

B. No

You have a computer that runs Windows 10. The computer contains a folder named D:\Scripts. D:\Scripts contains several PowerShell scripts. You need to ensure that you can run the PowerShell scripts without specifying the full path to the scripts. The solution must persist between PowerShell sessions. Solution: From a Command Prompt, you run set.exe PATHEXT=d:\scripts A. Yes B. No

B. No

You have a laptop named Computer1 that runs Windows 10. When in range, Computer1 connects automatically to a wi-if network named Wireless1. You need to prevent Computer1 from automatically connecting to Wireless1. Solution: From the properties of the Wi-if adapter, you disable Link-Layer Topology Discovery Responder. Does this meet the goal? A. Yes B. No

B. No

You have two computers named Computer1 and Computer2 that run Windows 10. You have an Azure AD user account named [email protected] that is in the local Admin group on each computer. You sign in to Computer1 by using [email protected]. You need to ensure that you can use Event Viewer on Computer1 to connect to the event logs on Computer2. Solution: On Computer2, you run the winrm quickconfig command. Does this meet the goal? A. Yes B. No

B. No - "Weututil.exe" is used to remotely access event logs, not Winrm...

Ten sales users will travel to a location that has limited bandwidth that is expensive. THe sales users will be at the location for three weeks. You need to prevent all Windows updates from downloading for the duration of the trip. The solution must not prevent access to email and the Internet. Solution: From Network & Internet in the Settings app, you set the network connections as metered connections. Does this meet the goal? A. Yes B. No

B. No - Although it prevents feature updates, critical updates are still downloaded... So not ALL updates are stopped.

Ten sales users will travel to a location that has limited bandwidth that is expensive. THe sales users will be at the location for three weeks. You need to prevent all Windows updates from downloading for the duration of the trip. The solution must not prevent access to email and the Internet. Solution: From Update & Security in the Settings app, you turn on Pause Updates. Does this meet the goal? A. Yes B. No

B. No - Clicking pause in this area only pause for 7 days, to pause for up to 35 days, you must click advanced settings in the settings app.

You have a laptop named Computer1 that runs Windows 10. When in range, Computer1 connects automatically to a wi-if network named Wireless1. You need to prevent Computer1 from automatically connecting to Wireless1. Solution: From the Services console, you disable the Link-Layer Topology Discovery Mapper service. Does this meet the goal? A. Yes B. No

B. No.

You have a computer named Computer1 that runs Windows 10. The computer contains a folder that contains sensitive Data. YOu need to log which user reads the contents of the folder and modifies and deletes files in the folder. Solution: From the properties of the folder, you configure the Auditing settings and from the Audit Policy in the local Group Policy, you configure Audi directory service access. Does this meet the goal? A. Yes. B. No.

B. No. - Folders and Files are objects, not directory services.

You have a computer named Computer1 that runs Windows 10. You test Windows updates on Computer1 before you make the updates available to other users at your company. You install a quality update that conflicts with a customer device driver. You need to remove the update from Computer1. Solution: From System Restore, you revert the system state to a restore point that was created before the update was installed. Does this meet the goal? A. Yes B. No

B. No. Restore would get rid of Feature Updates. NOT quality updates.

Your company has a wireless access pint that uses WPA2-Enterprise. You need to configure a computer to connect tot eh wireless access point. What should you do first? A. Create a provisioning package in Windows Configuration Designer. B. Request a pass phrase. C. Request and install a certificate. D. Create a connection Manager Administration Kit (CMAK) package.

B. Request a Passphrase. - First get the passphrase, second get the certificate.

You have a computer named Computer1 that runs Windows 10. From Event Viewer on Computer1, you have a task named Action1 that is attached to the following event: -Log: System -Source: Kernel-General -EventID: 16 You need to modify the settings of Action1. What should you use? A. The Settings app. B. Task Scheduler. C. Event Viewer. D. System Configuration.

