Configuring Windows Devices 70-697 (Learn Mode - Written Answers)
a c
A company has Windows 10 Enterprise client computers. Users store data files in their user profile libraries. You need to ensure that you can restore data files to any date while minimizing system overhead. Which two actions should you perform? Each answer presents part of the solution. NOTE Each correct selection is worth one point. A. Turn on File History. B. Configure Windows 7 File Recovery. C. Configure settings to save copies of files daily. D. Enable Storage Spaces.
d
A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 10. A local printer is shared from a client computer. The client computer user is a member of the Sales AD security group. You need to ensure that members of the Sales security group can modify the order of documents in the print queue, but not delete the printer share. Which permission should you grant to the Sales group? A. Manage queue B. Manage this printer C. Print D. Manage documents E. Manage spooler
d
A company has client computers that run Windows 10. The client computer systems frequently use IPSec tunnels to securely transmit data. You need to configure the IPSec tunnels to use 256-bit encryption keys. Which encryption type should you use? A. 3DES B. DES C. RSA D. AES
h
This question is part of a series of questions that use the same or similar answer choices. An answer choice may be correct for more than one question in the series. Each question is independent of the other questions in this series. Information and details in a question apply only to that question. You have a mobile device that connects to a 4G network and a laptop. You work from a remote location that does not have Internet access. You plan to use the mobile device as a mobile hotspot for the laptop, so that you can access files from the corporate office. Which Control Panel application should you use on the laptop to connect to the mobile hotspot? A. Phone and Modem B. RemoteApp and Desktop Connections C. System D. Credential Manager E. Work Folders F. Power Options G. Sync Center H. Network and Sharing Center
d
You are the network administrator for Contoso, Ltd. Many users have Windows 10 Enterprise laptops, and your IT department configures all of them to use BitLocker on all fixed drives. Many users carry sensitive corporate data on their USB drives. You need to enable BitLocker for these USB drives. Which key protector option should you use? A. a smartcard B. a startup key C. TPM+PIN D. TPM+Password
c
You have a Microsoft Intune subscription. You create two compliance policies named Comp1 and Comp2. You create a configuration policy named ConfigPol1. The settings in each policy do not conflict with other policies. Comp1 has low security settings. Comp2 has medium security settings. ConfigPol1 has high security settings. You have a device named Device1. Device1 is a member of groups that have Comp1, Comp2 and ConfigPol1 applied. You need to identify which policies with be enforced on Device1. What should you identify? A. Comp1 only B. Comp2 only C. Comp1, Comp2 and ConfigPol1 D. Comp1 and Comp2 only E. Comp1 and ConfigPol1 only F. ConfigPol1 only G. Comp2 andConfigPol1 only
1, 2, 3
You have a Windows 8 computer. You need to migrate from Windows 8 to Windows 10 while retaining as much data as possible. You load the Windows 10 media into the DVD drive. Which three actions should you perform next in sequence?
h
You have five computers that run Windows 10. You are the only user who uses the computers. All of the computers are members of the same domain. You need to ensure that you can access any file on any of the computers over the Internet. What should you configure? A. account policies B. share permissions C. application control policies D. NTFS permissions E. HomeGroup settings F. software restriction policies G. Encrypting File System (EFS) settings H. Microsoft OneDrive
a
You manage a client Windows 10 Enterprise computer named Computer1. You have a OneDrive synchronized folder that contains .pdf files. You need to ensure that you can restore previous versions of the .pdf files. What should you do? A. Enable File History. B. Configure System Restore. C. Configure Computer1 as a trusted PC. D. Enable Sync your settings on Computer1.
a
IPv6 has a vastly larger address space than IPv4. This expansion provides flexibility in allocating addresses and routing traffic and eliminates the primary need for network address translation (NAT). Do you know how many more bits there are in an IPv4 address compared to an IPv6 address? A. 4 times more B. 6 times more C. Twice as many D. 8 times more
g
This question is part of a series of questions that use the same or similar answer choices. An answer choice may be correct for more than one question in the series. Each question is independent of the other questions in this series. Information and details provided in a question apply only to that question. A user successfully accesses \\server1\Sources\App1\. The user cannot access \\server1\Sources\App2\. You need to ensure that the user can access \\server1\Sources\App2\. What should you configure? A. Microsoft OneDrive B. share permissions C. account policies D. software restriction policies E. HomeGroup settings F. application control policies G. NTFS permissions H. Encrypting File System (EFS) settings
1 2 4 5
You administer 50 laptops that run Windows 7 Professional 32-bit. You want to install Windows 10 Enterprise 64-bit on every laptop. Users will keep their own laptops. You need to ensure that user application settings, Windows settings, and user files are maintained after Windows 10 Enterprise is installed. Which four actions should you perform in sequence?
4 5 3
You administer Windows 10 Enterprise computers. Users in the accounting department ask you to configure a recovery solution for Microsoft Word and Excel files. You need to ensure that users can restore Microsoft Word and Excel files to previous versions for up to 30 days. Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.
From the Charm Bar, open Change PC settings Select What the power button does Change the When I press the power button menu settings
You administer Windows 8 Pro computers in your company network. You discover that Sleep, Shut down and Restart are the only options available when you select the Power button as shown in the following exhibit (Click the Exhibit button.)
c
You administer a Windows 10 Enterprise computer that runs Hyper-V. The computer hosts a virtual machine with multiple snapshots. The virtual machine uses one virtual CPU and 512 MB of RAM. You discover that the virtual machine pauses automatically and displays the state as paused-critical. You need to identify the component that is causing the error. Which component should you identify? A. no virtual switch defined B. insufficient memory C. insufficient hard disk space D. insufficient number of virtual processors
2 5 4 3 6 1
You administer computers that run Windows 10 Enterprise. The computers on your network are produced by various manufacturers and often require custom drivers. You need to design a recovery solution that allows the repair of any of the computers by using a Windows Recovery Environment (WinRE). In which order should you perform the actions? To answer, move all actions from the list of actions to the answer area and arrange then in the correct order.
Yes Yes No
You are setting up a Windows 10 Enterprise computer. The computer's network connections are shown in the Network connections exhibit. (Click the Exhibit button.)
Require a Startup key at every startup insert a USB drive with the saved
You are the PC support specialist for Contoso, Ltd. Your department upgrades your company's laptops to Windows 10 Enterprise. You need to use BitLocker to encrypt the system drives on these laptops. You attempt to encrypt several laptops but receive an error message shown in the following image:
d
You create a VPN connection that has the VPN type set to Automatic. When attempting to establish a VPN connection, which VPN protocol will be used first? A. PPTP B. L2TP C. SSTP D. IKEv2
Windows Server Update Services only restart when the user signs out
You have a computer that runs Windows 10 Enterprise that has a local group policy as shown in the following graphic.
d
You have a computer that runs Windows 10. You need to block all outbound and inbound communications that occur over TCP 9997, TCP 9999, and TCP 4000. What is the minimum number of rules that you must create? A. 1 B. 2 C. 3 D. 6
h
You have a laptop that is joined to an Active Directory domain. You establish a WiFi connection to a customer's WiFi network. You need to identify whether the current network location of the WiFi connection is private or public. Which Control Panel application should you use? A. Phone and Modem B. RemoteApp and Desktop Connections C. System D. Credential Manager E. Work Folders F. Power Options G. Sync Center H. Network and Sharing Center
New-RDRemoteApp -CollectionName -FilePath
You have a server that runs Windows Server 2012 R2 server named Server1. Server1 has Remote Desktop Services (RDS) installed. You create a session collection named Session1 and publish a RemoteApp in Session1. Server1 has an application named App1. The executable for App1 is C:\Apps\App1.exe. You need to ensure that App1 is available as a RemoteApp in Session1. What command should you run? To answer, select the appropriate options in the answer area.
a
You have set up a new wireless network for one of your prestigious clients. The director wants to ensure that only certain designated wireless laptops can connect to the new network to prevent misuse. What do you need to do? A. Use MAC address control B. Use IPv4 address control C. Use WEP D. Use WPA
Enable file screens
You install Windows 10 Enterprise on a new laptop that will be shipped to a remote user. You logon to the laptop with the user credentials, map network drives, and configure the network drives to be always available offline. Company policy requires that files with a .db1 extension should be excluded from offline file synchronization. You need to prevent the user from creating files with a .db1 extension on the mapped drives. In the Local Group Policy Editor, which setting should you configure? To answer, select the appropriate setting in the answer area.
d
You make a folder available for offline use. Currently, the folder is synchronizing and will take approximately 15 minutes to complete. You need to ensure that the files continue to synchronize when you close the lid of the computer. Which Control Panel application should you use? A. System B. RemoteApp and Desktop Connections C. Work Folders D. Power Options E. Network and Sharing Center F. Credential Manager G. Phone and Modem H. Sync Center
a
You manage Microsoft Intune for a company named Contoso. Intune client computers run Windows 10 Enterprise. You notice that there are 25 mandatory updates listed in the Intune administration console. You need to prevent users from receiving prompts to restart Windows following the installation of mandatory updates. Which policy template should you use? A. Microsoft Intune Agent Settings B. Windows Configuration Policy C. Microsoft Intune Center Settings D. Windows Custom Policy (Windows 10 and Windows 10 Mobile)
Log on computer 1 by using your domain On computer1 run the Add Software - Microsoft Intune Software Publisher wizard from the Microsoft Intune administration console, manage the deployment settings of App1
You manage Microsoft Intune for a company named Contoso. You have an administrative computer named Computer1 that runs Windows 10 Enterprise. You need to add a Windows Store universal app named App1 to the Company Portal Apps list for all users. Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.
2, 3, 4
You manage update compliance for Windows 10 desktop computers that are part of a domain. You need to configure new desktops to automatically receive updates from an intranet resource that you manage. Which three actions should you perform in sequence?
Button Settings Sleep Settings
You plan to use a Group Policy to configure the power settings of several laptops. You need to ensure that the laptops meet the following requirements: Which two Power Management Group Policy settings should you modify? To answer, select the appropriate settings in the answer area.
yes
You provide support for a small company. The company purchases a Windows 10 laptop for an employee who travels often. The company wants to use BitLocker to secure the hard drive for the laptop in case it is lost or stolen. While attempting to enable BitLocker, you receive the error message shown in the following image:
be catched on the local disk enabled for previously launched applications
You run the Get-AppvClientConfiguration cmdlet and you receive the following output.
a
You support Windows 10 Enterprise computers that are members of an Active Directory domain. Your company policy defines the list of approved Windows Store apps that are allowed for download and installation. You have created a new AppLocker Packaged Apps policy to help enforce the company policy. You need to test the new AppLocker Packaged Apps policy before you implement it for the entire company. What should you do? A. From Group Policy, enforce the new AppLocker policy in Audit Only mode. B. From Group Policy, run the Group Policy Results Wizard. C. From Group Policy, run the Group Policy Modeling Wizard. D. From PowerShell, run the Get-AppLockerPolicy -Effective command to retrieve the AppLocker effective policy.
b
102.You have a Microsoft Intune subscription. You need to uninstall the Intune agent from a computer. What should you do? A. From the Groups node in the Microsoft Intune administration portal, click Delete. B. From the computer, run the provisioningutil.exe command. C. From the computer, run the cltui.exe command. D. From the computer, use Programs and Features in Control Panel.
