Test Prep 1 pt 2

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

You enable PowerShell remoting on a Win 10 computer. You need to limit which PowerShell cmdlets can be used in a remote session. Which three actions should you perform in sequence? -Run the "New-PSSession" cmdlet -Create a PS1 file that contains a list of the cmdlets -Run the "New-PSSessionConfigurationFile" cmdlet -Create a PSSC file that contains a list of the cmdlets -Run the "Register-PSSessionConfiguration" cmdlets -Run the "Enter-PSSession" cmdlet

(1) Run the "New-PSSessionConfigurationFile" cmdlet (2) Run the "Register-PSSessionConfiguration" cmdlets (3) Run the "New-PSSession" cmdlet

Your network contains an Active Directory domain. The domain contains 10 Win 10 computers. On a different computer named Computer1, you plan to create a collector-initiated subscription to gather the event logs from the Win 10 computers. You need to configure the environment to support the event log collection. Which two actions should you perform?

(A) Add Computer1 to the Event Log Readers group on the Win 10 computers (D) Enable Windows Remote Management (WinRM) on the Win 10 computers

You have 20 Win 10 computers in a workgroup. You need to create a local user named Admin1 on all the computers. Admin1 must be a member of the Remote Management Users group. What should you do?

(A) From Windows Configuration Designer, create a provisioning package, and then run the provisioning package on each computer. Windows Configuration Designer(WCD) is a tool to create and configure provisioning packages. WCD comes with benefits such as quickly configuring the devices without having any network connectivity. Saving time and avoiding installing new image on device. Provisioning Package (PPKG) is basically a configuration settings. You can easily create and configure a Win 10 device without having to re-image to reinstall OS over it.

You have a public Win 10 computer named Computer1 that contains a folder named Folder1. You need to provide a user named User1 with the ability to modify the permissions of Folder1. The solution must use the principle of least privilege. Which NTFS permission should you assign to User1?

(A) Full Control Only Full Control can modify permissions.

Your network contains an Active Directory domain named contoso.com. The domain contains two Win 10 computers named Computer1 and Computer2. On Computer1, you need to run the Invoke-Command cmdlet to execute several PowerShell commands on Computer2. What should you do first?

(A) On Computer2, run the Enable-PSRemoting cmdlet Enable-PSRemoting cmdlet configures the computer to receive PowerShell remote commands that are sent by the WS-Management technology.

You have a computer named Computer1 that runs Win 10. On Computer1, you create the local users shown in the following table. User1 - Users User2 - Users, Guests User3 - Power Users, Guest User4 - Guests, Users, Administrators User5 - Users, Distributed COM Users Which three user profiles will persist after each user signs out?

(A) User1 (D) User4 (E) User5 If the user is assigned membership to both the Guests group and the Administrators group, the user's profile will not be deleted when the user logs off. If the user is subsequently removed from the Administrators group and remains a member of the Guests group, the user's profile will be deleted the next time the user logs off.

You have a Win 10 computer that you use to test the new Windows features. You need to configure the computer to receive preview builds of Win 10 as soon as possible. What should you configure from Update & Security in the Settings app?

(A) Windows Insider Program Windows Insider is an open software testing program by Microsoft that allows users who own a valid license of Win 10 to sign up to pre-release builds of the operating system previously only accessible to developers.

You deploy Win 10 to a computer named Computer1. Computer1 contains a folder named C:\Folder1. Folder1 contains multiple documents. You need to ensure that you can recover the files in Folder1 by using the Previous Versions tab.

(A) Yes You enable File History and add Folder1 in the Documents library. File History only backs up copies of files that are in the Documents, Music, Pictures, Videos and Desktop folders and the OneDrive fiels available offline on your PC.

You deploy Win 10 to a computer named Computer1. Computer1 contains a folder named C:\Folder1. Folder1 contains multiple documents. You need to ensure that you can recover the files in Folder1 by using the Previous Versions tab.

(A) Yes You enable File History and add Folder1 to File History

You have a computer that runs Windows 8.1. When you attempt to perform an in-place upgrade to Win 10, the computer fails to start after the first restart. You need to view the setup logs on the computer. Which folder contains the logs?

(A) \$Windows.~BT\Sources\Panther\ Log location before Setup can access the drive.