B. Task Scheduler. -Once task is part of a schedule you can only modify it from task scheduler. -LOOK UP TO CONFIRM

You have a computer that runs Windows 10 and is joined to Azure AD. you attempt to open Control Panel and receive the error message "This operation has been cancelled due to restrictions in effect on this computer. Please contact your system administrator." You need to be able to access Control Panel. What should you modify? A. the PowerShell execution policy B. The Local Group policy C. The Settings App D. A Group Policy Preference

B. The Local Group Policy - Policy Enforces, Preference is a suggestion. - It is joined to Azure AD but Intune MDM policy is not an option so that implies it is not set up on the Network so local group policy is the best answer.

You have a computer named Computer1 that runs Windows 10. You complete a full backup of Computer1 to an external USB drive. You store the USB drive offsite. You delete several files from your personal Microosft OneDrive account by using File Explorer, and then you empty the Recycle Bin on COmputer1. You need to recover the files 60 days after you deleted them in the least amount of time possible. What should you use? A. The OneDrive recycle bin. B. The full backup on the external USB drive. C. Recovery in the settings app.

B. The full backup on the external USB drive. -OneDrive FOR BUSINESS KEEPS FOR 90 DAYS - Regular ONEDRIVE DOES NOT.

You have a Microsoft Azure AD tenant. Some users sign in to their computer by using Windows Hello for Business. A user named User1 purchases a new computer and joins the computer to Azure AD. User1 attempts to configure the sign-in options and receives the error message - " *Some settings are hidden or managed by your organization." On the Windows hello customization Screen. You open device manager and confirm that all the hardware works correctly. You need to ensure that User1 can use Windows Hello for Business facial recognition to sign in to the computer. What should you do first? A. Purchase an infrared (IR) Camera. B. Upgrade the computer to Windows 10 Enterprise. C. Enable UEFI Secure Boot. D. Install a virtual TPM Driver.

B. Upgrade the computer to Windows 10 Enterprise. - Because this user is trying to use WINDOWS HELLO FOR BUSINESS - this is an ENTERPRISE version of Windows Hello and therefore the personal use computer would need to have Windows 10 Enterprise installed in order to access the features.

You have a computer named Computer1 that runs Windows 10. Computer1 connects to multiple wireless networks. You need to view the wireless networks to which Computer1 connects. What should you use? A. the System log in Event Viewer B. Wi-Fi in the Settings app C. The properties of the wireless adapter in Network Connections in the Control Panel. D. The Details tab for the wireless adapter in Device Manager.

B. Wi-Fi in the Settings app.

You have three computers that run Windows 10 as shown: NAME. TPM VERSION. OS Computer1. NONE. WIN10-Enterprise Computer2. 2.0. WIN10-Pro Computer3. 1.2. WIN10-Enterprise All the computers have C and D volumes. The require additional authentication at startup Group Policy Setting is disabled on all the computers. Which volumes can you encrypt by using BitLocker Drive Encryption?

Because TPM is required for BitLocker: Computer 2 & 3 for Drives C & D.

You have 10 computers that run Windows 10. You have a Windows Server Update Services (WSUS) Server. You need to configure the computers to install updates from WSUS. Which two settings should you configure?

Both Answers are GPO settings: 1. Configure Auto Updates. (Turn on Updates/Schedule). 2. Configure WIndows Updates Services Location (Put in the WSUS Server Name/URL)

Your network contains an Active Directory Domain. The domain contains computers that run Windows 10. You need to provide a user with the ability to remotely create and modify shares on the computers. The solution must use the principle of least privilege. To which group should you add the user? A. Power Users. B. Remote Management Users. C. Administrators. D. Network Configuration Operators.

C. Administrators - Although Power Users can manage shares, they cannot do so remotely, so they would need to be ADMIN to do both.

You deploy 100 computers that run WIndows 10. Each computer has a cellular connection and a Wi-FI connection. You need to prevent the computers from using the cellular connection unless a user manually connects to the cellular network. What should you do? A. Set the Use Cellular instead of Wi-Fi setting for the cellular connection to Never. B. Run the nets wlan set hostednetwork mode=disallow command. C. Clear the Let Windows Manage this connection check box for the cellular connection. D. Select the Let Windows manage this connection check box for the wi-if connection.