add-appxprovisionedPackage -path -packagePath -SkipLicense
92.DRAG DROP You have a line-of-business universal app named App1. You have an image of Windows 10 Enterprise named Image1. Image1 is mounted to the C:\Folder1 folder on a Windows 10 Enterprise computer named Computer1. The source for App1 is in the C\:Folder2 folder. You need to ensure that App1 is included in Image1. What command should you run on Computer1? To answer, drag the appropriate values to the correct locations. Each value may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content
c
A company has 10 portable client computers that run Windows 10 Enterprise. The portable client computers have the network connections described in the following table. None of the computers can discover other computers or devices, regardless of which connection they use. You need to configure the connections so that the computers can discover other computers or devices only while connected to the CorpWired or CorpWifi connections. What should you do on the client computers? A. For the CorpWifi connection, select Yes, turn on sharing and connect to devices. B. Turn on network discovery for the Public profile. C. Change the CorpWired connection to public. Turn on network discovery for the Public profile. For the HotSpot connection, select No, don't turn on sharing or connect to devices. D. For the CorpWired connection, select Yes, turn on sharing and connect to devices. E. Turn on network discovery for the Private profile.
b
A company has 100 Windows 10 Enterprise client computers. The client computers are members of a workgroup. A custom application requires a Windows Firewall exception on each client computer. You need to configure the exception on the client computers without affecting existing firewall settings. Which Windows PowerShell cmdlet should you run on each client computer? A. Set-NetFirewallRule B. New-NetFirewallRule C. New-NetIPSecMairModeRule D. Set-NetFirewallProfile E. Set-NetFirewallSetting
a
A company has 100 client computers that run Windows 10 Enterprise. A new company policy requires that all client computers have static IPv6 addresses. You need to assign static IPv6 addresses to the client computers. Which Network Shell (netsh) command should you run? A. add address B. set interface C. set global D. set address
a
A company has Windows 10 Enterprise client computers. A client computer named COMPUTER1 has a shared folder named Folder1 located in the user's Downloads folder. Folder1 is shared only with employees in the Marketing department. All Marketing employees can connect to Folder1 from their client computers. A Marketing employee is unable to connect to Folder1 from a legacy device that is not compatible with the Windows 10 Enterprise default sharing settings. The device is able to connect to resources on other client computers. You need to configure COMPUTER1 to allow the device to connect to Folder1. Which setting should you enable? A. Enable file sharing for devices that use 40- or 56-bit encryption B. Turn off password protected sharing C. Use 128-bit encryption to help protect file sharing connections D. Turn off network discovery E. Turn on sharing so anyone with network access can read and write files in the Public folders.
d
A company has Windows 10 Enterprise client computers. Client computers are connected to a corporate private network. You deploy a Remote Desktop Gateway, DirectAccess, and a VPN server at the corporate main office. Users are currently unable to connect from their home computers to their work computers by using Remote Desktop You need to ensure that users can remotely connect to their office computers by using Remote Desktop. Users must not be able to access any other corporate network resource from their home computers. What should you do? A. Configure a Virtual Private Network connection. B. Configure the local resource settings of the Remote Desktop connection. C. Configure a DirectAccess connection. D. Configure the Remote Desktop Gateway IP address in the advanced Remote Desktop Connection settings on each client.
a d
A company has Windows 10 Enterprise client computers. Finance department employees store files in the C:\Finance directory. File History is on. A Finance department employee attempts to restore a file to a previous version by using File History. The file is not available to restore. You need to establish why the file history is not available and ensure that it is available in the future. Which two actions should you perform? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point. A. Review the File History backup log. B. Restore the data files from the Previous Versions tab located in the folder properties. C. Set the Protection Settings for drive C to On. D. Move the file into a library.
10.20.0.0/16 21 TCP 10.30.0.0/24 80 TCP 10.40.0.0/24 443 TCP
A company has a main office located in Miami, and branch offices in Boston, Los Angeles and Portland. The Office Networks are configured as described in the following table. A management computer in the main office, named COMPUTER1, runs windows 8 and several third-party management applications. You need to meet the following requirements: - Ensure that only users in the Boston office can connect to COMPUTER1 by using http. - Ensure that only users in the Los Angeles office can connect COMPUTER1 by using https - Ensure that only users in th Portland office can connect to COMPUTER1 by using FTP. You are configuring access to COMPUTER1. How should you configure windows firewall?
d
A company has an Active Directory Domain Services (AD DS) domain with one physical domain controller. All client computers run Windows 10 Enterprise. A client computer hosts a Windows 10 Enterprise virtual machine (VM) test environment. The VMs are connected to a private virtual switch that is configured as shown in the Virtual Switch Manager exhibit. The VMs are unable to connect to the domain controller. You have the following requirements: - Configure the test environment to allow VMs to communicate with the host machine. - Minimize impact on the host machine. You need to meet the requirements. What should you do first? A. Create a new virtual switch with an Internal Network connection type. B. Change the connection type of the private virtual switch to Internal only. C. Create a new virtual switch with a Private Network connection type. D. Create a new virtual switch with an External Network connection type.
a
A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 10 Enterprise and are joined to the domain. Corporate police prohibits homegroups on the corporate network. You need to ensure that client computer network adapter settings do not support joining a homegroup. What should you do? A. Disable IPv6. B. Disable IPv4. C. Enable IPv6. D. Enable IPv4.
c
A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 10 Enterprise and joined to the domain. You have the following requirements: You need to configure Group Policy settings to meet the requirements. What should you do first? A. Enable the Enable file synchronization on costed networks policy setting. B. Enable the Synchronize all offline files when logging on policy settings. C. Enable and configure the Configure slow-link mode policy setting. D. Enable and configure the Specify administratively assigned Offline Files policy setting.
b c
A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 10 Enterprise. You are configuring security for a portable client computer that does not have a Trusted Platform Module (TPM) chip installed. You need to configure local Group Policy to tum on Windows BitLocker Drive Encryption on the computer. Which two actions should you perform? Each correct answer presents part of the solution. NOTE Each correct selection is worth one point. A. Enable the Enforce drive encryption type on operating system drives policy setting. B. Enable the option to allow BitLocker without a compatible TPM. C. Enable the Require additional authentication at startup policy setting. D. Configure the TPM validation profile to enable Platform Configuration Register indices (PCRs) 0, 2, 4, and 11.
a, c
A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 10 Enterprise. Some computers have a Trusted Platform Module (TPM) chip. You need to configure a single Group Policy object (GPO) that will allow Windows BitLocker Drive Encryption on all client computers. Which two actions should you perform? Each correct answer presents part of the solution. (Two Answers) A. Enable the Require additional authentication at startup policy setting. B. Enable the Enforce drive encryption type on operating system drives policy setting. C. Enable the option to allow BitLocker without a compatible TPM. D. Configure the TPM validation profile to enable Platform Configuration Register indices (PCRs) 0, 2, 4, and 11.
4 2 1
A local printer named PRINTER1 is shared from a client computer named COMPUTER1 that run a 32-bit version of Windows 10. A workgroup contains client computers that run a 64-bit version of Windows 10. Computers in the workgroup can't currently print to PRINTER1. You need to ensure that the workgroup computers can print to PRINTER1. Which three actions should you perform in sequence? To answer, move the appropriate actions to the answer area and arrange them in the correct order.
d
All client computers in a company's network environment run Windows 10 Enterprise. A client computer has drives that are configured as shown in the following table. You are choosing a backup destination for drive C. You have the following requirements: You need to select a backup destination that meets the requirements. Which destination should you select? A. drive D: B. drive F: C. drive E: D. drive Z:
BitLocker NTFS Permissions
As part of its upgrade to Windows 10 Enterprise, your company is implementing additional security controls relating to data access. You need to implement a solution that meets the following requirements: Which feature should you use to meet each requirement? To answer, drag the appropriate feature or features to the correct requirement or requirements. Each feature may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
a
At home, you use a Windows 10 desktop computer. At work, you use a Windows 10 laptop that is connected to a corporate network. You use the same Microsoft account to log on to both computers. You have a folder with some personal documents on your desktop computer. The folder must be available and synced between both computers. You need to ensure that the latest version of these files is available. What should you do? A. Create a folder by using OneDrive for Windows. Move all of the personal documents to the new folder. B. Move the folder to the Libraries folder. Go to PC Settings. Under Sync your settings, enable App settings. C. Right-click the folder and click Properties. Under Security, provide Full Control for the Microsoft account. D. Right-click the folder and select Share With, and then select Homegroup (view and edit).
c
Deploying the application as a published application on the Remote Desktop server will use no disk space on the tablets. Users will be able to access the application by using Remote Desktop Connections. This will also ensure that the application is isolated from other applications on the tablets. We can use Remote Desktop Connection 'redirection' to ensure that the application is able to access files stored on an internal solid-state drive (SSD) on the tablets. Redirection enables access to local resources such as drives, printers etc. in a Remote Desktop Connection. You have a computer named Computer1 that runs Windows 10 Enterprise. Computer1 is a member of an Active Directory domain named contoso.com. You have a line-of-business universal app named App1. App1 is developed internally. You need to ensure that you can run App1 on Computer1. The solution must meet the following requirements: Minimize costs to deploy the app. Minimize the attack surface on Computer1. What should you do? A. Have App1 certified by the Windows Store. B. Sign App1 with a certificate issued by a third-party certificate authority. C. From the Update & Security setting on Computer1, enable the Sideload apps setting. D. Run the Add-AppxProvisionedPackage cmdlet.
b, d
Employees are permitted to bring personally owned portable Windows 10 Enterprise computers to the office. They are permitted to install corporate applications by using the management infrastructure agent and access corporate email by using the Mail app. An employee's personally owned portable computer is stolen. You need to protect the corporate applications and email messages on the computer. Which two actions should you perform? Each correct answer presents part of the solution. (Two Answers) A. Prevent the computer from connecting to the corporate wireless network. B. Change the user's password. C. Disconnect the computer from the management infrastructure. D. Initiate a remote wipe.
d
Group Policy is a set of rules which control the working environment of user accounts and computer accounts. Group Policy provides the centralized management and configuration of operating systems, applications and users' settings in an Active Directory environment. In other words, Group Policy in part controls what users can and can't do on a computer system. Which one of these policies requires a reboot? A. Turn off Windows Defender B. Turn off Autoplay for non-volume devices C. Disable Active Desktop D. Turn off Data Execution Prevention for Explorer
c d
IPSec tunnels can be encrypted by 256-bit AES. L2TP/IPsec allows multiprotocol traffic to be encrypted and then sent over any medium that supports point-to-point datagram delivery, such as IP or Asynchronous Transfer Mode (ATM). The L2TP message is encrypted with one of the following protocols by using encryption keys generated from the IKE negotiation process: Advanced Encryption Standard (AES) 256, AES 192, AES 128, and 3DES encryption algorithms. You administer a group of 10 client computers that run Windows 10. The client computers are members of a local workgroup. Employees log on to the client computers by using their Microsoft accounts. The company plans to use Windows BitLocker Drive Encryption. You need to back up the BitLocker recovery key. Which two options can you use? (Each correct answer presents a complete solution. Choose two.) A. Save the recovery key to a file on the BitLocker-encrypted drive. B. Save the recovery key in the Credential Store. C. Save the recovery key to OneDrive. D. Print the recovery key.
