MD-100: Windows Client

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

As the Desktop Administrator for World Wide Importers, you want to create a workgroup for the Warehouse department. This workgroup will enable the warehouse staff to share files, network storage, printers, and any connected resource. What's the maximum number of computers that you can assign to this workgroup? -20 -40 -75

20 - A workgroup has a limit of 20 computers, all of which must be on the same local network.

What is the maximum length of a host name? -16 characters -32 characters -255 characters

255 characters - A host name is a user-friendly name that is associated with a host's IP address and identifies it as a TCP/IP host. A host name can be no more than 255 characters in length. It can only contain alphanumeric characters, periods, and hyphens.

What's the minimum RAM requirements to install or upgrade to Windows 11? -1 GB for 32-bit or 2 GB for 64-bit -4 GB -8 GB

4 GB - To install or upgrade to Windows 11, a device must have a minimum of 4 GB of RAM.

As an IT Support professional for Contoso, you're helping to configure the company's infrastructure to allow Device Registration. Which of the following prerequisites must you implement before you can enable Device Registration on your devices? -Each client machine must have a 64-bit operating system -Web Application Proxy must be set up -A DNS record for the host that's named "Enterpriseregistration"

A DNS record for the host that's named "Enterpriseregistration" - The name Enterpriseregistration is mandatory, and you can't change it. The DNS server must resolve this name to the IP address of the AD FS server. The AD FS server will then use it as one of its Subject Alternative Name attributes in the SSL certificate.

Holly Spencer is the Desktop Administrator for Fabrikam. Holly, who uses more than one Windows device, has bookmarked several websites in Microsoft Edge. As such, when Holly moves from one device to another, those bookmarks persist in the Favorites list on each device. Which of the following items makes this synchronization of settings possible? -A Microsoft Account -Focus Assist -A group policy

A Microsoft Account -Settings are persistent when using a Microsoft Account. This facilitates a common identity across devices. Settings are maintained as part of the Microsoft Account's profile data and are applied when signing into a device. As such, if a user bookmarks a website in Microsoft Edge, that bookmark will persist in the Favorites list when the user moves to another device.

As the Desktop Administrator for Fabrikam, Holly Spencer wants to add physical disks to a storage pool. Which of the following requirements do the disks need to satisfy? -Two physical disks are needed to create a storage pool -A minimum of two physical disks are needed to create a resilient mirror virtual disk -Disks must be blank but formatted

A minimum of two physical disks are needed to create a resilient mirror virtual disk -Creating a resilient mirror virtual disk requires a minimum of two physical disks.

Which DNS record type is used to resolve a host name with an IP address? -MX record -A record -CNAME record

A record - The most common record type in forward lookup zones is an A record, which is also known as a host record. This record is used when resolving a host name to an IP address.

When a permission or password is necessary to complete a task, UAC will notify you with one of three different types of elevation prompts. Which type of elevation prompt will you receive when the item has a valid digital signature that verifies that Microsoft is the publisher of this item? -A program that isn't part of Windows needs your permission to start -A program with an unknown publisher needs your permission to start -A setting or feature that's part of Windows needs your permission to start

A setting or feature that's part of Windows needs your permission to start - You'll receive this prompt when the item has a valid digital signature that verifies that Microsoft is the publisher of this item. If this type of dialog box displays, it usually is safe to continue. If you are unsure, check the name of the program or function to decide if it is something that you want to run.

Which of the following characteristics describes a Type 4 printer driver? -A single Type 4 driver can support multiple printer models -Type 4 driver packages are larger and more complex than Type 3 drivers -Type 4 drivers must download from a print server

A single Type 4 driver can support multiple printer models - Windows traditionally uses separate Type 3 printer drivers for each printer device model. However, a single Type 4 driver can support multiple printer models.

Patti Fernandez is a sales rep for Contoso. Contoso has enabled Device Registration, and Patti has enrolled her smartphone through the enrollment process. Patti is out of town on a sales trip. However, by using her smartphone, Patti can still access internal Contoso applications through the Internet. This scenario is made possible because of two services. One of them is the Web Application Proxy. What is the other service that works in conjunction with the Web Application Proxy to provide Internet access to internal company resources for an enrolled device? -AD DS -AD FS -Azure AD

AD FS - By implementing the Web Application Proxy component, you can enable registered devices to access company resources from external networks such as the Internet. A user can be in a coffee shop or at home, and if their device is registered, it can access internal applications through Web Application Proxy and AD FS. A company must set up AD FS before users can use the Device Registration feature on their devices. You must configure AD FS with a Secure Sockets Layer (SSL) certificate from a trusted CA, and the SSL certificate must have properly configured Subject Name and Subject Alternative Name attributes.

Which type of wireless network topology can connect wireless devices dynamically in a peer-to-peer configuration without the use of any infrastructure devices? -Ad hoc -Infrastructure -WPA2

Ad hoc - Ad hoc networks can connect wireless devices dynamically in a peer-to-peer configuration without the use of any infrastructure devices.

Which of the following items is a common disadvantage to using traditional VPNs? -You must enroll clients and then connect the clients to your on-premises securely through several network changes -All network traffic is tunneled over the VPN -It requires IPv6 and that clients be domain-joined

All network traffic is tunneled over the VPN -Traditional VPNs are an "all or nothing" solution. Once connected, all network traffic is tunneled over the VPN. This can lead to large amounts of bandwidth on the organization's network being consumed when it isn't necessary. The most notable example being remote users who frequently use publicly accessible websites and resources. They may need VPN access for one or two tasks, but inadvertently pass all internet traffic over the organization's network instead of directly through the end user's ISP.

Fabrikam's current VPN solution only supports IPv6, and its clients must be domain-joined. What VPN solution can Fabrikam migrate to that uses either IPv4 of IPv6 and supports non-domain joined devices? -Always On VPN -Direct Access -Conditional Access Framework

Always On VPN -Direct Access is Fabrikam's current VPN solution, since it requires IPv6 and that clients be domain-joined. Always On VPN is the successor to Direct Access. It can use either IPv4 or IPv6, and supports non-domain joined devices. Always On VPN also provides more granular controls over how traffic is routed and support for conditional access policies.

Wingtip Toys has a hybrid Exchange deployment. Wingtip employs an on-premises AD DS that supports its Exchange Server 2019 deployment. It also has a cloud-based Azure AD environment that supports Exchange Online in its Microsoft 365 tenant. What tool can Wingtip's Enterprise Administrator use to synchronize these AD DS and Azure AD services together to meet its hybrid identity goals? -Active Directory Rights Management Services (AD RMS) -Azure AD Connect -Active Directory Lightweight Directory Services (AD LDS)

Azure AD Connect - Administrators can synchronize AD DS and Azure AD together using the Azure AD Connect tool. Azure AD Connect enables IT to take advantage of the benefits each service has to offer. It's an on-premises Microsoft application that's designed to meet and accomplish an organization's hybrid identity goals.