C. Clear the Let Windows Manage this connection check box for the cellular connection.

You have several computers that run Windows 10. All users have Microsoft OneDrive for Business installed. Users frequently save files to their desktop. You need to ensure that all the users can recover the files on their desktop from OneDrive for Business. Which two actions should you choose? A.Copy ADMX and ADML files to C:\Users\PublicDesktop\ B. From Backup in the Settings app, add a drive. C. Configure the Silently Move Windows Known Folders to OneDrive Settings. D. Copy ADMX and ADML files to C:\Windows\PolicyDefinitions E. Configure the Save Documents to OneDrive by default setting.

C. Configure the Silently Move Windows Known Folders to OneDrive Settings. D. Copy ADMX and ADML files to C:\Windows\PolicyDefinitions

Your company has a main office and a branch office. THe offices connect to each other by using a WAN link. Access to the Internet is provided through the main office. The branch office contains 25 computers that run Windows 10. The computers contain small hard drives that have very little free disk space. You need to prevent the computers in the branch office from downloading updates from peers to the network. What should you do? A. From the Settings app, modify the Delivery Optimizations settings. B. Configure the network connections as metered connections. C. COnfigure the computer to use BranchCache in hosted cache mode. D. Configure the updates to use the Semi-Annual Channel (Targeted) Channel.

C. Configure the computers to use BranchCache in hosted cache mode.

You have 100 computers that run Windows 10. The computers are in a workgroup. THe computers have a low-bandwidth metered Internet Connection. You need to reduce the amount of internet bandwidth consumed to download updates. What should you configure? A. BranchCache in hosted mode. B. BranchCache in distributed cache mode. C. Delivery Optimization. D. Background Intelligent Transfer Service (BITS).

C. Delivery Optimization

You deploy Windows 10 to several computers. The computers will be used by users who frequently present their desktop to other users. You need to prevent applications from generating toast notifications in the notification area. Which settings should you configure from the Settings app? A. Shared Experiences B. Privacy C. Focus Assist D. Tablet Mode

C. Focus Assist - Focus assist will automatically hide incoming notifications, so they don't pop up and distract you while you're playing a game, giving a presentation, or using a full-screen applications. -Share experience allow you to start a task on one device and finish it on another.

You have a computer that runs Windows 10. You can start the computer but cannot sign in. You need to start the computer into the Windows Recovery Environment (WINRE). What should you do? A. Turn off the computer. Turn on the computer, and then press F8. B. Turn off the computer. Turn on the computer, and then press F10. C. From the sign-in screen, hold the Shift key, and then click restart. D. Hold Alt+CTRL+DELETE for 10 seconds.

C. From the sign-in screen, hold the Shift key, and then click restart.

You have a computer named Computer1 that runs Windows 10. You need to prevent standard users from changing the wireless network settings on Computer1. The solution must allow Administrators to modify the wireless network settings. What should you use? A. Windows Configuration Designer. B. MSConfig. C. Local Group Policy Editor. D. An MMC console that has the Group Policy Object Editor snap-in.

C. Local Group Policy Editor.

You have a computer named Computer1 that runs Windows 10. You are troubleshooting connectivity issues on Computer1. You need to view the remote addresses to which Computer1 has active TCP connections. Which tool should you use? A. Performance Monitor B. Task Manager C. Resource Monitor D. Windows Defender Firewall with Advanced Security

C. Resource Monitor - Resource Monitor > Network > TCP Connections is the full path to see TCP connections.

You enable Windows PowerShell removing on a computer that runs Windows 10. You need to limit which PowerShell cmdlets can be used in a remote session. Which three actions should you perform in Sequence? A. Run the New-PSSession cmdlet. B. Create a PS1 file that contains a list of the cmdlets. C. Run the New-PSSessionConfigureationFile cmdlet. D. Create a PSSC file that contains a list of the cmdlets. E. Run the Register-PSSessionConfiguration cmdlets. F. Run the Enter-PSSession cmdlet.