Run the scanstate command on the Windows 7 computers. Install the custom application on the Windows 10 Enterprise computers Run the loadstate command on the Windows 10 Enterprise computers
Ten client computers run Windows 7 and a custom application. The custom application is compatible with Windows 10 Enterprise. You purchase 10 new computers that have Windows 10 Enterprise pre-installed. You plan to migrate user settings and data from the Windows 7 computers to the Windows 10 Enterprise computers. You add the User State Migration Toolkit (USMT) on a USB flash drive. You need to ensure that the custom application settings are applied to the Windows 10 Enterprise computers after the migration is complete. Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.
a
The computers in your company's finance department run Windows XP Professional. These computers have multiple line of business (LOB) applications installed. You add a new Windows 10 Enterprise computer in the finance department. You discover that an application used by the finance department does not work on this computer. You need to run the application on the new computer. What should you do first? A. Install Client Hyper-V. B. Run Refresh your PC. C. Install Windows XP Mode. D. Create a Windows To Go workspace.
f
This question is part of a series of questions that use the same or similar answer choices. An answer choice may be correct for more than one question in the series. Each question is independent of the other questions in this series. Information and details in a question apply only to that question. On the corporate network, you have an Active Directory user account. The domain contains a sync share named Share1. You have a personal computer that runs Windows 10. The computer is a member of a workgroup. You need to access the files in Share1. Which Control Panel application should you use? A. Phone and Modem B. Network and Sharing Center C. RemoteApp and Desktop Connections D. Power Options E. System F. Sync Center G. Credential Manager H. Work Folders
f
This question is part of a series of questions that use the same or similar answer choices. An answer choice may be correct for more than one question in the series. Each question is independent of the other questions in this series. Information and details in a question apply only to that question. You need to change the password used for an L2TP VPN connection. Which Control Panel application should you use? A. Work Folders B. Phone and Modem C. Credential Manager D. Sync Center E. System F. Network and Sharing Center G. RemoteApp and Desktop Connections H. Power Options
h
This question is part of a series of questions that use the same or similar answer choices. An answer choice may be correct for more than one question in the series. Each question is independent of the other questions in this series. Information and details provided in a question apply only to that question. You have a computer that runs Windows 10 and is used by 10 users. The computer is joined to an Active Directory domain. All of the users are members of the Administrators group. Each user has an Active Directory account. You have a Microsoft Word document that contains confidential information. You need to ensure that you are the only user who can open the document. What should you configure? A. account policies B. application control policies C. HomeGroup settings D. software restriction policies E. NTFS permissions F. Microsoft OneDrive G. share permissions H. Encrypting File System (EFS) settings
d
Which term is used to refer to installing apps directly to a device without going through the Windows Store? A. SQL Injection B. BranchCache C. DLL Hijack D. Sideloading
d
You administer Windows 10 Enterprise client computers in your company network. A guest at your company is connected to the Internet as shown in the following exhibit. (Click the exhibit button.) You need to ensure that the guest user is able to share network resources over Wi-Fi without lowering the overall security of the computer. What should you do? A. Configure File and printer sharing settings for Public networks. B. Change the network location type to Private. C. Change the network location type to Work. D. Configure File sharing connections settings for All networks.
d
You administer Windows 10 Enterprise client computers in your company network. A user reports that her Internet connection is slower than usual. You need to identify the Process Identifiers (PIDs) of applications that are making connections to the Internet. Which command should you run? A. netstat -an B. netsh show netdlls C. netsh set audit-logging D. netstat -o E. ipconfig /showclassid
b
You administer Windows 10 Enterprise client computers in your company network. You change settings on a reference computer by using the Windows Firewall with Advanced Security tool. You want to apply the same settings to other computers. You need to save the Windows Firewall with Advanced Security configuration settings from the reference computer. You also need to be able to import the configuration settings into a Group Policy object later. What should you do? A. Open Local Group Policy Editor, select the Windows Firewall with Advanced Security node, and then select the Export Policy action. B. Run the netsh advfirewall export c:\settings.wfw command. C. Run the netsh firewall export c:\settings.xml command. D. Run the netsh advfirewall export c:\settings.xml command
a e
You administer Windows 10 Enterprise client computers in your company network. You need to configure a backup and recovery solution that meets the following requirements: Which two actions should you perform? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point. A. Create a system repair disk. B. Create a storage space. C. Turn on File History. D. Configure system protection. E. Create a system image backup.
d f
You administer Windows 10 Enterprise client computers in your company network. A computer that is used by non-administrator users has a directory named C:\Folder1. A shared collection of Microsoft Excel files is stored in the C:\Folder1 directory, with non-administrator users being granted modify permissions to the directory. You discover that some files have been incorrectly modified by a user. You need to determine which users are making changes to the files in the directory. Which two actions should you perform? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point. (Two Answers) A. Set local policy: Computer Configuration\Windows Settings\Security Settings\Local Policies\Audit Policy\Audit object access to Failure. B. From the Auditing Entry for Folder1, set the Principal to Everyone, and then set the Type to Failure for the Modify permission. C. From the Auditing Entry for Folder1, set the Principal to Guests, and then set the Type to Success for the Modify permission. D. Set local policy: Computer Configuration\Windows Settings\Security Settings\Local Policies\Audit Policy\Audit object access to Success. E. From the Auditing Entry for Folder1, set the Principal to Guests, and then set the Type to Failure for the Modify permission. F. From the Auditing Entry for Folder, set the Principal to Everyone, and then set the Type to Success for the Modify permission.
File and Printer Sharing (Echo Request - ICMPv4-In)
You administer Windows 10 Enterprise client computers in your company network. The computers belong to an Active Directory Domain Services (AD DS) domain and have Windows Firewall enabled. All of the computers are connected to the Internet. You ping one of the desktops, which has an IP Address of 10.4.4.4, but you receive the message "Request timed out". You need to configure the desktop to reply to ping request from other devices on the company network. From the Windows Firewall with Advanced Security window, which inbound rule should you modify? To answer, select the appropriate inbound rule in the answer area,
c
You administer Windows 10 Enterprise client computers that are members of an Active Directory domain that includes Active Directory Certificate Services (AD CS). You restored a computer from a backup that was taken 45 days ago. Users are no longer able to log on to that computer by using their domain accounts. An error message states that the trust relationship between the computer and the primary domain has failed. What should you do? A. Renew the certificates issued to the client computer. B. Reset the passwords of all affected domain users. C. Logon as a local administrator and issue the netdom resetpwd command. Log off and restart the computer. D. Restore the client computer from a known good backup that was taken two weeks earlier than the backup you previously restored.
Print Management Client1 (Local)
You administer Windows 10 Enterprise computers in your company network, including a computer named Wst1. Wst1 is configured with multiple shared printer queues.
Require additional authentication at startup
You administer Windows 10 Enterprise computers in your company network. All computers include Windows 10 Enterprise compatible Trusted Platform Module (TPM). You configure a computer that will run a credit card processing application. You need to ensure that the computer requires a user to enter a PIN code when starting the computer.
a
You administer Windows 10 Enterprise computers. Users are able to download applications from the Internet and install them on their computers. You need to ensure that users can install only digitally signed applications from approved publishers. What should you do? A. Create AppLocker Publisher rules. B. Turn on Windows SmartScreen. C. Enable the Check for signatures on downloaded programs option. D. Add publishers' websites to the Trusted Sites zone.
Create a network share, configure NTFS, and then share permissions Configure the Keep Saved Versions setting. Turn on File History
You administer Windows 10 Enterprise computers. Your company has a team of technical writers that is preparing technical manuals and help files. The team manager wants to ensure that the technical writers are able to restore any documents that been modified within the last year. You need to ensure that the technical writers can restore Microsoft Word files to any previous versions for up to one year. Which three actions should you perform in sequence?
b
You administer Windows 10 Enterprise desktop computers that are members of an Active Directory domain. You want to create an archived copy of user profiles that are stored on the desktops. You create a standard domain user account to run a backup task. You need to grant the backup task user account access to the user profiles. What should you do? A. Add the backup task account to the Remote Management Users group on a domain controller. B. Add the backup task account to the Backup Operators group on every computer. C. Add the backup task account to the Backup Operators group on a domain controller. D. Set the backup task account as NTFS owner on all the profiles.
a
You administer Windows 10 Enterprise laptop and desktop computers. Your company uses Active Directory Domain Services (AD DS) and Active Directory Certificate Services (AD CS). Your company decides that access to the company network for all users must be controlled by two-factor authentication. You need to configure the computers to meet this requirement. What should you do? A. Install smart card readers on all computers. Issue smart cards to all users. B. Enable the Password must meet complexity requirements policy setting. Instruct users to logon by typing their user principal name (UPN) and their strong password. C. Create an Internet Protocol security (IPsec) policy on each Windows 10 Enterprise computer to encrypt traffic to and from the domain controller D. Issue photo identification to all users. Instruct all users to create and use a picture password.
Create a network share. Configure offline files for the tablets Configure folder redirection for the employees' domain accounts to the network share.
You administer Windows 10 Enterprise tablets and virtual desktop computers that are joined to an Active Directory domain. Your company provides virtual desktop computers to all users. Employees in the sales department also use tablets, sometimes connected to the company network and sometimes disconnected from the company network. You want sales department employees to have the same personal data, whether they are using their virtual desktop or their tablets. You need to configure the network environment to meet the requirements. Which three actions should you perform in sequence? To answer, move the appropriate actions from the lust of actions to the answer area and arrange them in the correct order. More than one order to answer choices may be correct. You will receive credit for any of the correct orders you select.
b
You administer Windows 10 Enterprise tablets that are members of an Active Directory domain. You want to create an archived copy of My Documents folders that are stored on the tablets. You create a standard domain user account to run a backup task. You need to grant the backup task user account access to the folders. What should you do? A. Add the backup task account to the Remote Management Users group on a domain controller. B. Add the backup task account to the Backup Operators group on every tablet. C. Add the backup task account to the Backup Operators group on a domain controller. D. Set the backup task account as NTFS owner on all the folders.
b
You administer Windows 10 Enterprise tablets that are members of an Active Directory domain. Your company policy allows users to download and install only certain few Windows Store apps. You have created a new AppLocker Packaged Apps policy to help enforce the company policy. You need to test the new AppLocker Packaged Apps policy before you implement it for the entire company. What should you do? A. Open PowerShell and run the Get-AppLockerPolicy -Effective cmdlet to retrieve the AppLocker effective policy. B. Open Group Policy Management console and enforce the new AppLocker policy in Audit Only mode. C. Open Group Policy Management console and run the Group Policy Modeling Wizard. D. Open Group Policy Management console and run the Group Policy Results Wizard.
c f
You administer Windows 10 Enterprise. Your network includes an Active Directory domain and a standalone server in a perimeter network that runs Windows Server 2008 R2. Your company purchases five new tablets that run Windows 8. The tablets will be used to access domain resources and shared folders located on the standalone server. You need to implement single sign-on (SSO) authentication for tablet users. You also need to ensure that you can audit personnel access to the shared folder. Which two actions should you perform? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point. (Two Answers) A. Create a new Microsoft account for each user. B. Ensure that the local account for each user on the stand-alone server uses the same password as the corresponding Microsoft account. C. Join the tablets to a domain. D. Join the tablets to the same workgroup as the stand-alone server. E. Enable a guest account on the stand-alone server. F. On the stand-alone server, create user accounts that have the same logon names and passwords as the user domain accounts.
4 1 2
You administer Windows 7 and Windows 10 Enterprise computers. You run an application that saves files that contain local settings unique to each user. You want to allow users to synchronize settings for an application to any enterprise computer when they log on to the enterprise computer. You need to implement a solution that will move a user's settings files to any computer. You also need to ensure that you can roll back the changes if necessary. Which required task or tasks should you perform with each approach? To answer, drag the appropriate required task to the corresponding approach. Each required task may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content. NOTE: Each correct selection is worth one point.