Which feature in Windows 10 and 11 enables users to turn their device into a Wi-Fi hotspot? -Broadband tethering -Autotriggered VPN -Mobile broadband

Broadband tethering -With broadband tethering, you can turn your Windows 10 or later device into a Wi-Fi hotspot.

You're the Desktop Administrator for Northwind Traders. You want to use Windows PowerShell scripts to build automation and complex logic into management tasks. How can you provide this scripting functionality in PowerShell? -By running Windows PowerShell ISE -By running Windows PowerShell through a GUI that embeds the shell -By running the Windows PowerShell command-line interface

By running Windows PowerShell ISE -Windows PowerShell Integrated Scripting Environment (ISE) provides command-completion functionality, and enables you to see all available commands and the parameters that you can use with those commands. You also can use a scripting window within Windows PowerShell ISE to construct and save Windows PowerShell scripts. Windows PowerShell ISE also provides debugging tools that you can use to debug simple and complex Windows PowerShell scripts.

Fabrikam plans to upgrade more than 500 devices from Windows 8.1 Enterprise and Windows 10 Enterprise to Windows 11 Enterprise. Which of the following guidelines should Fabrikam employ to ensure the configuration of each device doesn't drift to a state that becomes a security risk? -Identify the necessary device drivers -Identify storage and network resources that you can use during deployment -Centralized management to identify the method or tools for deploying the -OS

Centralized management to identify the method or tools for deploying the OS -When an organization is managing more than 25 devices, centralized management should be considered to identify the method or tools for deploying the OS and applications. While this might seem like a low threshold, keep in mind that deployment isn't just about the delivery of an operating system and apps, but also continuous management. Specifically, ensuring that the device configuration does not drift to a state that becomes a security risk. Organizations should consider a management solution such as Microsoft Intune, whether they choose to manage devices themselves or contract with an IT management company.

Contoso's Engineering department typically uses smart cards for user authentication. Each engineer utilizes a smart card reader, which scans the chip on the user's card to authenticate the user. Which of the following authentication methods is used in conjunction with smart cards? -Kerberos version 5 protocol -Certificate mapping -NTLM

Certificate mapping -Typically, users utilize this method in conjunction with smart cards. The certificate that a smart card stores can link to a user account. Users utilize a smart card reader, which scans the card's chip to authenticate a user.

You migrated a website to a new server. One of your users reported that he received an "Unavailable" message when trying to access the website. However, other users that you checked with report that they can access the site with no problem. Which PowerShell cmdlet can you use that hay help resolve the issue? -Test-Connection -Clear-DnsClientCache -Register-DnsClient

Clear-DnsClientCache -The client may still be resolving the IP address of the old server. Therefore, clearing the client's resolver cache will force the client to ask the DNS server for the IP address.

Contoso's IT department wants to provide a consolidated and efficient virtual environment through virtual-machine compatibility with Windows Server. This design will enable them to use a single device to test applications and IT scenarios in multiple operating system configurations. Which of the following Windows 11 features should the IT department use to support this effort? -Windows Sandbox -Virtual secure mode -Client Hyper-V

Client Hyper-V - By using Client Hyper-V, IT departments can provide a consolidated and efficient virtual environment through virtual-machine compatibility with Windows Server. This environment can use a single device to test applications and IT scenarios in multiple operating system configurations.

You're an IT Support Professional for Contoso's business applications. A home-based user has requested support with an application. You tell the user to launch Quick Assist. Which of the following items is an option the user will have? -Save this invitation as a file -Send invitation to phone -Code from assistant

Code from assistant -The person providing the assistance will provide a one-time code to establish the connection, which the user requesting the help will enter in the Quick Assist app.

As the Desktop Administrator for Fabrikam, Holly Spencer wants to implement an on-premises management solution to manage desktops, servers, and laptops on the company's network or internet-based. Holly also intends to monitor compliance, query, and act on clients in real time. What tool will provide Holly with this functionality? -Desktop Analytics -Windows Autopilot -Configuration Manager

Configuration Manager - Configuration Manager is an on-premises management solution to manage desktops, servers, and laptops that are on your network or internet-based. You can cloud-enable it to integrate with Intune, Azure Active Directory (AD), Microsoft Defender for Endpoint, and other cloud services. Use Configuration Manager to deploy apps, software updates, and operating systems. You can also monitor compliance, query and act on clients in real time, and much more.

Mary is a sales rep for World Wide Importers. After one of Mary's co-workers retired, they attached the co-worker's old dot matrix printer to her Windows 10 laptop. They located a DVD with the print driver from her co-worker's left-over files, so they installed the DVD on her computer. Given the age of the printer, Mary had to attach it to a serial (COM) port on her computer. When Mary tried printing to the printer, Windows wouldn't detect the printer. Mary has never had their own printer before, so they're reluctant to throw it out. They know the printer works because they recently saw their co-worker use it before retiring. What should Mary do to try and get the printer to work? -Hit the side of the printer with a hammer -Reinstall the print driver -Configure a printer port manually

Configure a printer port manually - Windows can automatically detect printers when you connect them to your computer. Windows also installs the printer driver without interaction if the driver is available in the driver store. However, a Windows operating system may not detect network printers, or printers that you connect to older ports, such as serial (COM) or parallel (LPT) ports. In these cases, you must configure a printer port manually.

As the Desktop Administrator for Wingtip Toys, you have replaced a hard disk drive on one of your PCs. You began by partitioning the disk using the master boot record (MBR) scheme. What's the next step that you must complete before an operating system can use the disk? -Restart the PC to recognize the disk -Resize the partitions -Create and format one or more volumes on the disk

Create and format one or more volumes on the disk -After partitioning the disk, you must create and format one or more volumes before an operating system can use the disk.

As the Desktop Administrator for Trey Research, you were approached by members of the Engineering department regarding a sign-in issue. Each day the engineers access computers, CAD machines, and printers, in the company's Engineering workgroup. These machines are all running either Windows 10 or Windows 11. Every time they access one of these workgroup resources, they're prompted to enter their credentials. The engineers have found this continual entering of credentials to be very time consuming and annoying. What Windows tool can you use that will save each engineer's credentials on each resource so that they're not prompted each time they access computers in the Engineering workgroup? -Credential Manager -Windows Hello using Biometrics -Web Credentials

Credential Manager - The Credential Manager utility is built into Windows Control Panel. Credential Manager saves the credentials that users enter when accessing other computers and resources on local networks. In doing so, users aren't prompted each time they access other computers. Credential Manager can also be used to back up and restore those credentials.

Which variation of the UAC elevation prompt is displayed to standard users when they attempt to perform an administrative task? -Consent prompt -Credential prompt -Approval prompt

Credential prompt - Users elevate only to perform tasks that require an administrator access token. When a standard user attempts to perform an administrative task, UAC prompts the user to enter valid credentials for an administrator account. This is the default for standard user-prompt behavior.