C. Run the New-PSSessionConfigureationFile cmdlet. E. Run the Register-PSSessionConfiguration cmdlets. F. Run the Enter-PSSession cmdlet.

You have a computer named Computer1 that runs Windows 10. You need to configure User Account Control (UAC) to prompt administrators for their credentials. Which settings should you modify? A. Administrators Properties in Local Users and Groups. B. User Account Control Settings in Control Panel. C. Security Options in Local Group Policy Editor. D. User Rights Assignment in Local Group Policy Editor.

C. Security Options in Local Group Policy Editor.

You have an Azure AD tenant named contoso.com. You have a workgroup computer named Computer1 that runs Windows 10. You need to add Computer1 to contoso.com. What should you use? A. Computer Management B. dsregcmd.exe C. The Settings app D. netdom.exe

C. The Settings app

Your network contains an Active Directory Domain. The domain contains 1,000 computers that run Windows 10. You need to prevent the computers of the research department from appearing in Network in File Explorer. What should you do? A. Configure DNS to use an external Provider B. Modify the %systemroot%\System\drivers\etc\Networksfile. C. Turn off network discovery D. Disable the Network List Service.

C. Turn off network discovery.

Your company has a Remote Desktop Gateway (RD Gateway). You have a server named Server1 that is accessible by using Remote Desktop Services (RDS) through the RD Gateway. You need to configure a Remote Desktop connection to connect through the gateway. Which setting should you configure? A. Connection Settings. B. Server Authentication. C. Local devices and resources. D. Connect from Anywhere.

D. Connect from Anywhere.

You are a network administrator at your company. The Company uses an application that checks for network connectivity to a server by sending a ping request to the IPv6 address of the server replies, the application loads. A user cannot open the application. You manually send the ping request from the computer of the user and the server does not reply. You send the ping request from your computer and the server replies. You need to ensure that the ping request works from the user's computer. Which Windows Defender Firewall rule is a possible cause of the issue? A. File and Printer Sharing (NB-DATAGRAM-IN) B. File and Printer Sharing (Echo Request ICMPv6-Out) C. File and Printer Sharing (NB-Datagram-Out) D. File and Printer Sharing (Echo Request ICMPv6-In)

D. File and Printer Sharing (Echo Request ICMPv6-In)

Your network contains an Active Directory domain named contoso.com. A user named User1 has a personal computer named Computer1 that runs Windows 10 Pro. User1 has a VPN connection to the corporate network. You need to ensure that when User1 connects to the VPN, network traffic uses a proxy server located in the corporate network. The solution must ensure that User1 can access the Internet when disconnected from the VPN. What should you do? A. From Control Panel, modify the Windows Defender Firewall settings. B. From the Settings app, modify the Proxy settings for the local computer. C. From Control Panel, Modify the properties of the VPN Connections. D. From the Settings app, modify the properties of the VPN Connection.

D. From the Settings app, modify the properties of the VPN Connection. - The requirement is that a proxy server is used WHEN CONNECTED TO THE VPN. Applying a proxy via proxy settings specifically says "Use a proxy server for Ethernet or Wi-Fi-Connections. THESE SETTINGS DON'T APPLY TO VPN CONNECTIONS".

Your network contains an Active Directory domain. The domain contains 10 computers that run Windows 10. Users in the finance department use the computers. You have a computer named Computer1 that runs Windows 10. From Computer, You plan to run a script that executes Windows PowerShell commands on the finance department computers. You need to ensure that you can run the PowerShell commands on the finance department from Computer1. What should you do on the finance department computers? A. From the local Group Policy, enable the Allow Remote Shell Access setting. B. From the local Group Policy, enable the Turn on Script Execution setting. C. From the Windows PowerShell, run the Enable-MMAgrent cmdlet. D. From the WindowsPowerShell, run the ENable-PSRemoting cmdlet.