Modify the custom.ini file Run the Scanstate tool on the Windows 7 and Windows 8 Run the Loadstate tool on the Windows 10 Enterprise computers.
You administer Windows 7 and Windows 8 client computers in your company network. You add 100 new client computers that have Windows 10 Enterprise installed. You need to migrate user profiles, local groups membership, and network mapped drives to the new client computers. You download and copy User State Migration Tool (USMT) files to a network share. Which three actions should you perform next, in sequence? To answer, move the appropriate three actions from the list of actions to the answer area and arrange them in the correct order.
b
You administer a Windows 10 Enterprise computer. The computer is configured to encrypt several folders by using a self-signed Encrypted File System (EFS) certificate. You need to make a backup copy of the encryption keys. What should you do? A. Open the Certificates console and connect to the user account certificates. Export the self-signed EFS certificate from the Trusted People folder to a Canonical Encoding Rules (CER) file. B. Open the Certificates console and connect to the user account certificates. Find the personal self-signed EFS certificate and export it to a Personal Information Exchange (PFX) file. C. Open the Certificates console and connect to the user account certificates. Export the personal self-signed EFS certificate from the Trusted Root Certification Authority folder to a Personal Information Exchange (PFX) file. D. Open the Certificates console and connect to the computer account certificates. Export the self-signed EFS certificate from the Trusted People folder to a Canonical Encoding Rules(CER) file.
c
You administer a Windows 10 Enterprise computer. The computer has File History turned on, and system protection turned on for drive C. You accidentally delete a folder named Libraries\Customers by using the Shift+Delete keyboard shortcut. You need to restore the most recent version of the folder to its original location. Which approach should you use to restore the folder? A. Recycle Bin B. the latest restore point C. File History D. a manually selected restore point
a b
You administer computers that run Windows 10 Enterprise and are members of an Active Directory domain. The computers are encrypted with BitLocker and are configured to store BitLocker encryption passwords in Active Directory. A user reports that he has forgotten the BitLocker encryption password for volume E on his computer. You need to provide the user a BitLocker recovery key to unlock the protected volume. Which two actions should you perform? Each correct answer presents part of the solution. (Two Answers) A. Ask the user for his computer name. B. Ask the user to run the manage-bde -unlock E: -pw command. C. Ask the user for his logon name. D. Ask the user for a recovery key ID for the protected volume.
c d
You administer computers that run Windows 8 Enterprise and are members of an Active Directory domain. Some volumes on the computers are encrypted with BitLocker. The BitLocker recovery passwords are stored in Active Directory. A user forgets the BitLocker password to local drive E: and is unable to access the protected volume. You need to provide a BitLocker recovery key to unlock the protected volume. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) A. Ask the user to run the manage-bde-protectors-disable e: command. B. Ask the user for his or her logon name. C. Ask the user to run the manage-bde-unlock E:-pw command. D. Ask the user for his or her computer name. E. Ask the user for a recovery key ID for the protected drive.
b
You administer computers that run Windows 8 Enterprise in an Active Directory domain in a single Active Directory Site. All user account objects in Active Directory have the Manager attribute populated. The company has purchased a subscription to Windows Intune. The domain security groups are synchronized with the Microsoft Online directory. You create a Windows Intune group that specifies a manager as a membership criterion. You notice that the group has no members. You need to ensure that users that meet the membership criteria are added to the Windows Intune group. What should you do? A. Force Active Directory replication within the domain. B. Ensure that all user accounts are identified as synchronized users. C. Ensure that the user who is performing the search has been synchronized with the Microsoft Online directory. D. Synchronize the Active Directory Domain Service (AD DS) with the Microsoft Online directory.
c
You administer computers that run Windows XP Professional. These computers have a wide range of line of business (LOB) applications installed. You want to migrate from Windows XP Professional to Windows 10 Enterprise. You need to identify which application will prompt users for elevated privileges. What should you do first? A. Configure the advanced audit setting on the Windows 10 Enterprise computers before you install the LOB applications. B. Install the Microsoft Assessment and Planning (MAP) Toolkit. C. Install the Microsoft Application Compatibility Toolkit (ACT). D. Install User Experience Virtualization (UE-V) on the Windows 10 Enterprise computers before you install the LOB applications.
1 3 4
You administer desktop computers that run Windows 8 Enterprise and are members of an Active Directory domain. A new security policy states that all traffic between computers in the research department must be encrypted and authenticated by using Kerberos V5. You need to configure the requested traffic authentication settings by using Windows Firewall with Advanced Settings. Which three actions should you perform in sequence?
2 1 3
You are a desktop administrator for a small company and have just upgraded two laptops from Windows 8 to Windows 10 Enterprise. When the computers were running Windows 8, Backup and Restore was active and was scheduled to back up data files two times a day to an external hard disk. You need to enable File History so that copies of files are saved to a network drive. Which three actions should you perform in sequence? To answer, move the appropriate three actions from the list of actions to the answer area and arrange them in the correct order.
Copy the windows image file from the Windows product DVD to a local drive Mount the install.wim file by running the dism /mount image command Mount the winre.wim file running the dism /mount -image command
You are a desktop support technician for your company. You support more than 100 Windows 8 and Windows 10 Enterprise desktop computers. You are preparing an installation image of a Windows 10 Enterprise computer by using the Deployment and Imaging Tools Environment command prompt on your own computer. The image includes a customized instance of the Windows Recovery Environment (Windows RE). You need to extract and mount the Windows RE image. Which three actions should you perform in sequence? To answer, move the appropriate three actions from the list of actions to the answer area and arrange them in the correct order.
b
You are a system administrator for a department that has Windows 10 Enterprise computers in a domain configuration. You deploy an application to all computers in the domain. You need to use group policy to restrict certain groups from running the application. What should you do? A. Set up DirectAccess. B. Configure AppLocker. C. Disable BitLocker. D. Run the User State Management Tool.
b
You are a systems administrator for your company. The company has employees who work remotely by using a virtual private network (VPN) connection from their computers, which run Windows 8 Pro. These employees use an application to access the company intranet database servers. The company recently decided to distribute the latest version of the application through using a public cloud. Some users report that every time they try to download the application by using Internet Explorer, they receive a warning message that indicates the application could harm their computer. You need to recommend a solution that prevents this warning message from appearing, without compromising the security protection of the computers. What should you do? A. Publish the application through a public file transfer protocol (FTP) site. B. Publish the application through an intranet web site. C. Instruct employees to disable the SmartScreen Filter from within the Internet Explorer settings. D. Publish the application to Windows Store.
a
You are a systems administrator of a small branch office. Computers in the office are joined to a Windows 10 HomeGroup. The HomeGroup includes one shared printer and several shared folders. You join a new computer to the HomeGroup and try to access the HomeGroup shared folders. You discover that the shared folders are unavailable, and you receive an error message that indicates the password is incorrect. You need to reconfigure the new computer in order to access the HomeGroup resources. What should you do? A. Adjust the time settings on the new computer to match the time settings of the HomeGroup computers. B. Change the Enterprise password and re-enter it on the computers of all members of the HomeGroup. C. Change the default sharing configuration for the shared folders on the HomeGroup computers. D. Reset your account password to match the HomeGroup password.
a
You are an IT consultant for small and mid-sized business. One of your clients wants to start using Virtual Smart Cards on its Windows 10 Enterprise laptops and tablets. Before implementing any changes, the client wants to ensure that the laptops and tablets support Virtual Smart Cards. You need to verify that the client laptops and tablets support Virtual Smart Cards. What should you do? A. Ensure that each laptop and tablet has a Trusted Platform Module (TPM) chip of version 1.2 or greater. B. Ensure that BitLocker Drive Encryption is enabled on a system drive of the laptops and tablets. C. Ensure that each laptop and tablet can read a physical smart card. D. Ensure that the laptops and tablets are running Windows 10 Enterprise edition.
c
You are an IT professional for a bank. All of the user's files on the external drives are encrypted by using EFS. You replace a user's computer with a new Windows 10 Enterprise computer. The user needs to connect her external hard drive to the new computer. You have the original computer's certificate and key. You need to import the certificate and key onto the new computer. Into which certificate store should you import the certificate and key? A. Untrusted Certificates B. Trusted Root Certification Authorities C. Personal D. Trusted Publishers
c e
You are configuring two Windows 10 Enterprise client computers: A desktop computer named COMPUTER1 and a portable computer named COMPUTER2. You have the following requirements: You need to configure the computers to meet the requirements. Which two actions should you perform? Each correct answer presents part of the solution. (Two Answers) A. From COMPUER2, connect to COMPUTER1 and configure the Data folder to always be available offline. B. From COMPUTER1, connect to COMPUTER2 and configure the Data folder to always be available offline. C. In Sync Center, configure a schedule for offline files. D. From COMPUTER2, map a network drive to the Data folder onCOMPUTER1. E. In Sync Center, set up a new sync partnership.
a
You are the desktop administrator for a small company. The company modifies its policy for retaining company financial documents from six months to three years. You currently use File History, retaining files for six months and saving copies of files every 20 minutes. You need to adjust your current backup solution to accommodate the policy change. What should you do? A. Set the Keep Saved Versions option in File History to Forever. B. Set the backup solution to Recovery model. C. Set the Save Copies of Files frequency to Daily. D. Set the File History log file setting to Archive the log when full, do not overwrite events.
a, b
You are the desktop administrator for a small company. Your work group environment consists of Windows 10 Enterprise computers. You want to prevent 10 help desk computers from sleeping. However, you want the screens to shut off after a certain period of time if the computers are not being used. You need to configure and apply a standard power configuration scheme for the 10 help desk computers on your network. Which two actions should you perform? Each correct answer presents part of the solution (Two Answers). A. Import the power scheme by using POWERCFG /IMPORT on each of the remaining help desk computers. Set the power scheme to Active by using POWERCFG /S. B. Use POWERCFG /X on one help desk computer to modify the power scheme to meet the requirements. Export the power scheme by using POWERCFG /EXPORT. C. Use POWERCFG /S on one help desk computer to modify the power scheme to meet the requirements. Export the power scheme by using POWERCFG /EXPORT. D. Import the power scheme by using POWERCFG /IMPORT on each of the remaining help desk computers. Set the power scheme to Active by using POWERCFG /X.