Contoso recently purchased solid state drives (SSDs) for the laptops used by its Sales team. What method of defragmentation should the Sales team members periodically complete to defragment their new drives and maintain optimum performance? -Run the Defragment and Optimize Your Drives tool -Run the Disk Cleanup feature (cleanmgr.exe) -Defragmentation is not needed on SSDs

Defragmentation is not needed on SSDs -Defragmentation is not needed on SSDs, as they work quite differently from traditional hard disk drives. The Windows Storage Optimizer subsystem automatically uses TRIM to mark data blocks as not being used and optimize the drive. While the Optimize Drives UI does not distinguish between defragmentation and retrimming, Windows detects the drive type and runs the appropriate optimization task when needed.

As the new Desktop Administrator for Northwind Traders, Alan Deyoung is trying to fix some of the security issues left behind by his predecessor. One such practice directed users to sign in to their computers with the Administrator account. Alan discovered that this policy led to malicious users gaining access to server and client computers. What should Alan do to resolve this issue with each device? -Delete the Administrator account and have users sign in with the Default Account -Lock out the Administrator account and have users sign in using the Local Service account -Disable the Administrator account and have users sign in with a local account that's a member of the Administrators group

Disable the Administrator account and have users sign in with a local account that's a member of the Administrators group - Because the Administrator account is known to exist on many versions of the Windows operating system, it's a best practice to disable the Administrator account when possible to make it more difficult for malicious users to gain access to the server or client computer. Then create a local account that's a member of the Administrators group. Members of the Administrators groups can run apps with elevated permissions without using the "Run as Administrator" option.

What does AD DS use for locating resources such as domain controllers? -Domain Name System -LDAP -Kerberos

Domain Name System -AD DS uses Domain Name System (DNS) for locating resources such as domain controllers.

What does AD DS use to perform authentication for computer accounts during the startup process and for user accounts when the user signs in? -Domain controllers -LDAP calls -Group policy objects

Domain controllers -The sign-in process authenticates both the computer and user accounts. In an AD DS environment, domain controllers perform authentication for computer accounts during the startup process and for user accounts when the user signs in.

As the Desktop Administrator for Fabrikam, Holly Spencer wants to link the custom GPOs that she creates to AD DS containers. This will enable her to apply customized settings to the objects in those containers. Which of the following AD DS containers can Holly apply GPOs to? -Domains container -Computers container -Users container

Domains container -GPOs can be applied to AD DS sites, domains, and organizational units (OUs). This is referred to as linking. GPOs can't be linked to the default Computers or Users containers in AD DS.

Which of the following characteristics of VPN connections allows data to traverse the transit network? -Authentication -Data encryption -Encapsulation

Encapsulation -With VPN technology, private data is encapsulated with a header that contains routing information, which allows the data to traverse the transit network.

When troubleshooting basic network connectivity with devices, which is a unique factor with wireless networks that's generally not a factor when troubleshooting wired networks? -Physical connection distance -Encryption settings -Interference

Encryption settings -Encryption is typically not a factor when troubleshooting basic network connectivity.

You are the IT Support professional for Contoso, a large enterprise organization that's a Microsoft Volume License customer. Contoso needs to deploy a set of Windows 11 computers for an isolated office that won't be managed for at least six months. Which of the following Windows 11 editions would be the best to deploy given Contoso's requirements? -Pro edition -Enterprise edition -Enterprise LTSC edition

Enterprise LTSC edition -The Enterprise LTSC edition is available to Volume License customers. What differentiates it from the Enterprise edition is that Enterprise LTSC is designed not just for large enterprise organizations, but for organizations with restrictive change requirements. Since this version does not receive feature updates, it would be the best solution for Contoso's isolated office that won't be managed for at least six months.

Fabrikam is a large Microsoft Volume License customer with a complex IT infrastructure. From a device management perspective, its IT department wants to choose the pace at which it adopts new technology for user devices. It also requires a broad range of options for operating system deployment and device and app management. Which of the following Windows 10/11 editions allows Fabrikam to meet these IT requirements? -Pro edition -Pro for Workstations -Enterprise edition

Enterprise edition - Enterprise edition builds on the features of Pro edition, with additional features that meet the needs of large enterprises. Enterprise edition is available to Volume Licensing customers only. They can choose the pace at which they adopt new technology. Enterprise edition also supports a broad range of options for operating system deployment and device and app management.

As Contoso's Desktop Administrator, you want to complete an in-place upgrade to upgrade a Windows 8.1 Enterprise device to Windows 11 Enterprise. What steps should you take to complete this upgrade? -Evaluate, Back up, Upgrade, Verify, Update -Evaluate, Set up, Upgrade, Update, Verify -Evaluate, Back up, Upgrade, Update, Verify

Evaluate, Back up, Upgrade, Verify, Update -When upgrading from Windows 8.1 to Windows 11 on a single device, performing an in-place upgrade is the easiest way to upgrade Windows. The in-place upgrade process includes the following steps: 1) Evaluate whether the device meets the minimum OS requirements, 2) Back up existing data to a secure location, 3) complete the (in-place) Upgrade, 4) after the upgrade is complete, Verify that all the applications and hardware devices function correctly, and 5) Update the Windows OS with any relevant updates.

As a sales rep for Tailspin Toys, Patti Fernandez gives numerous presentations each day on her Windows 11 laptop. Patti finds it extremely distracting when notifications pop up in the middle of presentations. Which Windows 11 feature enables Patti to suppress notifications, except for priority notifications from selected individuals in her Contact list? -Focus Assist -Show notifications on the lock screen -Control Panel

Focus Assist - While notifications can be helpful in managing the users day, they can be distracting in scenarios such as focusing on a particular task or giving a presentation. Focus Assist allows users to suppress these notifications. It can also be used to configure priority notifications. Examples include communications from specific people in your contact list, telephone calls, and notifications from specific apps.

As the Desktop Administrator for Contoso, Holly Dickson wants to configure the company's new batch of Windows 11 laptops with the same power plan. Holly wants to select the power plan that keeps the system's disk drive, memory, and processor continuously supplied with power. Which power plan should Holly configure on each of the new devices to meet this requirement? -Balanced -Power saver -High performance

High performance -The High performance power plan keeps the system's disk drive, memory, and processor continuously supplied with power. It requires the highest energy usage of the available power plans, and it sets the screen at its highest brightness.

Tailspin Toys is a small organization with approximately 25 client computers. George works in the company's Accounting department, but given his background with Excel and other business-related computer software, he's also considered the company's "computer" guy. George is the person who everyone turns to when an issue occurs with a computer, printer, or the company's fax machine and telephone system. George wants to upgrade several of Tailspin's older Window devices with Windows 11 as quickly and as easily as possible. Which of the following deployment strategies should George implement to achieve this goal? -High-touch deployment with a standard image -Lite-touch deployment -High-touch deployment with retail media

High-touch deployment with retail media -The high-touch with retail media deployment strategy is suitable for small organizations that do not have information technology (IT) staff, or have IT staff members without deployment experience. Such organizations typically have fewer than 100 client computers. This strategy is the simplest way to deploy Windows. Insert the Windows media and run the setup program. It is a manual installation that requires you to answer each prompt in the setup program.