D. From the WindowsPowerShell, run the ENable-PSRemoting cmdlet.

Your network contains an Active Directory Domain. The domain contains a computer named Computer1 that runs WIndows 10. Computer1 contains a folder named Folder1. You plan to share Folder1. Everyone will have Read share permissions, and Admins will have Full Control share permission. You need to prevent the share from appearing when users browse the network. What should you do? A. Enable access-based Enumeration. B. Deny the List NTFS permissions on Folder1. C. Add Folder1 to a domain-based DFS namespace. D. Name the share Folder1$.

D. Name the share Folder1$. - Access-based enumeration will hide the share from anyone who doesn't have permission to access the share. However, as "EVERYONE" has Read access to the share, the share would appear for everyone when they browse the network.

You have 20 computers that run Windows 10. You configure all the computers to forward all the events from all the logs to a computer named Computer1 that runs Windows 10. When you sign in to Computer1, you cannot see any security events from other computers. You can see all the other forwarded events from the other computers. You need to ensure that the security events are forwarded to Computer1. What should you do? A. On each computer, run wecutil ac /q. B. On each computer, add the NETWORK SERVICE account to the Event Log Readers group. C. On each computer, run WinRM AC ""q. D. On Computer1, add the account of Computer1 to the Event Log Readers group.

D. On Computer1, add the account of Computer1 to the Event Log Readers group. - Because most accounts can see most log files and the files are already on the new server, it is most likely not allowing the log reviewers account to see the SECURITY log specifically because they re locked down. Adding the account to the Log Readers Group would ALLOW access.

You have an Azure Active Directory (Azure AD) tenant that contains a user named [email protected] You have a computer named Computer1 that runs Windows 10. You join Computer1 to Azure AD. You enable Remote Desktop on Computer1. [email protected] attempts to connect to Computer1 by using Remote Desktop and receives the following error message: "The logon attempt failed." You need to ensure that the user can connect to Computer1 by using Remote Desktop. What should you do first? A. In Azure AD, assign [email protected] the Cloud device administrator role. B. From the local Group Policy, modify the Allow log on through Remote Desktop Services user right. C. In Azure AD, assign [email protected] the Security administrator role. D. On Computer1, create a local user and add the new user to the Remote Desktop Users group.

D. On Computer1, create a local user and add the new user to the Remote Desktop Users group. -Azure AD doesn't have GPO so use local or MDM Intune. -When you get "login attempt failed" it means they are allowed to RDP but they failed to authenticate... if RDP was off you would see "Can't connect".

Your network contains an Active Directory domain. The Domain contains a user named Admin1. All computers run Windows 10. You enable Windows PowerShell removing on the computers. You need to ensure that ADmin1 can establish remote PowerShell connections to the computers. The solution must use the principle of least privilege. To which group should you add ADmin1? A. Access Control Assistance Operators. B. Power Users. C. Remote Desktop Users. D. Remote Management Users.

D. Remote Management Users. - This allows remote MANAGEMENT.

You have a computer that runs Windows 10 and has Bitlocker Drive Encrypton enabled on all volumes. You start the computer from Windows Recovery Environment (WINRE). You need to read the data on the system drive. What should you do? A. Run cipher.exe and specify the /rekey parameter. B. Run cipher.exe and specify the /add user parameter. C. Run manage-bed.exe and specify the -off parameter. D. Run manage-bed.exe and specify the -unlock parameter.

D. Run manage-bed.exe and specify the -unlock parameter.

Your network contains an Active Directory Domain. The Domain contains 1,000 computers that run Windows 10. You discover that when users are on their lock screen, they see a different background image every day, along with tips for using different features in Windows 10. You need to disable the tips and the daily background image for all the Windows 10 computers. Which Group Policy settings should you modify? A. Turn off the Windows Welcome Experience. B. Turn off Windows Spotlight on Settings. C. Do not suggest third-party content in Windows Spotlight. D. Turn off all Windows spotlight features.