3 2 4 1
You are the system administrator for your company. You deploy new Windows 10 Enterprise computers to replace the company's Windows Vista and Windows 7 computers. Users report that the new Windows 10 Enterprise computers display error messages when the users run the company's custom financial applications. In addition, many features do not function properly. You need to set up Remote Desktop Services on a Windows Server 2012 R2 server to provide Windows 7 VM-hosted Remote App programs. All prerequisite roles and features are installed on the server. In which order should you perform the actions? To answer, move all actions from the list of actions to the answer area and arrange them in the correct order.
a
You are using sysprep to prepare a system for imaging. You want to enable end users to customize their Windows operating system, create user accounts, name the computer, and other tasks. Which sysprep setting should you use? A. /oobe B. /audit C. /generalize D. /unattend
a
You are using sysprep to prepare a system for imaging. You want to reset the security ID (SID) and clear the event logs. Which option should you use? A. /generalize B. /oobe C. /audit D. /unattend
a
You deliver new Windows 10 Enterprise laptops to the software developers. The software developers frequently use laptops to work remotely and are often disconnected from the corporate network. One of the software developers works on an application that must run on Windows XP, Windows Vista, Windows 7, and Windows 10 Enterprise. The software developer needs the ability to test the application natively on each of these operating systems. You need to provide the software developer with a way to test the application on all operating system versions on the new laptop. The software developer must be able to perform the testing while working remotely without access to corporate resources. What should you do? A. Use Hyper-V to create three virtual machines that provide Windows XP, Windows Vista, and Windows 7 environments. B. Install the Windows PE version of Windows XP, Windows Vista, and Windows 7 on three USB drives and boot from each drive to test each operating system version. C. Change the compatibility mode settings of the application to Windows XP, Windows Vista, and Windows 7 before testing each operating system version. D. Create three virtual machines for Windows XP, Windows Vista, and Windows 7 on a company Windows Server 2012 that is running Hyper-V.
b
You deploy several tablet PCs that run Windows 10 Enterprise. You need to minimize power usage when the user presses the sleep button. What should you do? A. In Power Options, configure the sleep button setting to Sleep. B. In Power Options, configure the sleep button setting to Hibernate. C. Configure the active power plan to set the system cooling policy to passive. D. Disable the C-State control in the computer's BIOS.
a
You have 100 Windows computers that are managed by using Microsoft Intune. You need to ensure that when a new critical update is released, the update is approved automatically and deployed to the computers within 24 hours of approval. What should you do from the Microsoft Intune administration portal? A. From the updates node, select Critical Updates, and then modify the Approval settings. B. From the Admin node, click Enrollment Rules, and then modify the device enrollment rules. C. From the Policy node, click Configuration Policies, and then create a new Windows policy. D. From the Policy node, click Compliance Policies, and then create a new compliance policy.
c
You have 100 client Windows 10 computers. Users are NOT configured as local administrators. You need to prevent the users from running applications that they downloaded from the Internet, unless the applications are signed by a trusted publisher. What should you configure in the Security settings from the Action Center? A. Virus protection B. User Account Control C. Windows SmartScreen settings D. Network Access Protection
c
You have a Microsoft Intune subscription. You have three security groups named Security1, Security2 and Security3. Security1 is the parent group of Security2. Security2 has 100 users. You need to change the parent group of Security2 to be Security3. What should you do first? A. Edit the properties of Security1. B. Edit the properties of Security2. C. Delete security2. D. Remove all users from Security2.
Machine Device Inventory Noncompliant Apps Device History
You have a Microsoft Intune subscription. You need to identify devices based on the following requirements: Which type of report should you use for each requirement? To answer, drag the appropriate reports to the correct requirements. Each report may be used once, more than once, are not at all. You may need to drag the split bar between panes or scroll to view content.
b
You have a Remote Desktop Session Host (RD Session Host) server. The server is accessible from the internal network. To access the server remotely, you must connect to a Remote Desktop Gateway (RD Gateway) server. On a laptop, you successfully configure a Remote Desktop connection that you use to access the RD Session Host server from the internal network. From your home, you attempt to connect to the RD Session Host server by using the Remote Desktop connection, but the connection fails. You need to connect to the RD Session Host server. What should you configure on the laptop? A. the Remote Assistance settings in System Properties. B. the Connect from anywhere settings in Remote Desktop Connection. C. the Performance settings in Remote Desktop Connection. D. the Remote Desktop settings in System Properties.
d
You have a Windows 10 Enterprise computer named Computer1 that has the Hyper-V feature installed. Computer1 hosts a virtual machine named VM1. VM1 runs Windows 10 Enterprise. VM1 connects to a private virtual network switch. From Computer1, you need to remotely execute Windows PowerShell cmdlets on VM1. What should you do? A. Run the winrm.exe command and specify the -s parameter. B. Run the Powershell.exe command and specify the -Command parameter. C. Run the Receive-PSSession cmdlet and specify the -Name parameter. D. Run the Invoke-Command cmdlet and specify the -VMName parameter.
a c
You have a Windows 10 Enterprise computer named Computer1. Computer1 has File History enabled. You create a folder named Folder1 in the root of the C: drive. You need to ensure that Folder1 is protected by File History. What are two possible ways to achieve the goal? Each correct answer presents a complete solution. A. From File Explorer, include Folder1 in an existing library. B. Modify the Advanced settings from the FileHistory Control Panel item. C. From the Settings app, modify the Backup options. D. From File Explorer, modify the system attribute of Folder1.
a c
You have a Windows 10 Enterprise computer that has File History enabled You create a folder named Data in the root of the C: drive. You need to ensure that Data is protected by File History. What are two possible ways to achieve the goal? Each correct answer presents a complete solution. A. From File Explorer, include Data in an existing library. B. Modify the Advanced settings from the File History Control Panel item. C. From File Explorer, create a new library that contains Data D. From File Explorer, modify the system attribute of Data.
d
You have a Windows 10 Enterprise computer. The computer has a shared folder named C:\Marketing. The shared folder is on an NTFS volume. The current NTFS and share permissions are configured as follows. UserA is a member of both the Everyone group and the Marketing group. UserA must access C:\Marketing from across the network. You need to identify the effective permissions of UserA to the C:\Marketing folder. What permission should you identify? A. Full Control B. Read and Execute C. Read D. Modify
Back up the existing data on your original external hard drive. From Storage Spaces, create a new storage pool. Set the Resiliency Type to two-way mirror. Restore your data from the backup
You have a Windows 10 Enterprise computer. You have a 1-terabyte external hard drive. You purchase a second 1-terabyte external hard drive. You need to create a fault-tolerant volume that includes both external hard drives. You also need to ensure that additional external hard drives can be added to the volume. Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.
b
You have a Windows 8.1 Enterprise client computer named Computer1. The Storage Spaces settings of Computer1 are configured as shown in the following exhibit. (Click the Exhibit button.) You plan to create a three-way mirror storage space in the storage pool and to set the size of the storage space to 50 GB. You need to identify the minimum number of disks that must be added to the storage pool for the planned mirror. How many disks should you identify? A. 1 B. 3 C. 4 D. 5
b
You have a client Windows 10 Enterprise computer. The computer is joined to an Active Directory domain. The computer does not have a Trusted Platform Module (TPM) chip installed. You need to configure BitLocker Drive Encryption (BitLocker) on the operating system drive. Which Group Policy object (GPO) setting should you configure? A. Allow access to BitLocker-protected fixed data drives from earlier version of Windows. B. Require additional authentication at startup. C. Allow network unlock at startup. D. Configure use of hardware-based encryption for operating system drives.
Run the tpminit.exe command Run the tpmvscmgr.exe Use the Certificate Enrollment wizard
You have a computer named Client1 that runs Windows 10 Enterprise. Client1 is a member of an Active Directory domain. A domain administrator provisions a certificate template for a virtual smart card logon. In the BIOS of Client1, you enable the Trusted Platform Module (TPM). You need to enable the virtual smartcard logon on Client1. Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.
c
You have a computer named Client1. Client 1 is joined to an Active Directory domain. You need to join Client1 to an Azure Active Directory (Azure AD) tenant. What should you do first? A. From User Accounts in Control Panel, configure the Manage User Accounts settings. B. From Computer Management, modify the membership for the Network Configuration Operators group. C. From the System in the Settings app, click Disconnect from organization. D. From the Local Group Policy Editor, modify the Add workstations to domain policy.
d
You have a computer named Client1. Client1 is joined to an Active Directory domain. You need to join Client1 to an Azure Active Directory (Azure AD) tenant. What should you do first? A. From the Local Group Policy Editor, modify the Add workstations to domain policy. B. From the network adapter properties, modify the DNS suffix. C. From System Control Panel, configure the computer to be a member of a workgroup. D. From the System in the Settings app, modify the sign-in options.
d
You have a computer named Computer1 that runs Windows 10 Enterprise. You plan to install the most recent updates to Computer1. You need to ensure that you can revert to the current state of Computer1 in the event that the computer becomes unresponsive after the update. What should you include in your solution? A. A volume snapshot by using the fsutil.exe command with the volume parameter B. The Restore personal files option from the File History control panel item C. The Refresh your PC option from the PC Settings D. The Backup and Restore (Windows 7) control panel item
c
You have a computer named Computer1 that runs Windows 10 Enterprise. You plan to install the most recent updates to Computer1. You need to ensure that you can revert to the current state of Computer1 in the event that the computer becomes unresponsive after the update. What should you include in your solution? A. The Reset this PC option from the Recovery section of the Settings app B. The Sync your settings options from the Accounts section of the Settings app C. The Backup and Restore (Windows 7) control panel item D. The Refresh your PC option from the PC Settings
d
You have a computer named Computer1 that runs Windows 10 Enterprise. Computer1 is configured to receive Windows updates from the Internet. If a user is logged on to Computer1, you need to prevent Computer1 from automatically restarting without the logged on user's consent after the installation of the Windows updates. What should you do? A. Enable the Defer upgrades setting. B. Edit the Automatic App Update scheduled task. C. Configure the Choose how updates are delivered setting. D. Configure the Choose how updates are installed setting.
a c d
You have a computer named Computer1 that runs Windows 10 Enterprise. You add a 1 TB hard drive and create a new volume that has the drive letter D. You format the drive by using NTFS. You need to limit the amount of space that each user can consume on D: to 200 GB. Members of the Administrators group should have no limit. Which three actions should you perform? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point. A. Set a default quota limit. B. Run convert D: /FS:NTFS. C. Run fsutil quota violations D:. D. Enable the Deny disk space to users exceeding quota limit setting. E. Add a quota entry.
b c d
You have a computer named Computer1 that runs Windows 10 Enterprise. You add a 1 TB hard drive and create a new volume that has the drive letter D. You need to limit the amount of space that each user can consume on D: to 200 GB. Members of the Administrators group should have no limit. Which three actions should you perform? Each correct answer presents part of the solution. (Three Answers) A. Run fsutil quota violations D:. B. Enable the Deny disk space to users exceeding quota limit setting. C. Enable the Enable Quota Management setting. D. Set a default quota limit. E. Run convert D: /FS:NTFS. F. Add a quota entry.
a
You have a computer named Computer1 that runs Windows 10 Enterprise. You install a Universal app named App1 on Computer1. You discover that an update for App1 is available. You need to install the update as soon as possible. What should you do? A. Log off and log on to the Computer1. B. From the Windows Update settings, modify the Choose how updates are delivered setting. C. From the Windows Update settings, modify the Choose how updates are installed setting. D. From the Windows Update settings, click Check for updates.
write modify full control
You have a computer that runs Windows 10 Enterprise that contains the following folders: You have a local user named User1. User1 has read and execute permission to Folder1. You need to ensure that User1 can perform the following tasks: - Create new files in Folder2. - Edit all files in Folder3. - Change the permissions of files in Folder5. The solution must use the principle of least privilege. Which permissions should you assign to User1 on each folder? To answer, drag the appropriate permissions to the correct folders. Each permission may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
c
You have a computer that runs Windows 10 and has BitLocker Drive Encryption (BitLocker) configured. You need to change the BitLocker PIN for the drive. What should you run? A. the bitsadmin.exe command B. the Enable-BitLocker cmdlet C. the Add-BitLockerKeyProtector cmdlet D. the Set-PcsvDeviceUserPassword cmdlet
d
You have a computer that runs Windows 10 and has BitLocker Drive Encryption (BitLocker) configured. You need to change the BitLocker PIN for the drive. What should you run? A. the repair-bde.exe Windows script file B. the Enable-BitLocker cmdlet C. the bitsadmin.exe command D. the manage-bde.exe command
d
You have a computer that runs Windows 10 and is used by 10 users. The computer is joined to an Active Directory domain. Each user has an Active Directory account. You need to ensure that all of the users can access the files located in one another's libraries. What should you configure? A. Microsoft OneDrive B. HomeGroup settings C. Encrypting File System (EFS) settings D. NTFS permissions E. Account policies F. Share permissions G. Software restriction policies H. Application control policies
c
You have a computer that runs Windows 10. You install a second hard disk drive on the computer and you create a new volume named E. You need to enable system protection for volume E. What should you use? A. the Wbadmin command B. the Settings app C. System Properties D. the Set-Volume cmdlet
Password Policy Password Policy Security Options
You have a computer that runs Windows 10. You need to meet the following requirements: Which policy setting should you configure for each requirement? To answer, drag the appropriate policy settings to the correct requirements. Each policy setting may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
a
You have a computer that runs Windows 10. You have an application control policy on the computer. You discover that the policy is not enforced on the computer. You open the Services snap-in as shown in the exhibit. (Click the Exhibit button.) You need to enforce the application control policy on the computer. What should you do? A. Set the Application Identity service Startup Type to Automatic and start the service. B. Set the Application Information service Startup Type to Automatic and start the service. C. Set the Application Management service Startup Type to Automatic and start the service. D. Set the Application Experience service Startup Type to Automatic and start the service.