As the Enterprise Administrator for Contoso, Holly Dickson recently deployed several new Windows 11 computers. George, who was a recipient of one of those new computers, complained to Holly that he was unable to access the local computer or network resources. Which of the following items could be causing the authentication failures that George has been experiencing? -Holly didn't properly configure the list of DNS servers on George's computer -George didn't reauthenticate his user account by restarting the computer -Holly didn't assign George to an Active Directory security group

Holly didn't properly configure the list of DNS servers on George's computer -If you don't properly configure the list of DNS servers on a Windows client computer, it can't obtain a list of domain controllers. This will result in authentication failures, in which case the user can't access the local computer or network resources.

What's the recommended way to move from Windows 8.1 to Windows 10? -In-place upgrade -In-place upgrade using feature update -Side-by-side migration

In-place upgrade - The in-place upgrade is the recommended way to move from Windows 8.1 to Windows 10. You perform an in-place upgrade when you want to replace an existing Windows and wish to retain all user applications, files, and settings. Following the in-place upgrade, the Windows installation program retains all user settings, data, hardware device settings, applications, and other configuration information from the previous version of Windows.

Which Modern deployment option uses Windows Setup to update the OS and migrate apps and settings? -Windows Autopilot -Subscription activation -In-place upgrade

In-place upgrade -In-place upgrade uses Windows Setup to update your OS and migrate apps and settings.

Contoso has a large number of devices running Windows 8.1. It wants to upgrade these devices to Windows 11 while retaining all user applications, files, and settings. Which of the following installation methods should Contoso use? -Upgrade with Feature update -In-place upgrade using image-based upgrade -Refresh using the Reset this PC feature

In-place upgrade using image-based upgrade - Larger organizations typically use tools like Endpoint Configuration Manager and a pre-defined image to initiate an in-place upgrade. This method is recommended for upgrading existing Windows 8.1 devices to Windows 10 or later. During an in-place upgrade, the Windows installation program automatically retains all user settings, data, hardware device settings, apps, and other configuration information.

As the Desktop Administrator for Contoso, you enabled UAC on all the company's Windows 11 computers to prevent users from installing unauthorized software. Which of the following tasks can a standard user perform without receiving a UAC prompt? -Install drivers from Windows Update -Install drivers for a device Copy or move files into the Program Files or Windows directory

Install drivers from Windows Update -A standard user won't receive a UAC prompt when installing drivers from Windows Update or those that are included with the operating system.

As the Desktop Administrator for Contoso, you enabled UAC on all the company's Windows 11 computers to prevent users from installing unauthorized software. However, some of the users are local Administrators on their computers. Which of the following tasks will generate a UAC consent prompt for these users? -Use Remote Desktop to connect to another computer -Install software and drivers -Connect and configure a Bluetooth device

Install software and drivers - Installing and uninstalling an application will generate a UAC consent prompt for a local Administrator account.

Holly Dickson, Contoso's Desktop Administrator, installed a new USB printer to her Windows 11 laptop. After attaching the printer, Holly installed the printer driver. Everything seems in order, but Holly can't get the printer to function properly. What should Holly do? -Return the printer. -Unattach the printer, remove the device driver, and then reinstall each. -Install the printer driver before attaching the printer.

Install the printer driver before attaching the printer. - Some USB printers require that you install the printer driver before you attach it. Failure to follow this procedure can result in the printer not functioning correctly. Check the product documentation before attaching the printer to your computer.

Which type of disk fragmentation occurs when disk space is over-provisioned and then not used by an application? -Internal fragmentation -External fragmentation -Data fragmentation

Internal fragmentation -Internal fragmentation occurs when disk space is over-provisioned and then not used by an application. Disk space is provisioned into fixed-sized units, so any portion of a unit that's unused is a leftover fragment.

Which of the following versions of Windows 10 and later is designed to run a single app on fixed purpose devices, such as automated teller machines, point-of-sale terminals, and industrial and medical devices? -IoT Core edition -Pro for Workstations -IoT Enterprise edition

IoT Core edition -The IoT Edition of Windows is designed for fixed purpose devices, such as automated teller machines, point-of-sale terminals, and industrial and medical devices. Windows 10 IoT Core is a smaller OS designed to run a single app, while Windows 10/11 IoT Enterprise is a full version of Windows Enterprise with specialized features.

As the Enterprise Administrator for World Wide Importers, Patti Fernandez deployed AD DS on an Azure virtual machine to enable scalability and availability for an on-premises AD DS. What's one of the repercussions of deploying AD DS on an Azure virtual machine? -Authentication will be very slow -You can't use drive C for AD DS storage -It doesn't make any use of Azure AD

It doesn't make any use of Azure AD -You can deploy AD DS on an Azure virtual machine to enable scalability and availability for an on-premises AD DS. However, deploying AD DS on an Azure virtual machine doesn't make any use of Azure AD.

Device Registration works by using the Device Registration Service. When a user registers a device through the enrollment process, the Device Registration Service provisions a certificate for the device. What's the purpose of this certificate? -It's used to authenticate the device when it accesses internal resources -It enables the device to access company resources from external networks such as the Internet -So the user isn't prompted for credentials each time they try to access a company resource

It enables the device to access company resources from external networks such as the Internet -This item is why you would enable the Web Application Proxy component

GPOs are applied in a consistent order that enables organizations to predict which settings are effective when there are conflicting settings in GPOs that apply to a user or computer. What's the order in which GPOs are applied - from first to last? -Site GPOs, Local GPOs, OU GPOs, Child OU GPOs, Domain GPOs -Child OU GPOs, OU GPOs, Domain GPOs, Site GPOs, Local GPOs -Local GPOs, Site GPOs, Domain GPOs, OU GPOs, Child OU GPOs

Local GPOs, Site GPOs, Domain GPOs, OU GPOs, Child OU GPOs -GPOs are applied from the least influential objects to the greatest influential objects in an AD DS environment. A local GPO is the least influential object. That's followed by sites, then domains, then OUs, and then child OUs. Any policies that link to child OUs process last.

As the Desktop Administrator for Fabrikam, you must set up an account that will be used to sign-in to a Windows 11 PC. This account must be able to synchronize files with OneDrive. What type of account should you create? -Domain Account -Local Account -Microsoft Account

Microsoft Account -A Microsoft Account (formerly Windows Live ID) enables a user to have easier access to Microsoft's services. If you have ever used services such as Xbox Live, Hotmail, Outlook.com, OneDrive, or Windows Messenger, you already have a Microsoft Account. Microsoft has combined all their services together, which allows a user to access them with a single account. Just one email address and password are used for all these services.

What's the default browser in Windows 10 and Windows 11? -Internet Explorer -Microsoft Edge -Microsoft Edge Chromium

Microsoft Edge Chromium -Microsoft Edge Chromium is the default browser for Windows 10 or later. The legacy version of Microsoft Edge (non-Chromium) is no longer being developed. Chromium is a free and open-source web browser project. Microsoft Edge and many other browsers are based on the Chromium codebase.