D. Turn off all Windows Spotlight Features.

You have a computer that runs Windows 10. The computer fails to start, and you receive the following error message: "BOOTMGR image is corrupt. The system cannot boot". You need to repair the system partition. Which command should you run from Windows Recovery Environement (WINRE)? A. fdisk.exe B. Chkdsk.exe C. Diskpart.exe D. Bcdboot.exe

D. bcdboot.exe -YOU NEED TO REPAIR THE SYSTEM PARTITION so you use bcdBoot.exe.

You have a computer named Computer1 that runs Windows 10. You turn on System Protection and create a restore point named Point1. You perform the following changes: - Add four files named FIle1.txt, File2.dll, File3.sys, and File4.exe to the desktop. - Run a configuration script that adds the following four registry keys: —Key1 to HKCU —Key2 to HKClassesRoot —Key3 to HKLM/System —Key4 to HKCurrentConfig You restore Point1. WHich files and registry keys are removed?

File 2, 3, and 4 will be removed as well as all 4 Registry Keys. (File1.txt - the ".txt" makes it a "Personal file" which will not be removed during a restore. )

You have a computer named Computer1 that runs Windows 10. Computer1 belongs to a workgroup. You run the following commands on Computer1. New-LocalUser ""Name User1 ""NoPassword Add-LocalGroupMember User ""Member User1 What is the effect of the configuration? A. User1 is prevented from signing in until the user is assigned additional user rights. B. User1 appears on the sign-in screen and can sign in without a password. C. User1 is prevented from signing in until an administrator manually sets a password for the user. D. User1 appears on the sign-in screen and must set a new password on the first sign-in attempts.

If it is based off of Win10-Ver1809 or older... B. User1 appears on the sign-in screen and can sign in without a password. If it is based off of Win10-Ver1903 or newer, Microsoft changed it in a feature update... D. User1 appears on the sign-in screen and must set a new password on the first sign-in attempt.

You deploy Windows 10 to a computer named Computer1. Computer1 contains a folder named C:\Folder1. Folder1 contains multiple documents. You need to ensure that you can recover the files in Folder1 by using the Previous Versions tab. Solution: You enable File History and add Folder1 to File History. Does this meet the goal? A. Yes B. No

LOOK THIS UP

A user named User1 has a computer named Computer1 that runs Windows 10. Computer1 is joined to an AzureAD tenant named contoso.com. User1 joins Computer1 to contoso.com by using [email protected] contains a folder named Folder1. Folder1 is in drive C and is shared as Share1. Share1 has the permissions : Everyone = Full Control. AzureAD\[email protected] = Owner A user named User2 has a computer named Computer2 that runs Windows 10. User2 joins Computer2 to contoso.com by using [email protected]. User2 attempts to access Share1 and receives the following error message: "The username or password is incorrect.". You need to ensure that User2 can connect to Share1. Possible Solution: You create a local user account on Computer1 and instruct User2 to use the local account to connect to Share1. Does this meet the goal?

LOOK it up

You are planning a recovery strategy for computers that run WIndows 10. You need to create recovery procedures to roll back feature updates and quality updates. What should you include in the procedures? Question 1: To roll back feature updates: A. Recovery from the settings app. B. Windows update from the settings app. C. Programs and features from the Control Panel. D. Troubleshoot from the settings app. Question 2: To roll back quality updates: A. Recovery from the settings app. B. Windows update from the settings app. C. Programs and features from the Control Panel. D. Troubleshoot from the settings app.

NEED TO LOOK INTO THIS

You have a file named Reg1.reg that contains the following content. " Windows Registry Editor Version 5.00 [HKEY_Classes_Root\Directory\Background\Shell\Notepad] [HKEY_Classes_Root\Directory\Background\Shell\Notepad\command] @="notepad.exe" " What is the effect of importing the file? A. A key named command will be renamed as notepad.exe B. In a key named Notepad, the command value will be set to @="notepad.exe" C. In a key named command, the default value will be set to notepad.exe.

NEED TO LOOK THIS UP. QUESTION 7.