a
You have a computer that runs Windows 10. You need to ensure that the next time the computer restarts, the computer starts in safe mode. What should you use? A. the System Configuration utility B. the Restore-Computer cmdlet C. the Bcdboot command D. System in Control Panel
Enable Remote Desktop Run the remote Desktop Client
You have a desktop computer and a tablet that both run Windows 10 Enterprise. The desktop computer is located at your workplace and is a member of an Active Directory domain. The network contains an Application Virtualization (App-V) infrastructure. Several App-V applications are deployed to all desktop computers. The tablet is located at your home and is a member of a workgroup. Both locations have Internet connectivity. You need to be able to access all applications that run on the desktop computer from you tablet. Which actions should you perform on each computer? To answer, drag the appropriate action to the correct computer. Each action may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
a b
You have a desktop computer that runs Windows 8 Enterprise. You add three new 3-terabyte disks. You need to create a new 9-terabyte volume. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) A. From Disk Management, create a new spanned volume. B. From Disk Management, convert all of the 3-terabyte disks to GPT. C. From PowerShell, run the New-VirtualDisk cmdlet. D. From Disk Management, bring all disks offline. E. From Diskpart, run the Convert MBR command. F. From PowerShell, run the Add-PhysicalDisk cmdlet.
d
You have a laptop that has connections for three WiFi network named WiFi1, WiFi2, and WiFi 3. You need to ensure that the laptop connects to WiFi1 when multiple WiFi1 networks are available. What should you do? A. From Netsh, configure the WLAN context. B. From Network Connections in Control Panel, modify the bindings for the WiFi. C. From the Windows Settings app, configure the Wi-Fi Sense settings. D. From Network Connections in Control Panel, modify the network provider order.
c
You have a laptop that is a member of a workgroup. The laptop does not have a Trusted Platform Module (TPM) chip. You plan to enable BitLocker Drive Encryption (BitLocker) for the operating system drive. What are two methods that you can use to unlock the drive when the laptop restarts? Each correct answer presents a complete solution. A. a password B. a Near Field Communication (NFC)-enabled portable device C. a USB drive D. a user account E. Network Unlock
a, b
You have a network that contains Window 10 Enterprise computers. The network configuration of one of the computers is shown in the following output. (Two Answers) The computer has obtained [answer choice] from a DHCP server A. only the IPv4 configuration B. only the IPv6 configuration C. the IPv4 and IPv6 confutations The computer [answer choice] access from the internet. A. will be unable to B. will use 10.1.1.1 to C. will use fe80::224:1ff:fedf:699f to
d
You have a standalone Windows 10 Enterprise computer that has a single hard drive installed and configured. You need to identify which storage devices can have content backed up by using File History. What should you identify? A. A writable Blu-ray disc B. A writable DVD disc C. An internal drive that is formatted NTFS D. An SD card that is formatted FAT32
can be restored from onedrive.com cannot be restored
You have a standalone computer that runs Windows 10 Enterprise. The computer is configured to automatically back up files by using File History. The user of the computer uses the OneDrive desktop app to sync files. The Previous Versions settings from the local group policy of the computer are shown in the following graphic.
d, e
You have an Active Directory domain named contoso.com that contains a deployment of Microsoft System Center 2012 Configuration Manager Service Pack 1 (SP1). You have a Microsoft Intune subscription that is synchronized to contoso.com by using the Microsoft Azure Active Directory Synchronization Tool (DirSync.) You need to ensure that you can use Configuration Manager to manage the devices that are registered to your Microsoft Intune subscription. Which two actions should you perform? Each correct answer presents a part of the solution. A. In Microsoft Intune, create a new device enrollment manager account. B. Install and configure Azure Active Directory Synchronization Services (AAD Sync.) C. In Microsoft Intune, configure an Exchange Connector. D. In Configuration Manager, configure the Microsoft Intune Connector role. E. In Configuration Manager, create the Microsoft Intune subscription.
c
You have an Active Directory domain named contoso.com. Work folders are deployed. A user named User1 has a Windows 10 Home computer that is configured to use Work Folders. User1 connects a new removable USB drive to the computer. User1 needs to move the Work Folders to the new drive. What should User1 do first? A. From the Work Folders settings, click Manage Credentials. B. From Services, stop the Work Folders service. C. From the Work Folders settings, click Stop using Work Folders. D. From Services, set the BitLocker Drive Encryption Service to start automatically.
both RemoteApps and Remote Desktop Connections only change expired passwords
You have an Active Directory domain named contoso.com. You have a server that runs Windows Server 2012 R2 and that is a Remote Desktop server. The RD Web Access Web application settings are shown in the following graphic. Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic. NOTE: Each correct selection is worth one point.
configure automatic updates specify intranet Microsoft update service location
You have an Active Directory domain. All of the client computers in the domain run Windows 10 Enterprise. You need to configure the client computers to download updates from a Windows Server Update Service server. Which two settings should you configure? To answer, select the appropriate settings in the answer area.
f
You have an application named App1 installed on a computer named Computer1. Computer1 runs Windows 10. App1 saves data to %UserProfile%\App1\Data. You need to ensure that you can recover the App1 data if Computer1 fails. What should you configure? A. share permissions B. application control policies C. Encrypting File System (EFS) settings D. NTFS permissions E. HomeGroup settings F. Microsoft OneDrive G. software restriction policies H. account policies
add-AppxPackage -path
You have an image of Windows 10 Enterprise named Image1. Image1 has version number 1.0.0.0 of a custom, line-of-business universal app named App1. You deploy Image1 to Computer1 for a user named User1. You need to update App1 to version 1.0.0.1 on Computer1 for User1 only. What command should you run? To answer, write the appropriate options in the from each area.
a
You have an on-premises Active Directory domain and a Microsoft Azure Active Directory. You have a Microsoft Intune subscription that is linked to the Azure Active Directory. You configure directory synchronization between the on-premises Active Directory and the Azure Active Directory. You import 100 users into the Azure Active Directory. Users report that they are unable to sigh in to Microsoft Intune. You confirm that each user has a valid Active Directory account and password. You open the Microsoft Intune Console and see the configuration of User1 as shown in the exhibit. (Click the Exhibit button.) You need to ensure that the users can sign in to Microsoft Intune. What should you do first? A. Activate the synchronized user accounts. B. Purchase an Enterprise Mobility Suite subscription. C. Configure Microsoft Intune for single sign-on. D. Create a new Security Group in Microsoft Intune named Domain Intune Users.
a
You have an unsecured wireless network for users to connect to from their personal Windows 10 devices. You need to prevent Wi-Fi Sense from sharing information about the unsecured wireless network. What should you do? A. Configure the SSID of the unsecured wireless to contain _optout. B. Instruct the users to disable Internet Protocol Version 6 (TCP/IPv6) on their wireless network adapters. C. Configure the SSID of the guest wireless to be hidden. D. Instruct the users to turn off Network Discovery on their devices.
c
You have five computers that runs Windows 10. Each computer is used by a different user. All of the computers are members of the same workgroup. You need to ensure that all of the users can access the files located in one another's libraries. Access must be granted based on a shared password. What should you configure? A. share permissions B. account policies C. HomeGroup settings D. application control policies E. NTFS permissions F. Microsoft OneDrive G. Encrypting File System (EFS) settings H. software restriction policies
When you run Windows To Go from USB1, you have to launch an elevated command prompt, run disk part and then execute the List disk command. You now have to select the internal disk using the sel disk command, and then enter the online disk command. Configuring the attributes volume option from DiskPart allows you to display, set, or clear the attributes of a volume.
You manage 50 computers that run Windows 10 Enterprise. You have a Windows to Go workspace installed on a USB drive named USB1. You need to configure USB1 to meet the following requirements: In the table below, select the action that must be performed to achieve each requirement. NOTE: Make only one selection in each column. Each correct selection is worth one point.
Azure RemoteApp Azure RemoteApp
You manage 50 computers that run Windows 10 Enterprise. You have a Microsoft Azure RemoteApp deployment. The deployment consists of a hybrid collection named Collection1. All computers have the Hyper-V feature installed and have a virtual machine that runs Windows 7. You plan to install applications named App1 and App2 and make them available to all users. App1 is a 32-bit application. App2 is a 64-bit application. You need to identify the installation method for each application. The solution needs to minimize the number of installations. Which deployment method should you identify for each application? To answer, drag the appropriate deployment methods to the correct applications. Each deployment method may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content. NOTE: Each correct selection is worth one point.
Windows Configuration Policy Windows Configuration Policy Microsoft Intune Agent Settings
You manage Microsoft Intune for a company named Contoso. You have 200 computers that run Windows. The computers are Intune clients. You need to configure software updates for the clients. Which policy template should you use to configure each software updates setting? To answer, drag the appropriate policy templates to the correct settings. Each policy template may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
c
You manage Windows 10 Enterprise desktop and laptop computers for your company. They are part of a Windows Server 2012 R2 Active Directory Domain Services (AD DS) environment. The system administrators implement DFS for flexibility and availability. Laptops are able to connect to the company's private network by using local Ethernet or secure wireless. Three users report that their files on the server are missing, and they no longer have drive G. You need to ensure that the three users' computers can access the DFS namespace so that you can troubleshoot by using the DFS client. What should you do? A. Ascertain whether the three users are connected through a wireless or wired connection. B. Ensure that the three users have access to the domain NETLOGON share. C. Ensure that the Net Logon service is running on all servers that are hosting the DFS namespace. D. Verify that a share is defined on the folder to which drive G is being mapped.