Lucerne Publishing has experienced a rash of security issues related to device management. It wants to control how the organization uses devices, including mobile phones, tablets, and laptops. The company has decided that it wants to prevent emails from being sent to people outside the organization. And while the company allows selected employees to use their personal devices for work, it wants to ensure the organization's data stays protected. It also wants to isolate organization data from personal data. What tool should Lucerne Publishing implement to provide these device management features? -Client Hyper-V -Configuration Manager -Microsoft Intune

Microsoft Intune - Microsoft Intune controls how your organization's devices are used, including mobile phones, tablets, and laptops. It can also configure specific policies to control applications. For example, you can prevent emails from being sent to people outside your organization. Intune also allows people in your organization to use their personal devices for school or work. On personal devices, Intune helps make sure your organization's data stays protected and can isolate organization data from personal data.

You're configuring a Windows 10 desktop computer. You added a new hard disk drive to the computer. You want to configure the drive to support quotas so that you can track and control disk-space usage. Which file system should you format the new drive with? -FAT -NTFS -ReFS

NTFS -NTFS supports the use of disk quotas, which enable you to specify the amount of disk space that is available to a user. When you enable disk quotas, you can track and control disk-space usage. You can configure whether to allow users to exceed their limits and configure Windows to log an event when a user exceeds a specified warning level or quota limit.

When comparing NTFS and FAT file systems, which of the following features is unique to NTFS? -NTFS uses smaller clusters to reduce space wastage on hard disks -NTFS supports file encryption -You can format floppy disks with NTFS

NTFS uses smaller clusters to reduce space wastage on hard disks -NTFS manages disk space more efficiently than FAT by using smaller cluster sizes. For example, a 30-GB NTFS volume uses 4-KB clusters. The same volume formatted with FAT32 uses 16-KB clusters. Using smaller clusters reduces space wastage on hard disks.

Your organization recently upgraded to Windows 10 from Windows 8.1. You want to use a familiar, wizard-driven tool to configure wired and wireless connections. Which tool should you use? -Network and Internet -Network and Sharing Center -Windows PowerShell

Network and Sharing Center -The Network and Sharing Center provides a clear view of the status for any wired or wireless connection. You can use it to create additional network connections by using a wizard-driven interface. The Network and Sharing Center also provides links for accessing other network-related tools.

As the Desktop Administrator for Northwind Traders, you've been receiving reports that your clients are having trouble connecting to a server. Which command or PowerShell cmdlet should you use to check whether your DNS server has the correct IP address for the target host? -Ipconfig /displaydns -Get-DnsClient -Nslookup

Nslookup -The NSLookup command line tool displays information that you can use to diagnose your Domain Name System (DNS) infrastructure. Before using this tool, you should be familiar with how DNS works. The nslookup command-line tool is available only if you have installed the TCP/IP protocol.

Which method of Windows activation associates the Windows operating system to the computer system BIOS, which means the license can't be transferred to another computer? -Retail -OEM -Microsoft Volume Licensing

OEM -OEM system builders typically sell computer systems that include a customized build of Windows. You can perform OEM activation by associating the Windows operating system to the computer system BIOS, which means that you can't transfer this license to another computer.

As the Desktop Administrator for Adventure Works Cycles, you have been monitoring storage usage on several tablets that have limited storage space. Which category of storage usage enables you to select which folders synchronize to these devices to save disk space? -Apps and Games -OneDrive -System and Reserved

OneDrive -The OneDrive category enables you to select which folders synchronize to the device to save disk space. This is particularly useful on devices with limited storage space, such as tablets.

As the Desktop Administrator for Woodgrove Bank, Alan Deyoung wants to create a custom Start menu layout for their fleet of Windows 10 devices. However, Alan also wants to provide flexibility by allowing users to customize the Start menu layout that he creates. Which type of Start menu layout should Alan create that meets this requirement? -Universal layout -Full layout -Partial layout

Partial layout -Partial layout should be used in scenarios where you want to leverage layout, but still provide flexibility for end users to customize the layout.

Contoso wants to use Miracast wireless technology in its conference rooms. This technology will enable users to project their screen to conference room TVs, projectors, and streaming media players that also support Miracast. This will enable the users to share what they're doing on their PC or present a slide show on to a larger screen. However, when setting up their conference rooms, Contoso realized that some of the rooms are using older displays that don't support Miracast. What's the most efficient thing that Contoso can do so that its users can project on to these older display devices and still take advantage of the Miracast technology? -Plug a Miracast adapter into the display device's HDMI port -Wire their PC to the display device -Contoso will need to replace these older display devices with devices that support Miracast

Plug a Miracast adapter into the display device's HDMI port - In order to use Miracast, both the source and target device's hardware and OS must support Miracast. If the display you'll project to doesn't support Miracast, you'll need to plug a Miracast adapter (sometimes called a "hardware guard") into the device's HDMI port.

Contoso uses virtual hard disks, which are an integral part of its Client Hyper-V virtual machine environments. Which of the following items is an advantage of using virtual hard disks? -Performance -Portability -Physical failures

Portability - An advantage to using virtual hard disks is portability. Virtual hard disk files may be easier to move between systems, particularly when you use shared storage.

While ReFS was built on NTFS, it's designed to provide the highest level of resiliency, integrity, and scalability, regardless of software or hardware failures. Which of the following features is unique to ReFS when compared to NTFS? -ReFS allows you to control file permissions -ReFS allows you to configure auditing -ReFS periodically scans volumes and tries to automatically correct any corruption

ReFS periodically scans volumes and tries to automatically correct any corruption - ReFS periodically scans volumes. If it detects corruption, ReFS tries to correct the corruption automatically. If it can't repair the corruption automatically, ReFS localizes the salvaging process to the corruption area. This doesn't require any downtime for the volume.

What benefit does multicast provide? -Reduces bandwidth consumption by sending the same information to multiple computers at once -Allows one device to talk to multiple devices -Increases the network speed

Reduces bandwidth consumption by sending the same information to multiple computers at once - Multicast can send a single packet of information to multiple computers, instead of sending the same packet of information repeatedly to multiple computers.

Adventure Works Cycles has an older Windows 8.1 device that it wants to replace with a new device running Windows 11. The Desktop Administrator for Adventure Works wants to replace the current device by running a side-by-side migration to its replacement device. The Desktop Admin has completed the first three steps in the migration process. The user data and application settings on the source device were backed up to a network location. The Windows 11 OS was installed, and the most current Windows updates were installed. What's the next step that must be completed in the migration process? -Restore application and user-related settings on the new device -Use OneDrive to synchronize user files and settings between devices -Reinstall all applications

Reinstall all applications - After the Windows OS and Windows updates have been installed, the next step in the side-by-side migration process is to reinstall all applications. Performing an upgrade by using a clean installation and migration process doesn't migrate the installed applications. When you complete the Windows installation, you must reinstall all applications. Windows may block the installation of any incompatible programs. To install any of these programs, contact the software vendor for an updated version that is compatible with the OS version installed.