You deploy Windows 10k to a computer named Computer1. Computer1 contains a folder named C:\Folder1. Folder1 contains multiple documents. You need to ensure that you can recover the files in Folder1 by using the Previous Versions tab. Solution: You enable File History and add Folder1 to File History. Does this meet the goal? A. Yes B. No

NEED TO LOOK UP

Your company uses Microsoft Deployment Toolkit (MDT) to deploy Windows 10 to new computers. The company purchases 1,000 new computers. You need to ensure that the Hyper-V feature is enabled on the computers during the deployment. What are two possible ways to achieve the goal? A. Add a task sequence step that adds a provisioning package. B. In a Group Policy object (GPO), from Computer COnfiguration, configure Application Control Policies. C. Add a custom command to the unattended.xml file. D. Add a configuration setting to the Windows Deployment Services (WDS). E. Add a task sequence step that runs DISM.exe.

NEED TO LOOK UP ITS QUESTION 8 Discussion BOARD PICTURE

You have 20 computers that run Windows 10. The computers are in a workgroup. You need to create a local user named ADmin1 on all the computers. ADmin1 must be a member of the Remote Management Users group. What should you do? A. From Windows Configuration Designer, create a provisioning package, and then run the provisioning package on each computer. B. Create a script that runs the New-ADUSer cmdlet and the Set-ADGroup cmdlet. C. Create a Group Policy Object (GPO) that contains the Local User Group Policy Preference. D. Create a script that runs the New-MsoIUser cmdlet and the ADd-ADComputerServiceAccount cmdlet.

NEED TO LOOK UP, because can workgroups have GPOs? C. Create a Group Policy Object (GPO) that contains the Local User Group Policy preference. -Group Policy "preferences" is client/local based. Group Policy "Preferences" are Domain Based....

A user named User1 has a computer named Computer1 that runs Windows 10. Computer1 is joined to an AzureAD tenant named contoso.com. User1 joins Computer1 to contoso.com by using [email protected] contains a folder named Folder1. Folder1 is in drive C and is shared as Share1. Share1 has the permissions : Everyone = Full Control. AzureAD\[email protected] = Owner A user named User2 has a computer named Computer2 that runs Windows 10. User2 joins Computer2 to contoso.com by using [email protected]. User2 attempts to access Share1 and receives the following error message: "The username or password is incorrect.". You need to ensure that User2 can connect to Share1. Possible Solution: In AzureAD, you create a group named Group1 that contains User1 and User2. You grant Group1 Change access to Share1. Does this meet the goal?

NO - you cannot create local file share permissions through Azure AD.

You have 100 computers that run Windows 10. You have no servers. All the computers are joined to Microsoft Azure AD. The computers have different update settings, and some computers are configured for manual updates. You need to configure Windows Update. THe solution must meet the following requirements: -The configuration must be managed from a central location. -Internet traffic must be minimized. -Costs must be minimized. How should you configure WIndows Update? Question 1: Windows Update Technology to use: A. WSUS B. SCCM C. Windows Update for Business. Question 2: Manage the Config by using: A. GPO B. SCCM C. Intune. Question 3: Manage network traffic by using: A. Delivery Optimization B. Branch Cache C. Peer Cache

Question 1: C. Windows update for Business - Since there are no servers. Question 2: C. Intune -Since no servers or local AD (Azure AD doesn't have GPO) Question 3: A. Delivery Optimization - Microsoft's Preferred method.