CloudCollection1 only CloudCollection1 and HybridCollection1 None
You manage a Microsoft Azure RemoteApp deployment. The deployment consists of a cloud collection named CloudCollection1 and a hybrid collection named HybridCollection1. Both collections reside in a subscription named Subscription1. Subscription1 contains two Active Directory instances named AzureAD1 and AzureAD2. AzureAD1 is the associated directory of Subcsription1. AzureAD1 is synchronized to an on-premises Active Directory forest named constoso.com. Passwords are synchronized between AzureAD1 and the on-premises Active Directory. You have the following user accounts:
b
You manage a network that includes Windows 10 Enterprise computers. All of the computers on the network are members of an Active Directory domain. The company recently proposed a new security policy that prevents users from synchronizing applications settings, browsing history, favorites, and passwords from the computers with their Microsoft accounts. You need to enforce these security policy requirements on the computers. What should you do? A. On the Group Policy Object, configure the Accounts: Block Microsoft accounts Group Policy setting to Users can't add Microsoft accounts. B. On the Group Policy Object, configure the Accounts: Block Microsoft accounts Group Policy setting to Users can't add or log on with Microsoft accounts. C. From each computer, navigate to Change Sync Settings and set the Sync Your Settings options for Apps, Browser, and Passwords to Off. D. From each computer, navigate to Change Sync Settings and set the Sync Your Settings option to Off.
a
You manage desktop computers on your company network. The finance department uses computers that rub Widows 7 Enterprise and a 32-bit legacy application. The application has some compatibility issues with Widows 10 Enterprise. The application uses domain single sign-on for authentication. The vendor releases a new version of the application that is fully compatible with Windows 10 Enterprise These versions cannot be installed on the same computer due to HKEY_CURRENT_USER registry setting conflicts. You need to migrate the finance department computers Widows 10 Enterprise while meeting the following requirements: Which technology should you choose? A. Microsoft Application Compatibility Toolkit (ACT) B. Hyper-V C. Microsoft Application Virtualization (App-V) D. User Experience Virtualization (UE-V)
c
You need to enable other users to establish Remote Desktop connections to your computer. Which Control Panel application should you use? A. Credential Manager B. Sync Center C. System D. Power Options E. Phone and Modem F. RemoteApp and Desktop Connections G. Network and Sharing Center H. Work Folders
a
You plan to deploy a Microsoft Azure Remote App collection by using a custom template image. The image will contain Microsoft Office 365 apps. The image will be used to deploy a collection that will be accessed by 50 users. You need to identify licensing requirements for the deployment. Which two requirements should you identify? Each correct answer presents part of the solution. A. An activated Office 365 ProPlus installation B. Windows client access licenses (CALs) assigned to the users C. Office 365 ProPlus licenses assigned to the users D. Remote Desktop client access licenses (CALS) assigned to the users E. Office 365 Enterprise E3 service plan
c
You plan to deploy a Microsoft Azure RemoteApp collection by using a custom template image. The image will contain Microsoft Office 365 ProPlus apps. You need to ensure that multiple users can run Office 365 ProPlus from the custom template image simultaneously. What should you include in the configuration file? A. <Property Name = "FORCEAPPSHUTDOWN" Value = "FALSE" /> B. <Product ID = "0365ProPlusRetail" /> C. <Property Name = "SharedComputerLicensing" Value = "1" /> D. <Property Name = "AUTOACTIVATE" Value = "1" />
Download the Office Deployment Tool Modify the Click-to-Run Office 365 Configuration.xml file. Run setup.exe /download Run setup.exe /configure
You plan to deploy a Microsoft Azure RemoteApp collection by using a custom template image. The image will contain Microsoft Word and Excel Office 365 ProPlus programs. You need to install the Word and Excel programs. The solution must minimize the amount of Internet traffic used during installation. Which four actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Remote Desktop Session Host Desktop Experience
You plan to deploy a Microsoft Azure RemoteApp hybrid collection. You plan to use a custom template image named Image1 to deploy the hybrid collection. You need to identify the role and feature that must be enabled in the image to support the deployment of the hybrid collection. What should you identify? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.
d
You plan to deploy a customized Windows To Go workspace that uses an Unattend.xml file. You need to prevent a local fixed disk from appearing in File Explorer when a computer starts from Windows To Go. Which setting should you modify in Unattend.xml? A. Start Menu B. Storage C. Deviceaccess D. SanPolicy
Install the Intune client on the test computers. From the Microsoft Intune administration portal, run the Add Software - Microsoft Intune Software Publisher wizard From the Microsoft Itune administration portal click Manage Deployment
You plan to use Microsoft Intune to manage application updates for non-Microsoft applications. You create a new Intune subscription. You need to test the deployment of the updates on a computer. The solution must ensure that the updates are deployed only if the test computer has the corresponding application installed already. Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.
a d
You provide IT support for a small startup company. The company wants users to have Read and Write permissions to the company's shared folder. The network consists of a workgroup that uses Windows 10 Enterprise computers. You add each user to a group named NetworkUsers. You need to grant permissions to the share. You have the following requirements: Which two actions should you take? Each correct answer presents part of the solution. (Two Answers) A. Grant Modify permissions to the NetworkUsers group on the shared folder. B. Grant Full Control permissions to the Domain Admins group on the shared folder. C. Grant List and Execute permissions to the NetworkUsers group on the shared folder. D. Grant Full Control permissions to the Creator Owner group on the shared folder.
b
You purchase a new Windows 10 Enterprise desktop computer. You have four external USB hard drives. You want to create a single volume by using the four USB drives. You want the volume to be expandable, portable and resilient in the event of failure of an individual USB hard drive. You need to create the required volume. What should you do? A. From Control Panel, create a new Storage Space across 4 USB hard drives. Set resiliency type to Three-way mirror. B. From Control Panel, create a new Storage Space across 4 USB hard drives. Set resiliency type to Parity. C. From Disk Management, create a new spanned volume. D. From Disk Management, create a new striped volume.
d
You purchase a new Windows 10 Enterprise desktop computer. You have six external USB hard drives. You want to create a single volume by using the six USB drives. You want the volume to be expandable, portable, and resilient in the event of simultaneous failure of two USB hard drives. You need to create the required volume. What should you do? A. From Control Panel, create a new Storage Space across 6 USB hard drives. Set resiliency type to Parity. B. From Disk Management, create a new striped volume. C. From Disk Management, create a new spanned volume. D. From Control Panel, create a new Storage Space across 6 USB hard drives. Set resiliency type to Three-way mirror.
Open Computer Configuration of Group Policy. Create new AppLocker Deny Executable rules. Enable enforcement of executable rules.
You support Windows 10 Enterprise client computers. Company policy requires that Microsoft Outlook 2010 be the only mail client allowed and supported. You collect software metering data and discover that several users are running other third-party mail clients. You need to block the third-party mail client from running on the computers. All other applications should be allowed. Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.
a
You support Windows 10 Enterprise computers in a workgroup. You have configured a local AppLocker policy to prevent users from running versions of app.exe previous to v9.4. Users are still able to run app.exe. You need to block users from running app.exe by using the minimum administrative effort. What should you do? A. Change the Application Identity service startup mode to automatic and start the service. B. Configure enforcement for Windows Installed rules. C. Configure a Software Restriction Policy publisher rule. D. Run the GPupdate /force command in a relevant command prompt.
b
You support Windows 10 Enterprise computers that are members of an Active Directory domain. Recently, several domain user accounts have been configured with super-mandatory user profiles. A user reports that she has lost all of her personal data after a computer restart. You need to configure the user's computer to prevent possible user data loss in the future. What should you do? A. Remove the .man extension from the user profile name. B. Configure FolderRedirection by using the domain group policy. C. Configure the user's documents library to include folders from network shares. D. Add the .dat extension to the user profile name.
b
You support Windows 10 Enterprise computers. Your company has started testing Application Virtualization (App-V) applications on several laptops. You discover that the App-V applications are available to users even when the laptops are offline. You need to ensure that the App-V applications are available to users only when they are connected to the company network. What should you do? A. Change user permissions to the App-V applications. B. Disable the Disconnected operation mode. C. Configure mandatory profiles for laptop users. D. Reset the App-V client FileSystem cache.
5 4 2
You support Windows 10 Enterprise computers. AppLocker policies are deployed. Company policy states that AppLocker must be disabled. You need to disable AppLocker. Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)
d
You support Windows 10 Enterprise computers. Your company protects all laptops by using the BitLocker Network Unlock feature. Some employees work from home. You need to ensure that employees can log on to their laptops when they work from home. What should you do? A. Have users run the Manage-bde.exe -unlock command before they disconnect from the company network. B. Ensure that the Trusted Platform Module (TPM) chips in the laptops are version 1.2 or greater. C. Enable BitLocker to Go. D. Provide employees with their BitLocker PINs.
c
You support Windows 10 Enterprise desktop computers. Your company has a security policy that controls multiple settings of the desktops through the domain group policy. The security policy recently was updated to require that access to several built-in Windows 10 Enterprise tools be prohibited to all local users on one of the desktop computers. You need to implement this new policy. What should you do? A. Configure NTFS permissions. B. Create a Windows To Go workspace. C. Configure the AppLocker policy. D. Enable BitLocker.
c
You support Windows 10 Enterprise laptops that are part of a workgroup. An employee is unable to start Windows Mobility Center on his laptop. You need to make it possible for the employee to use Windows Mobility Center on the laptop. What should you do? A. Use Add features to Windows 10 Enterprise to add Windows Mobility Center. B. Use Programs and Features to repair the installation of Windows Mobility Center. C. Use Local Group Policy Editor to set Turn off Windows Mobility Center to Not Configured. D. Use Turn Windows features on or off in Programs and Features to enable Windows Mobility Center.
Select Sync Setup Select Manage offline files. Select Enable offline files.
You support Windows 10 Enterprise laptops. You need to configure the laptops to support offline file access. Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.
e f
You support Windows 10 Enterprise laptops. Microsoft BitLocker Administration and Monitoring (MBAM) is deployed on your network on a server named SERVER1. Company policy requires that laptops with MBAM client installed prompt users to enable BitLocker within 2 hours of being started. You need to make changes to the Configure MBAM Services Group Policy settings. Which two actions should you perform? Each correct answer presents part of the solution. A. Set Select BitLocker Recovery Information to store to Recovery password only. B. Set Select BitLocker Recovery Information to store to Recovery password and key package. C. Set Enter status reporting frequency (in minutes) to 120. D. Set MBAM Status reporting endpoint to SERVER1. E. Set MBAM Recovery and Hardware service endpoint to SERVER1. F. Set Enter client checking status frequency (in minutes) to 120.
a
You support Windows 10 Enterprise tablets that are part of a workgroup. You have been given a tablet on which Windows Mobility Center will not start. You need to make it possible to start Windows Mobility Center on the tablet. What should you do? A. Run gpedit.msc and set Turn off Windows Mobility Center to Not Configured. B. Repair the installation of Windows Mobility Center by using Programs and Features. C. Turn on XPS Services by using Turn Windows features on or off in Programs and Features. D. Run control.exe, and then select Programs and Features. Click Turn Windows features on or off.
c
You support Windows 10 Enterprise tablets. The tablets have the Application Virtualization (App-V) client installed. Company policy requires that all published App-V applications be available to users only when they are connected to the company network. You need to configure the tablets so that the company policy requirements are enforced. What should you do? A. Configure mandatory profiles for tablet users. B. Reset the App-V client FileSystem cache on the tablets. C. Disable the Disconnected operation mode on the tablets. D. Change user permissions to the App-V applications.
b
You support desktop computers and tablets that run Windows 8 Enterprise. All of the computers are able to connect to your company network from the Internet by using DirectAccess. Your company wants to deploy a new application to the tablets. The deployment solution must meet the following requirements: You need to deploy the new application to the tablets. What should you do? A. Deploy the application as an Application Virtualization (App-V) package. Install the App-V 4.6 client on the tablets. B. Deploy the application as a published application on the Remote Desktop server. Create a Remote Desktop connection on the tablets. C. Install the application on a local drive on the tablets. D. Install the application in a Windows To Go workspace. E. Install Hyper-V on tablets. Install the application on a virtual machine. F. Publish the application to Windows Store. G. Install the application within a separate Windows 8 installation in a virtual hard disk (VHD) file. Configure the tablets with dual boot. H. Install the application within a separate Windows 8 installation in a VHDX file. Configure tablets with dual boot.
contoso.com root certificate no certificate required no certificate required client (user) certificate issued by Contoso
You support desktop computers for a company named Fabrikam, Inc. The computers are members of the Active Directory domain named fabrikam.com. Fabrikam works with a supplier named Contoso, Ltd. Each company has a public key infrastructure (PKI), and no public certificate authorities (CAs) are used. Fabrikam employees regularly use a Contoso website that is hosted on a server in the contoso.com domain. The website requires SSL and mutual authentication. You need to configure the computers to allow Fabrikam users to access the Contoso website without any warning prompts. You also need to use the fewest certificates possible. Which certificate or certificates should you use?
e
You use a Windows 8.1 tablet. The tablet receives Windows Update updates automatically from the Internet. The tablet has Wi-Fi and is connected to a 3G mobile broadband Wi-Fi hot spot. You need to minimize data usage while connected to this hot spot. What should you do? A. Turn on Airplane Mode. B. Disable File and Print Sharing for mobile broadband connections. C. Configure the interface metric of IP settings for Wi-Fi connection as1. D. Edit the Inbound Rule of Windows Firewall, and then disable Internet Control Message Protocol (ICMP) traffic. E. Configure the broadband connection as a metered network.