Northwind Traders wants its IT Support staff to be able to take control of a computer to troubleshoot and perform maintenance tasks without having to physically travel to the problematic machine. Northwinds wants to limit its IT Support staff to troubleshoot remote computers, but not telecommute or access files or folders. Which service that's bundled with Windows provides this functionality? -Remote Assistance -System Center Virtual Machine Manager -Remote Desktop Services

Remote Assistance -Remote Assistance is a bundled service with Windows. It enables a technician to take control of a computer to troubleshoot and perform maintenance tasks without having to physically travel to the problematic machine. This enables the technician to resolve problems without leaving their home or office. The end user must be there to authorize this, and the user can end the session at any time. This technology is generally used only to troubleshoot remote computers and is not used for telecommuting or accessing files or folders.

Tom is an IT Support Professional for Fabrikam. One of the users that Tom supports isn't able to make a remote desktop connection to a Windows 10 computer. The user keeps receiving an Access Denied error. Tom must confirm whether the user's account has permissions to make a remote desktop connection. Which security group on the Windows 10 computer is the best choice for Tom to set the user's account to be a member of? -Remote Management Users -Remote Desktop Users -Administrators

Remote Desktop Users -As a member of the Remote Desktop Users group, users will have the appropriate permissions to connect. While the Administrators group also provides these permissions, it provides much more access than is required to meet the request. As such, Remote Desktop Users is a better choice than Administrators.

Contoso recently purchased a new PC for use by its Sales team. Each Sales team member will be able to access the PC remotely from their laptops. Contoso's Desktop Administrator joined the new PC to Azure AD. What additional configuration is needed so that Sales staff can access it remotely from their own PCs? -Remote connections must be allowed for the local Authenticated Users group -Remote Assistance connections must be enabled for the PC -No additional configuration is needed

Remote connections must be allowed for the local Authenticated Users group - If the user who joined the PC to Azure AD is the only one who is going to connect remotely, no additional configuration is needed. However, to allow additional users to connect to the PC, you must allow remote connections for the local Authenticated Users group.

Adventure Works Cycles has some Windows 10 devices that have been experiencing issues such as not responding, frequent errors, and running slow. As the Desktop Administrator for Adventure Works, you don't want to spend significant time troubleshooting these issues, especially since they don't appear to have anything in common that could help expedite the troubleshooting process. Instead of troubleshooting the root cause of these issues, what Windows 10 feature can you use to revert the machines back to their original state of the image that was used to install Windows? -In-place migration -Reset this PC -Side-by-side migration

Reset this PC - A Windows 10 or 11 device may begin having problems such as not responding, frequent errors, or just runs slow. Refreshing the OS can often be easier than spending significant time trying to troubleshoot the root cause. Windows 10 and later provides a feature called Reset this PC. Reset this PC essentially reverts the machine back to its original state of the image that was used to install Windows. When resetting the PC, the Windows OS will reinstall.

As the Desktop Administrator for Tailspin Toys, Alan Deyoung wants to create storage spaces from storage pools. When configuring storage layout, which option should Alan select that has data striping but no redundancy? -Simple -Two-way and three-way mirrors -Parity

Simple - A simple space has data striping but no redundancy. In data striping, logically sequential data is segmented across all disks in such a way that provides access for these sequential segments to different physical storage drives. Striping makes it possible to access multiple segments of data concurrently.

Fabrikam has enabled Device Registration. After a Fabrikam user enrolls a device, why is the device object created in AD DS? -So that a company Group Policy can be applied to the device -So the user won't have to enter credentials every time they access internal websites and company apps -So that the registered devices can access company resources from external networks such as the Internet

So the user won't have to enter credentials every time they access internal websites and company apps -The device object in AD DS establishes a link between the user and the device. This enables the device to be used as a second form of authentication. Administrators can then configure which apps the user can access from the device without entering credentials, and they can ensure that company policies and security applies to the device by configuring a device policy.

Some of the users in your organization are running out of disk space. You've identified that each of these users has unallocated free space on a different disk in their computer. What volume would add space to their existing volume? -Mirrored volumes -Spanned volumes -Striped volumes

Spanned volumes - A spanned volume joins areas of unallocated space on at least two and at most 32 disks into a single logical disk. This design gives users the option to gather noncontiguous free space from two or more disks into the same volume.

Contoso has a large fleet of computers that it wants to manage more efficiently. Contoso is looking to implement a solution that will simplify deployment of new and replacement computers, provide consistent applications and hardware across the enterprise, and simplify inventory and software development. What should Contoso use that will satisfy these requirements? -Standard operating environment -Windows as a Service -Autotriggered VPN

Standard operating environment - To more efficiently manage a large fleet of computers, enterprises often use one or more standard operating environments (SOEs). An SOE is a set operating system, application, and hardware configuration. The benefits of an SOE include simplified deployment of new and replacement computers, consistent applications and hardware across the organization, simplified inventory, simplified updating, and simpler software development.

As the Desktop Administrator for Lucerne Publishing, Patti Fernandex wants to implement a high‐speed network that connects computer systems or host servers to high-performance storage subsystems. Patti wants to enable multiple servers to access a pool of storage in which any server can potentially access any storage unit. Which type of external storage system should Patti deploy to satisfy these requirements? -Network-Attached Storage -Direct-Attached Storage -Storage Area Networking

Storage Area Networking -SAN is a high‐speed network that connects computer systems or host servers to high-performance storage subsystems. A SAN enables multiple servers to access a pool of storage in which any server can potentially access any storage unit. Because a SAN is a network, you can use a SAN to connect many different devices and hosts and provide access to any connected device from anywhere.

As the Desktop Administrator for Contoso, Holly Dickson wants to implement storage virtualization in both Windows Server and Windows clients. Holly wants to add physical disks of any type and size to a storage pool, and then create highly available virtual disks from the storage pool. What feature should Holly employ to provide this functionality? -Block virtualization -Storage Spaces -File virtualization

Storage Spaces - Storage Spaces is a storage virtualization capability that is available in both Windows Server and Windows client. You can use Storage Spaces to add physical disks of any type and size to a storage pool, and then create highly available virtual disks from the storage pool.

Which of the following items is a collection of one or more physical disks that can be use to create virtual disks? -Storage space -Mirror space -Storage pool

Storage pool - A storage pool is a collection of one or more physical disks that you can use to create virtual disks. You can add all nonformatted physical disks and disks that do not have an attachment to another storage pool to a storage pool.

Which Windows 11 feature provides users with a one-stop shop for notifications to see what's going on with apps and other programs from across their devices? -Group Policy -Focus Assist -The Action Center

The Action Center - The Action Center is your one-stop shop for notifications to see what's going on with apps and other programs from across your device. You can also get web notifications in your Action Center from Microsoft Edge sites. The Action Center is fully customizable. On the Notifications and actions tab, you can enable and disable what notifications you see in the Action Center, and select which quick actions are available.

