MD-100

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Technicanl requirements: Contoso identifies the following technical requirements: The computers in the San Diego office must be upgraded automatically to Windows 10 Enterprise and must be joined to Azure AD the first time a user starts each new computer. End users must not be required to accept the End user License Agreement (EULA). Helpdesk users must be able to troubleshoot Group Policy object (GPO) processing on the WIndows 10 computers. The helpdesk users must be able to identify which. QUALITY UPDATE INSTALLATIONS MUST BE DEFERRED AS LONG AS POSSIBLE ON ComputerA.

10 years

You have a computer named Computer1 that runs WIndows 10 and contains the following files: C:\Folder1|File1.bat C:\Folder1\File1.exe C:\Folder1\File1.cmd A user named User1 is assigned Read & execute to all the files. When user1 opens the command prompt, the prompt will open in what folder?

C:\Users\User1

You need to recommend a solution to configure the employee VPN connections. What should you include in there commendation?

Connection Manager Administration Kit (CMAK_

You have 100 computers that run WIndows 10. The computers are in a workgroup. The computers have a low-bandwidth metered Internet connection. You need to reduce the amount of Internet bandwidth consumed to download updated. What should you configure?

Delivery Optimization

You have a computer named COmputer1 that runs WIndows 10 and is joined to an Active Directory domain named adatum.com. A user named Admin1 signs signs in to Computer1 and runs the whoami command as shown in the following c:\users\admin1>whoami /user /groups /priv user information: user name SID Group Information: Group Name Everyone BULITIN\Users BULITIN\Administrators NT AUTHORITy\INTERACTIVE CONSOLE LOGON Type: Well-known group Alisas, Label. Group Privilege Name SESHUTDOWNPRIVILEGE On computer1, if the Admin attempts to open Device Manager what will happen?

Device Manager will open without a prompt

You have a computer named Computer1 that runs Windows 10. You text Windows updates on Computer1 before you make the updates available to other users at your company. You install a quality update that conflicts with a customer device driver you need to remove the Update from Computer1.

From System Restore, you revert the system state to a restore point that was created before the update was installed.

You need to sign in as LocalAdmin on Computer11. What should you do first?

From the LAPS UI tool, view the administrator account password for the computer object of Computer11.

Your company has an isolated network used for testing. The network contains 2-0 computers that run Windows 10. The computers are in a workgroup. During testing, the computers must remain in the workgroup. You discover that none of the computers are activated. You need to recommend a solution to activate the computers without connecting the network to the Internet. What should you include in the recommendation.

Key Management Service (KMS)

Technical Requirements: Users in the HR department must be able to view the list of files in a folder named D:\reports on Computer3. You need to met the technical requirements for the HR department users. Which permissions should you asssign to the HR department users for the D:\Reports folder? to answer, select the appropriate permissions in the answer area.

List folder /read data

You have a computer named Computer1 that runs Windows 10. You need to prevent standard users from changing the wireless network settings on Computer1. The solution must allow administrators to modify the wireless network settings. What should you use?

Local Group Policy Editor

Your company purchases 20 laptops that use a new hardware platform. In a test environment, you deploy Windows 10 to the new laptops. Some laptops frequently generate stop errors. You need to identify the cause of the issues. What should you use?

Reliability Monitor

Your company has a wireless access point that uses WPA2-Enterprise. You need to configure a computer to connect to the wireless access point. What should you do first?

Request and install a certificate

You need to ensure that User10 can activate Computer10. What should you do

Request that User10 perform a local AutoPilotReset on Computer10, and then activate Computer10.

Contoso, Ltd is a consulting company that has a main office in Montreal and two branch offices in Seattle and New York. Contoso has IT, human resources (HR), and finance departments. Contoso recently opened a new branch office in San Diego. All the users in the San Diego office work from home. Contoso uses Microsoft 365. The on-premises network contains an Active Directory domain named contoso. com. The domain is synced to Microsoft Azure Active Directory (Azure AD). All computers run Windows 10 Enterprise. You have four computers named Computer1, Computer2, Computer3, and ComputerA. ComputerA is in a workgroup on an isolated network segment and runs the Long Term Servicing Channel version of Windows 10. ComputerA connects to a manufacturing system and is business critical. All the other computers are joined to the domain and run the Semi-Annual Channel version of Windows 10. In the domain, you create four groups named Group1, Group2, Group3, and Group4. Computer2 has the local Group Policy settings shown in the following table. Policy: Access this computer from the network. Security setting: Group 1. Policy: Deny access to this computer from the network. Security Setting: Group 2. Allow log on through Remote Desktop Services Security Setting: Group 3. Deny log on through Remote Desktop Services Security Setting: Group4. The computers are updated by using Windows Update for Business. The domain has the users shown in the following table. Name:User1 Member of:Domain Admins, Domain Users. Name: user2 member of: administrators, domain users. name: user3 member of: account operators, domain users. name: user4 member of domain users name: user5 member of domain users, guests name: user6 member of group2, group3, domain users. Computer1 has the local users shown in the following table. Name: User11 member of administrators. user12 member of users. user13 member of guests. Requirements planned changed Contoso plans to purchase computers preinstalled with WIndows 10 Pro for all the San Diego office users. Technical requirements: contoso identifies the following technical requirements/ The computers in the San Diego office must be upgraded automatically to Windows 10 Enterprise and must be joined to Azure AD the first time a user starts each new computer. End users must not be required to accept the End User License Agreement (EULA). Helpdesk users must be able to troubleshoot Group Policy object (GPO) processing on the Windows 10 computers. The helpdesk users must be able to identify which Group Policies are applied to the computers. Users in the HR department must be able to view the list of files in a folder named D:\Reports on Computer3. ComputerA must be configured to have an Encrypting File System (EFS) recovery agent Quality update installations must be deferred as long as possible on ComputerA. users in the IT department must use dynamic look on the primary device. User6 must be able to connect to Computer2 by using Remote Desktop. The principle of least privilege must be used whenever possible. Administrative effort must be minimized whenever possible. Assigned access must be configured on Computer1. You need to meet the technical requirement for EFS on ComputerA. What should you do?