2, 3, 5
You work for a small company that uses Windows 10 computers. The computers are joined to a homegroup. You want to share an existing folder named Research. It is located in the Documents folder. You need to give users the ability to change the files in this folder. Which three actions should you perform in sequence?
c
Your Windows 10 Enterprise work computer is a member of an Active Directory domain. You use your domain account to log on to the computer. You use your Microsoft account to log on to a home laptop. You want to access Windows 10 Enterprise apps from your work computer by using your Microsoft account. You need to ensure that you are able to access the Windows 10 Enterprise apps on your work computer by logging on only once. What should you do? A. Add the Microsoft account as a user on your work computer. B. Enable Remote Assistance on your home laptop. C. Connect your Microsoft account to your domain account on your work computer. D. Install SkyDrive for Windows on both your home laptop and your work computer.
a c
Your company has Windows 10 Enterprise client computers. Microsoft Application Virtualization (App-V) is used to deploy applications. An App-V package named App1 is stored in C:\App1 on each computer. You need to publish App1 on the computers. Which two Windows PowerShell commands should you run? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point. A. Publish-AppVClientPackage -Name App1 -DynamicUserConfigurationPath C:\App1\config.xml B. Add-AppVClientPackage C:\App1\config.xml C. Add-AppVClientPackage C:\App1\App1.appv D. Publish-AppVClientPackage -Name App1 -DynamicUserConfigurationPath C:\App1\App1.appv
c
Your company has Windows 10 client computers. All of the computers are managed by using Windows Intune. You need to provide a user with the ability to deploy software to the computers by using Windows Intune. The solution must minimize the number of permissions assigned to the user. Which role should you use? A. User management administrator from the Windows Intune account portal B. Global administrator from the Windows Intune account portal C. Service administrator from the Windows Intune administrator console D. Service administrator from the Windows Intune account portal
d
Your company has a main office and a branch office. Each office contains several servers that run Windows Server 2012. You need to configure BranchCache for the client computers in the branch office. The solution must ensure that all of the cached content is in a central location. What should you run on each client computer? A. the Enable-BCDistributed cmdlet B. the Enable-BCHostedClient cmdlet C. the Enable-BCLocal cmdlet D. the Enable-BCHostedServer cmdlet
Will retrieve cached content from Server2. - Branch1 Computers Will retrieve cached content from peers - Branch2 Computers
Your company has a main office and two branch offices named Branch1 and Branch2. The main office contains a file server named Server1 that has BranchCache enabled. Branch1 contains a server named Server2 that is configured as a hosted cache server. The average round trip network latency between the offices is 100 milliseconds. All client computers run Windows 8 Enterprise. All of the computers are joined to an Active Directory domain. The BranchCache settings of all the computers are configured as shown in the following exhibit. (Click the Exhibit button.)
a c
Your company has a main office that has a connection to the Internet. The company has 100 Windows 10 Enterprise computers that run Microsoft Office 2010. You purchase a subscription to Office 365 for each user. You download the Office Deployment Tool for Click-to-Run. You need to deploy Office 365 Pro Plus to the computers. The solution must minimize the amount of traffic over the Internet connection. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) A. On a file server, run setup.exe and specify the /download parameter. B. On each client computer, run setup.exe and specify the /configure parameter. C. On a file server, run setup.exe and specify the /configure parameter. D. On each client computer, run setup.exe and specify the /download parameter.
c
Your company has a standard power scheme for the sales team. You are replacing a laptop for a sales associate. You import the power scheme onto the new laptop. You need to apply the power scheme. What should you do? A. Modify the power scheme under Power and Sleep settings. B. Run the gpupdate /F command. C. Run the powercfg /S command. D. Modify the advanced power settings.
a
Your company network includes a main office and multiple small branch offices. All of the computers in the branch offices run Windows 10 Enterprise and are members of an Active Directory domain. The company has no plans to deploy any servers in the branch offices. Users from some branch offices report that it takes a long time to open documents from a file server that is located in the main office. You need to enable BranchCache on all computers located in the branch offices. What should you do? A. Open Group Policy Editor and enable BranchCache in Distributed Cache mode for the computers in the branch offices. B. Open PowerShell and run the Enable-BCHostedClients cmdlet on the computers in the branch offices. C. Open Group Policy Editor and Enable BranchCache in a Hosted Cache mode for the computers in the branch offices. D. Open PowerShell, run the Set-BCCache cmdlet on computers in the branch offices.
succeeded for all files and folders failed to encrypt one of the files but encrypted the folder and the other file.
Your company upgrades a research and development department workstation to a Windows 10 Enterprise computer. Two of the workstation's folders need to be encrypted. The folders are named C:\ProtectedFiles and C:\Backups. You attempt to encrypt the folders. The output is shown in the following exhibit.
c
Your network contains a shared folder that is located at \\server1\data. On a computer, you make the shared folder available for offline use. You need to ensure that you have the most up-to-date version of the folder cached. Which Control Panel application should you use? A. Credential Manager B. Phone and Modem C. Work Folders D. System E. RemoteApp and DesktopConnections F. Network and Sharing Center G. Sync Center H. Power Options
2, 3, 5
Your network contains an Active Directory domain and 100 Windows 10 Enterprise client computers. All software is deployed by using Microsoft Application Virtualization (App-V) 5.0. Users are NOT configured as local administrators. Your company purchases a subscription to Microsoft Office 365 that includes Office 365 ProPlus. You need to create an App-V package for Office 365 ProPlus. Which three actions should you perform in sequence?
c
Your network contains an Active Directory domain and 100 Windows 10 client computers. All software is deployed by using Microsoft Application Virtualization (App-V) 5.0. Users are NOT configured as local administrators. Your company purchases a subscription to Microsoft Office 365 that includes Office 365 ProPlus. You need to create an App-V package for Office 365 ProPlus. What should you do? A. Run the Office Customization Tool (OCT), run the App-V Sequencer and then run Setup /Packager. B. Download the Office Deployment Tool for Click-to-Run, run the App-V Sequencer and then run Setup /Admin. C. Download the Office Deployment Tool for Click-to-Run, run Setup /Download and then run Setup /Packager. D. Run the Office Customization Tool (OCT), run Setup /Download and then run the App-V Sequencer.
d
Your network contains an Active Directory domain named contoso.com. All client computers run Windows 10 Enterprise and Microsoft Office 2013. All of the computers are joined to the domain. Your company purchases a subscription to Office 365. An administrator creates an Office 365 account for each user and deploys a federated solution for Office 365. You need to prevent the users from being prompted for a user account and a password each time they access services from Office 365. Which account should you instruct the users to use when they sign in to their computer? A. a Microsoft account B. a local user account C. an Office 365 account D. a contoso.com account
d
Your network contains an Active Directory domain named contoso.com. All users have email addresses in the @adatum.com domain. You need to ensure that users can register Windows 10 mobile devices for mobile device management (MDM). Which DNS record should you create? A. Enterpriseregistration.adatum.com B. Deviceregistration.adatum.com C. Deviceregistration.contoso.com D. Enterpriseregistration.contoso.com
e
Your network contains an Active Directory domain named contoso.com. Contoso.com is synchronized to a Microsoft Azure Active Directory. You have a Microsoft Intune subscription. Your company plans to implement a Bring Your Own Device (BYOD) policy. You will provide users with access to corporate data from their personal iOS devices. You need to ensure that you can manage the personal iOS devices. What should you do first? A. Install the Company Portal app from the Apple App Store. B. Create a device enrollment manager account. C. Set a DNS alias for the enrollment server address. D. Configure the Intune Service to Service Connector for Hosted Exchange. E. Enroll for an Apple Push Notification (APN) certificate.
b
Your network contains an Active Directory domain named contoso.com. The domain contains Windows 10 Enterprise client computers. Your company has a subscription to Microsoft Office 365. Each user has a mailbox that is stored in Office 365 and a user account in the contoso.com domain. Each mailbox has two email addresses. You need to add a third email address for each user. What should you do? A. From Active Directory Users and Computers, modify the E-mail attribute for each user. B. From Microsoft Azure Active Directory Module for Windows PowerShell, run the Set-Mailbox cmdlet. C. From Active Directory Domains and Trust, add a UPN suffix for each user. D. From the Office 365 portal, modify the Users settings of each user.
denied for everyone. an Executable
Your network contains an Active Directory domain. The Default Domain Policy contains the AppLocker settings configured as shown in the AppLocker Settings exhibit. (Click the Exhibit button.) The Default Domain Policy contains the AppLocker properties configured as shown in the AppLocker properties exhibit. (Click the Exhibit button.)
a
Your network contains an Active Directory domain. The domain contains 100 Windows 10 client computers. All of the computers secure all connections to computers on the internal network by using IPSec. The network contains a server that runs a legacy application. The server does NOT support IPSec. You need to ensure that some of the Windows 8 computers can connect to the legacy server. The solution must ensure that all other connections are secured by using IPSec. What should you do? A. Modify the settings of the Domain Profile. B. Create a connection security rule. C. Create an inbound firewall rule. D. Modify the settings of the Private Profile
d
Your network contains an Active Directory domain. The domain contains 100 computers that run Windows 10. Your company is developing a line-of-business application. You plan to deploy the application by using Windows Store for Business. You need to ensure that a developer can publish the application to the Windows Store for Business. What should you do first? A. Provision a Windows Dev Center dev account for the developer. B. Assign the Windows Store Purchaser role to the developer. C. Assign the Windows Store Admin role to the developer. D. Provision a Microsoft Azure Active Directory (Azure AD) account for the developer. E. Provision a Microsoft account for the developer.
d
company has Windows 10 Enterprise computers in an Active Directory Domain Services (AD DS) domain. A computer named COMPUTER1 has a shared printer named PRINTER1 installed and has Remote Desktop enabled. A user named Intern is a member of a security group named Sales. The Sales group is a member of the Remote Desktop Users group on COMPUTER1. Only the Sales group has access to PRINTER1. You need to configure COMPUTER1 to meet the following requirements: What should you do? A. Assign Intern the Deny log on user right by using the Remote Desktop Services user right. B. Assign Intern the Deny access to this computer from the network user right. Assign the Sales group the Allow log on locally user right. C. Remove Intern from the Sales group. D. Remove the Sales group from the Remote Desktop Users group and add Intern to the Remote Desktop Users group.