The local storage needs upgrading for a 64-bit, Windows 10 laptop. The Windows 10 client runs on a motherboard with BIOS firmware and requires an MBR-partitioned system disk. The upgrade for the local storage for this laptop will be a 6 TB removable disk. You have decided to configure it as a GPT disk. Will you encounter any problems? -The GPT partition style can't be used on removable disks -You can't boot from GPT disks on BIOS systems running 64-bit Windows operating systems -The protective MBR doesn't protect GPT disks from previously released MBR disk tools, which makes them vulnerable to incidental data loss

The GPT partition style can't be used on removable disks - GPT disks address the limitations of MBR disks. However, you can't use the GPT partition style on removable disks.

Your organization has recently upgraded the network to support IPv6. Which of the following features is unique to IPv6 addresses? -Smaller, more efficient address space than IPv4 -The IPv6 address space is more efficient for routers -URL filtering

The IPv6 address space is more efficient for routers - The IPv6 address space is more efficient for routers due to its hierarchical addressing and routing infrastructure. This design means that even though there are many more addresses in IPv6 than IPv4, routers can process data much more efficiently because of address optimization.

Your network administrator has asked you to verify that a Windows client computer in your Houston office has network connectivity to a file server at the Chicago office. You need to provide detailed statistics on delay and packet loss on the individual steps, or hops, through the network routers. Which command or tool should you use? -The Pathping command -The Ping command -The Tracert tool

The Pathping command - The Pathping command traces a route through the network in a manner similar to the Tracert tool. However, Pathping provides more detailed statistics on the individual steps, or hops, through the network. The command can provide greater detail because it sends 100 packets for each router, which enables it to establish trends.

As the Desktop Administrator for Northwind Traders, Patti Fernandez wants to manage multiple printers and print servers from a single interface. Patti also wants to manage them remotely. Which Windows feature should Patti use that provides this functionality? -The Print Server admin center -The Print Management Console -Device Manager

The Print Management Console - Windows includes the Print Management Console in the Administrative Tools. You can connect to Windows-based print servers through the Print Management Console and manage them remotely. The Print Management Console provides a single interface through which you can administer multiple printers and print servers and perform management tasks.

As Northwind Traders' Desktop Administrator, you have been gradually upgrading the company's Windows 8.1 devices to Windows 11. In doing so, you noticed that many of the Control Panel functions in Windows 8.1 have been moved to a new location in Windows 11. Which Windows 11 feature replaces many of the configurable actions that were previously in the Control Panel? -System Center Configuration Manager -The Settings app -Orchestration groups

The Settings app -Windows 11 continues to use many of the same computer controls that previous Windows versions have included, such as the Control Panel. However, in Windows 11, many of the Control Panel functions are available in the Settings app. The Settings app contains several settings that you can use to configure your device.

World Wide Importers requires control over the web apps that users can access from their devices. The company has deployed Device Registration. Which of the following tasks will occur after a user registers and enrolls a device? -The device is associated with the user's account in the company directory -An email is sent to the user verifying the device enrollment -The web apps are added as bookmarks in the device's browser

The device is associated with the user's account in the company directory -After a user enrolls a device, the following steps occur: 1) The device is associated with the user's account in the company directory, 2) The device object is created in AD DS, and 3) The user certificate is installed on the device.

As the Desktop Administrator for Wingtip Toys, Holly Spencer has been managing the storage resources on a laptop that seems to consistently run low on available disk space. The disk on this device uses NTFS-formatted volumes, so Holly has been taking advantage of NTFS folder compression. Holly recently copied several compressed files to an uncompressed folder within an NTFS partition. What happened to the compression state of the compressed files? -The files were automatically uncompressed after being copied to the target folder -The files remained compressed after being copied to the target folder -Nothing. Holly was prohibited from copying the files because their compression state didn't match the compression state of the target folder

The files were automatically uncompressed after being copied to the target folder -When copying a file or folder within an NTFS partition, the file or folder inherits the compression state of the target folder. For example, if copying a compressed file or folder to an uncompressed folder, the file or folder is uncompressed automatically.

Windows client supports three versions of FAT: FAT, FAT32, and exFAT. There are several differences between these versions. For example, one difference is the size of the largest supported volume. Another difference is the maximum file size. Which of the following items is another difference between these three FAT versions? -You can only convert exFAT to NTFS -The maximum number of files and folders that you can create on the volume -FAT32 is the only version of FAT that NTFS can be converted to

The maximum number of files and folders that you can create on the volume -The main difference between the three versions is the size of the largest supported volume, the default cluster size, and the maximum number of files and folders that you can create on the volume.

Northwind Traders is a small importer and exporter of fine gems. Northwind created a small business network that supports the 802.11n and 802.11ac wireless standards. It also supports the WPA-Personal security model. A company visitor recently complained that while they could see the company's guest network, they couldn't connect to it. Which of the following items may be a cause of this issue? -The guest's device doesn't support the 802.11x standards -The guest's device doesn't support WPA -The visitor entered an incorrect password when trying to connect to Tradewind's guest network

The visitor entered an incorrect password when trying to connect to Tradewind's guest network -The WPA security model involves providing a security password. The visitor won't be able to connect to Northwind's wireless network if they enter the wrong password.

Brexton is the Desktop Administrator for World Wide Importers. In the past, the company has employed a more traditional fixed storage allocation method, in which it allocated large pools of storage capacity that often remained unused. Brexton wants to change methodologies from this traditional method to one that optimizes the utilization of available storage. In other words, they only want the allocation of storage space to occur when datasets grow to require the storage. Which of the following provisioning schemes should Brexton employ? -Parity -Fixed provisioning space -Thin provisioning space

Thin provisioning space - Thin provisioning is a mechanism that enables the ability to allocate storage when the storage space needs it. The storage pool organizes the storage capacity into provisioning slabs. The allocation does not happen until the point when datasets grow to require the storage. As opposed to the traditional fixed storage allocation method, in which you might allocate large pools of storage capacity that remain unused, thin provisioning optimizes utilization of available storage.

Contoso recently purchased a new Windows 11 device that came with the Windows Pro edition installed. Since Contoso uses the Windows Enterprise edition on all its devices, it must change the Windows edition on the new machine from Pro to Enterprise. How can Contoso complete this edition upgrade? -Manually enter a product key for Windows Enterprise -Use a provisioning package -Purchase a Windows Enterprise license from the Microsoft Store

Use a provisioning package -There are several supported methods of upgrading from Windows Pro to Enterprise, including: using a provisioning package, using an MDM solution, using a command line tool (changepk.exe), and using Microsoft Store for Business or PC.

Fabrikam recently purchased several new devices that had Windows 11 pre-installed by the hardware vendor, along with the vendor's preferred configuration. Fabrikam wants to reconfigure the device to a clean Windows 11 installation, providing an out-of-box experience while applying the company's desired configuration and applications. Which of the following deployment methods achieves this goal, while also being the easiest method for Fabrikam to implement? -Using Windows Autopilot -Side-by-side migration -Imaging

Using Windows Autopilot -Autopilot was first introduced in Windows 10. The concept behind autopilot was to reduce the need to reimage machines. Typically, when a new device is purchased, Windows is pre-installed on it by the hardware vendor, with the vendor's preferred configuration. Autopilot reconfigures the device to a clean Windows 10 or 11 install, providing an out-of-box experience while applying the organization's desired configuration and applications. Configuring a device using Autopilot is typically easier than creating and managing images.