Your network contains an Active Directory domain that contains a Win 10 computer named Computer1. You need to view the settings of Computer1 by Group Policy objects (GPO) in the domain and local Group Policies. Which command should you run?

(A)gpresult gpresult creates a report that displays what group policies objects are applied to a user and computer. When you have multiple Group Policy Objects, you need a way to verify those objects are getting applied to a user or computer. This is exactly what gpresult was built to do.

You have several Win 10 computers that are in a workgroup. The computers have Bitlocker Drive Encryption enabled. You join the computers to Microsoft Azure Active Directory. You need to ensure that you can recover the Bitlocker recovery key for the computers from Azure AD. What should you do first?

(B) Add a Bitlocker key protector With Win 10, Microsoft fully supports Azure AD. This is great for small to medium companies that don't have any on-premise infrastructure and heavily leverages the cloud. One of the benefits of Azure AD is the ability to store Bitlocker encryption keys online.

Your network contains an Active Directory domain. The domain contains a user named User1. User1 creates a Microsoft account. User1 needs to sign in to cloud resources by using the Microsoft account without being prompted for credentials. What settings should User1 configure?

(B) Email & account in the Settings app

You have several Win 10 computers that are in a workgroup. You need to prevent users from using Microsoft Store apps on their computer. What are two possible ways to achieve the goal?

(B) From Administrative Templates in the local Group Policy, configure the Store settings (D) From Security Settings in the local Group Policy, configure Application Control Policies Windows 10 was the first to implement security features to manage how devices can access, interface and install apps from the Microsoft Store in effort to secure devices against unauthrorized apps and their use through Group Policy extensions.

You have a Win 10 computer named Computer1. On Computer1, you turn on File History. You need to protect a folder named D:\Folder1 by using File History. What should you do?

(B) From File Explorer, add D:\Folder1 to the Documents library

You have Win 10 computer named Computer1 Computer1 contains a folder named Folder1. You need to log any users who take ownership of the files in Folder1. Which two actions should you perform?

(B) Modify the Advance Security Settings for Folder1 (C) From Group Policy object (GPO), configure the Audit Sensitive Privilege Use setting. Audit Sensitive Privilege Use - determines whether the OS generates audit events when sensitive privileges (user rights) are used.

You have a Win 10 laptop named Computer1. When in range, Computer1 connects automatically to a Wi-Fi network named Wireless1. You need to prevent Computer1 from automatically connecting to Wireless1. Solution: From the Services console, you disable the Link-Layer Topology Discovery Mapper Service. Does this meet the goal?

(B) No Link-Layer Topology Discovery Mapper Creates a Network Map, consisting of PC and device topology (connecting) information, and metadata describing each PC and device. If this service is disabled, the Network Map will not function properly.

-User6 is a member of: Group2, Group3, Domain Users -Group2 Security Settings: Deny access to this computer from the network -Group3: Allow log on through Remote Desktop Services User6 must be able to connect to Computer2 by using Remote Desktop. You need to meet the technical requirement for User6. What should you do?

(B) Remove User6 from Group2 in the domain. Group2 Security Setting: Deny access to this computer from the network This is blocking User6 ability to connect to Computer2 by using Remote Desktop

On Computer1, you create an NTFS folder and assign Full control permissions to Everyone You share the folder as Share1 and assign the permissions shown in the following table: User1 - Full Control User2 - Change When accessing Share1, which two actions can be performed by User1 but not by User2?

(B) Set the permission for a file (D) Take ownership of file User1 had Full Control in both NTFS and Share permissions. Because of this, User1 is able to edit permissions(NTFS) and take ownership of files(Share)

You have a Win 10 computer named Computer1 You complete a full back up of Computer1 to an external USB drive. You store the USB drive offsite. You delete several files from your personal Microsoft OneDrive account by using File Explorer, and then you empty the Recycle Bin on Computer1. You need to recover the files 60 days after you delete them in the least amount of time possible. What should you use?

(B) The full back up on the external USB drive

You have a Win10 computer named Computer1. Computer1 connects to multiple wireless networks. You need to view the wireless networks to which Computer1 connects. What should you use?

(B) Wi_Fi in the Settings app

You have a Win 10 computer that joined Azure Active Directory. You attempt to open Control Panel through CMD and receive the error message: "The operation has been cancelled due to restrictions in effect on this computer. Please contact your system administrator." You need to be able to access Control Panel. What should you modify?