Run cipher. exe, and then add a certificate to the local Group Policy.

You need to meet the technical requirements for EFS on ComputerA. What should you do?

Run cipher.exe, and then add a certificate to the local computer certificate store.

You have a computer named Computer1 that runs Windows 7. Computer1 has a local user named User1 who has a customized profile on Computer1, you perform a clean installation of Windows 10 without formatting the drives. You need to migrate the settings of User1 from Windows7 to Windows 10. Which two actions should you perform?

Run loadstate.exe and specify the C:\Users subfolder. Run scanstate .exe and specify the C:\Windows old subfolder

You have a computer named Computer1 that runs Windows 7. Computer1 has a local user named User1 who has a customized proifle. On Computer1, you perform a clean installation of WIndows 10 without formatting the drives. You need to migrate the settings of User1 from Windows7 to WIndows 10. Which two actions should you perform?

ScanState and LoadState

You have a computer that runs Windows 10. From the Settings app, you view the connection properties shown in the followoing exhibit. Network Profile: Public Your PC is hidden from other devices on the network and cant be used for printer and file sharing. Shet as metered connection: ON. To enable Windows Remote Management (WinRM), you must first

Set the Network Profile to Private

Your network contains an Active Directory domain. The domain contains 1,000 computers that run Windows10. You discover that when users are on their lock screen, they see a different background image every day, along with tips for using different features in Windows 10. You need to disable the tips and the daily background image for all the Windows 10 computers. Which Group Policy settings should you modify?

Turn off all Windows spotlight features

You have a computer that runs Windows 10. From the Settings app, You view the connection properties shwon in the following exhibit. Network profile: Puble your PC is hidden from other devies on the network and can't be used for printer and file sharing. Set as metered connection : ON To ensure that microsoft OneDrive syncs, you must first?

Turn off metered connection

You have a computer named OCmputer1 that runs Windows 10 Computer1 is in a workgroup. Computer1 contains the folders shown in the following table. Folder1: Volume: C File System: NTFS Permission: Full control to everyone. Folder2: Volume C File System and volume are same. Folder3 Volume:D File System: NTFS Permission: Full control to Everyone On computer1, you create the users shown in the following table. User1 is a member of users. User2 is a member of Backup Operators, Users. User3 is a member of Cryptographic Operators, Users. User4 is a member of Administrators, Users. User1 encrypts a file named File1.txt that is in a folder named C:\Folder1. What is the effect of the configuration? To answer, select the appropriate options in the answer area. Who are the users that can move File1. txt to D:\Folder3.

User1 only

You plan to deploy WIndows 10 to 100 secure computers. You need to select a version of Windows 10 that meets the following requirements: Uses Microsoft Edge as the default browser, Minimizes the attack surface of the computer, Supports joining Microsoft Azure Active Directory (Azure AD), Only allows the installation of applications from the Microsoft Store. What is the best version to achieve the goal?

Windows 10 Pro in S mode

A user has a computer that runs Windows 10. When the user connects the computer to the corporate network, the user cannot access the internal corporate servers. The user can access servers on the INternet. You run the ipconfig command and receive the following otput. You send a ping request and successfully ping the default gateway, the DNS servers, and the DHCP server. Which configuration on the computer causes the issues?

the DNS servers

You need to recommend a solution to monitor update deployments. What should you include in there recommendation?

the Updated Compliance solution in Azure Log Analytics


संबंधित स्टडी सेट्स

7.3 International trade and access to markets

View Set

communicationsWhat does a receiver do to decode a message?

View Set

Programming 2 Final - Chapters 11, 12, 14

View Set

TRACCE (versione ufficiale) 2M PAROLE UTILI IN CLASSE II / NÜTZLICHE WÖRTER IM UNTERRICHT II

View Set