NTFS compression is available on volumes that use NTFS. Which of the following statements is a characteristic of NTFS compression? -NTFS compression and decompression always cause some data loss -The compression state of a folder reflects the compression state of the files within that folder. -When opening a compressed file, the Windows operating system automatically decompresses it.

When opening a compressed file, the Windows operating system automatically decompresses it. -When opening a compressed file, the Windows operating system automatically decompresses it.

Which of the following items is a feature of the Miracast protocol? -The Miracast protocol is used in client-server networks -When transmitting audio and video between devices via Wi-Fi, both devices must be connected to the Internet -When transmitting audio and video between devices via Wi-Fi, the devices only need to share the same local wireless network

When transmitting audio and video between devices via Wi-Fi, the devices only need to share the same local wireless network -It isn't necessary that both devices are connected to the Internet. They only need to share the same local wireless network. The shared information is sent by the device via Wi-Fi through a Wi-Fi Direct connection to a receiver connected to the display device. The receiver then decodes the video signal and passes it to the TV display (or other display device).

Your organization is in the process of migrating users to Microsoft 365 E3. You have a mix of Windows 10 editions deployed. You are required to provide conditional access and SSO from anywhere for the Microsoft 365 E3 users using Domain Join with Azure Active Directory. Which of the following Windows versions will support this requirement? -Windows 10 Home, Pro, and Enterprise -Windows 10 Pro and Enterprise -Windows 10 Enterprise only

Windows 10 Pro and Enterprise - The Pro edition includes Domain Join functionality, which allows computers to be joined to an Active Directory domain. It also includes the ability to join Azure Active Directory. This enables them to perform single sign-on across Windows, Microsoft 365, and other cloud-hosted apps and services. Since the Enterprise edition builds on the features of the Pro edition, it also includes these features, along with additional features that meet the needs of large enterprises.

As the Desktop Administrator for World Wide Importers, you're interested in a Windows 10 or later tool that will enable you to manage the company's servers. You also want to use a subset of the Server Manager features to manage Windows client PCs. For example, you want to display resources and resource utilization, manage certificates and devices, configure local users and groups, and edit the registry. Which tool in Windows 10 or later provides this combination of server and client management functionality? -Remote Desktop Services -Windows Remote Management service -Windows Admin Center

Windows Admin Center - Windows Admin Center is a locally deployed, browser-based management tool that lets you manage Windows clients and servers remotely over HTTPS. While it's primary function is manging servers, Windows Admin Center provides Desktop Administrators a subset of the Server Manager features for managing Windows client PCs.

Tailspin Toys is planning to upgrade its entire fleet of Windows 10 devices to Windows 11. Tailspin wants to restore the machines to a "first-run" experience and allow administrators to apply organization-specific configurations and even some types of apps. It wants to achieve the same result as reimaging, but without the need to deploy an entire image over a network and reduce the number of custom images. Which upgrade method should Tailspin Toys use to achieve these goals? -Windows Autopilot -Migration -Bare metal installation

Windows Autopilot - If the computer already has Windows 10 or later, Windows Autopilot can be used to achieve the same state as a new deployment. It uses the existing Windows 10 or 11 installation to restore the machine to a "first-run" experience, but allows administrators to apply organization-specific configurations and even some types of apps. As most new computers come with Windows pre-installed, this enables organizations to achieve the same result as reimaging for some scenarios, without the need to deploy an entire image over a network and reduce the number of custom images.

Which component of the Windows Assessment and Deployment Kit (ADK) creates provisioning packages that can be used to dynamically configure a Windows device without the need for re-imaging the device with a custom image? -Deployment Image Servicing and Management -Windows Imaging and Configuration Designer -Windows System Image Manager

Windows Imaging and Configuration Designer - Windows Imaging and Configuration Designer is a tool designed to assist with the creation of provisioning packages that can be used to dynamically configure a Windows device (PCs, tablets, and phones). This is particularly useful for setting up new devices, without the need for re-imaging the device with a custom image.

Contoso wants to provide additional security for its remote access connections. Specifically, it wants to protect enterprise data against leakage and unauthorized use. To do so, what feature should Contoso integrate its VPN client with? -Microsoft Defender for Cloud Apps -Azure AD Conditional Access Framework -Windows Information Protection

Windows Information Protection - Windows Information Protection is a feature that uses a number of technologies (including BitLocker Drive Encryption, AppLocker, and Microsoft Azure Rights Management) to protect enterprise data against leakage and unauthorized use. It relies on Microsoft Intune, Microsoft Endpoint Configuration Manager, or another third-party MDM solution to create and deploy policies that you use to specify protected apps, and to apply desired protection levels to your data.

Contoso is running Windows Enterprise on its 500+ devices. It wants to enable its users to quickly start an isolated, pristine Windows environment for temporary use scenarios, such as launching a downloaded executable they may not fully trust. It also wants a solution that's disposable, so that nothing persists on the device and everything is discarded once the user is finished using the temporary Windows environment. Which of the following virtualization technologies should Contoso deploy that satisfies these requirements? -Windows Sandbox -Client Hyper-V -Windows VM

Windows Sandbox - Windows Sandbox is a feature first introduced in Windows 10 that allows Windows clients to set up an isolated environment without the need to configure Hyper-V or create a Windows VM or set up a VHD. This enables the user to quickly start an isolated, pristine Windows environment for temporary use scenarios such as launching a downloaded executable that you may not fully trust. Sandbox also provides a disposable environment so that nothing persists on the device. When Sandbox is closed, everything is discarded.

As the Desktop Administrator for Fabrikam, you are a local administrator on your Windows 11 computer. When you attempted to install a new application on your computer, you received a UAC prompt that asked for permission to complete the task. You granted the permission, at which time the task was performed by using full administrative rights. What happened next? -You received a prompt asking whether you wanted to retain full administrative rights -Your account reverted to a lower level of permission -Your account automatically retained full administrative rights

Your account reverted to a lower level of permission - When users with administrative permissions perform a task that requires administrative permissions, UAC prompts the user for permission to complete the task. When the user grants permission, the task is performed by using full administrative rights, and then the account reverts to a lower level of permission.

A host name combines a domain name with what other object to create a fully qualified domain name (FQDN)? -an alias -a NetBIOS name -a sub-domain name

an alias - An alias is a single name associated with an IP address. The host name combines an alias with a domain name to create the FQDN.


संबंधित स्टडी सेट्स

Pediatric Test 2 GI Case Study & Success

View Set

Intro to Therapeutic Exercise Finals

View Set

Mr. Weiss - World History : Unit 1 Test

View Set

BIO 111 Unit 3: Genetic Biology - Cell Division (8) and DNA Structure and Replication (9)

View Set

Chapter 36: Calculation of Medication Dosage and Medication Administration

View Set

informational/explanatory writing and coherence/ transitions test 12/2/16

View Set