Your network contains an Active Driectory domain named contoso.com. The domain contains a server named Serfver1 that runs Windows Server 2016 and a computer named Computer1 that runs Windows 10. Server1 contains a share named Backup. All users can read and write data in Backup. On Monday at 13:00, you configure Backup and Restore (Windows 7) on Computer1 to use the following setitings: -Backup Destination: \\Server1\Backup -What do you want to back up? :Local Disk (D:), Include a system image of Drives: System Reservered, (C:). -Schedule: Daily at 23:00 You need to identify how many backups will be available on Thursday at 17:00. What should you identify? Question 1: Local Disk (D:) Backups? A. One Backup that uses ZIP Files B. One Backup that uses VHDX Files C. Three Backups that use ZIP Files D. Three Backups that use VHDX Files Question 2: System Image Backups of Drive (C:)? A. One Backup that uses ZIP Files B. One Backup that uses VHDX Files C. Three Backups that use ZIP Files D. Three Backups that use VHDX Files

Question 1: A - One Backup that uses ZIP Files Question 2: D - Three backups that use VHDX Files. NEED TO VERIFY

You have a computer that runs Windows 10. From the settings app, you view the connection properties shown in the following: -Network Profile -:Public (SELECTED) -:Private (NOT SELECTED) -:Metered Connection (TURNED ON) Question 1: To enable Windows remote Management (WINRM) you must first? Question 2: To ensure that Microsoft OneDrive syncs, you must first? A. Set the network profile to Private B. Run "winrm qc" at the CMD prompt C. Turn off metered connection

Question 1: A - Set the network profile to private — Winrm will not work on a public network) Question 2: C - Turn off metered connection

A user has a computer that runs Windows 10. The user has access to the following storage locations: -A USB Flash Drive. -Microsoft OneDrive. -OneDrive for Business. -A drive mapped to a network share. -A secondary partition on the system drive. You need to configure backup using File History from the Settings app. Which two storage locations can you select by using File History? A. OneDrive for Business. B. OneDrive C. The USB Flash Drive. D. The secondary partition on the system Drive E. The drive mapped to a network share

The BEST options to protect your backup in the event of system failure are: C. The USB Flash Drive. E. The drive mapped to a network share.

You have a computer that runs Windows 10. The computer is in a workgroup. The computer is used to provide visitors with access to the internet. You need to configure the computer to meet the following requirements: -Always sign in automatically as User1. -Start an application named App1.exe at sign-in. What should you do?

To set always sign in as, change the Registry Setting. To set always start the app at sign-in, Change the Group Policy setting.

A user named User1 has a computer named Computer1 that runs Windows 10. Computer1 is joined to an AzureAD tenant named contoso.com. User1 joins Computer1 to contoso.com by using [email protected] contains a folder named Folder1. Folder1 is in drive C and is shared as Share1. Share1 has the permissions : Everyone = Full Control. AzureAD\[email protected] = Owner A user named User2 has a computer named Computer2 that runs Windows 10. User2 joins Computer2 to contoso.com by using [email protected]. User2 attempts to access Share1 and receives the following error message: "The username or password is incorrect.". You need to ensure that User2 can connect to Share1. Possible Solution: In AzureAD, you create a group named Group1 that contains User1 and User2. You grant Group1 Modify access to Share1. Does this meet the goal?

Yes - LOOK it up...

You have a computer named Computer1 that runs Windows 7. Computer1 has a local user named User1 who has a customized profile. On Computer1, you perform a clean installation of Windows 10 without formatting the drives. You need to migrate the settings of User1 from Windows 7 to Windows 10. Which two action should you perform? - Run scanstate.exe specifying C:\Windows.old - Run Loadstate.exe specifying C:\Users - PSexec.exe -/Load -msloadtest.msi

You need to run Scanstate.exe on C:\Windows.old to create the "Store" of user information for import. Then, run Loadstate.exe on C:\users to actually load the content. -Because Windows is already installed on the new machine, windows.old is created so you don't use C:\users to for scanstate.exe because the user file is located in the Windows.old folder now.


Ensembles d'études connexes

AWS Solutions Architect Associate

View Set

Orion Series 65 - Exam 3 Quick Quizzes

View Set

Ch 5: NJ laws, rules, regulations

View Set

RE Course Section 4: Agency in Michigan

View Set

MFT Clinical questions to review

View Set

Concepts 2 Perfusion Practice Assessment

View Set

PMK-EE Professional Conduct (E4)

View Set

Real Estate Brokerage: Practice Exam

View Set