(B) the Local Group Policy

You deploy 100 Win 10 computers. Each computer has a cellular connection and Wi-Fi connection. You need to prevent the computers from using the cellular connection unless a user manually connects to the cellular network. What should you do?

(C) Clear the "Let Windows manage this connection" check box for the cellular connection.

You have several Win 10 computers. All users have Microsoft OneDrive for Business installed. Users frequently save files to their desktop. You need to ensure that all the users can recover the files on their desktop from OneDrive for Business. Which two actions should you perform?

(C) Configure the Silently move Windows known folders to OneDrive settings (D) Copy ADMX and ADML files to C:\Windows\PolicyDefinitions Silently Move Windows Known Folders To OneDrive - Use this setting to redirect your users' Documents, Pictures and Desktop folders to OneDrive without any user interaction C:\Windows\PolciyDefinitions\OneDrive.admx C:\Windows\PolicyDefinitions\en-US\OneDrive.adml ADMX files are XML-based administrative templates files, which were introduced with Microsoft Windows Vista Service Pack 1 and are used instead of ADM files. ADM files are unicode-formatted text files that Group Policy uses to describe the location of registry-based policy settings.

You have Win 10 computer. You need to prevent standard users from changing the wireless network settings on Computer1. The solution must allow administrators to modify the wireless network settings. What should you use?

(C) Local Group Policy Editor

ComputerA is in a workgroup on an isolated network segment and runs Long Term Servicing Channel version of Win 10 ComputerA must be configured to have an Encrypting File System (EFS) recovery agent. You need to meet the technical requirements for EFS on ComputerA What should you do?

(C) Run cipher.exe and then add certificate to the local Group Policy

Your network contains an Active Directory domain that has Win 10 computers. You need to provide a user with the ability to remotely create and modify shares on the computers. The solution must use the principle of least privilege. To which group should you add the user?

(C)Administrators

Your network contains an Active Directory domain named contoso.com User1 has a Win 10 Pro computer named Computer1. User1 has a VPN connection to the corporate network. You need to ensure that when User1 connects to the VPN, network traffice uses a proxy server located in the corporate network. The solution must ensure that User1 can access the internet when disconnected from the VPN.

(D) From the Settings app, modify the properties of the VPN connection. You can modify the VPN proxy setting "These settings will apply only to this VPN connection"

You have 10 Win 10 computers that have Bitlocker enabled. You plan to update firmware of the computers. You need to ensure that you are not prompted for the Bitlocker recovery key on the next restart. The drive must be protected by Bitlocker on the subsequent restarts. Which cmdlet should you run?

(D) Suspend-Bitlocker TPM and UEFI firmware updates may require multiple reboots during installation. So suspending Bitlocker must be done through Suspend-Bitlocker cmdlet and using the Reboot Count parameter to specify a number of reboots greater than 2 to keep Bitlocker suspended during the firmware update process.

Users in the IT department must use dynamic lock on their primary device. You need to meet the technical requirement for the IT department users. What should you do first?

(D) Turn on Bluetooth Windows can use devices that are paired to your PC to help detect when you're away and lock your PC shortly after your paired device is out of Bluetooth range. This makes it more difficult for someone to gain access to your device if you step away from your PC and forget to lock it.

You have a Win 10 computer named Computer1 that belongs to a workgroup. You run the following commands on Computer1. New-LocalUser-Name User1 -NoPassword Add-LocalGroupMember Users -Member User1 What is the effect of the configurations?

(D) User1 appears on the sign-in screen and must set a new password on the first sign-in attempt.

The computers in the San Diego office must be upgraded automatically to Win 10 Enterprise and must be joined to Azure AD the first time a user starts each new computer. End users must not be required to accept End User License Agreement (EULA). You need to meet the technical requirements for the San Diego office computers. Which Win 10 deployment method should you use?

(D) Windows Autopilot Windows Autopilot is a collection of technologies used to set up and pre-configure new devices, getting them ready for productive use. You can also use Windows Autopilot to reset, repurpose and recover devices. (Upgraded automatically to Win 10 Enterprise and must be joined to Azure AD when the first time user starts each new computer) -The OEM Win 10 installation on new computers can be transformed into "Business-ready" state, applying settings and policies, installing apps, and even changing the edition of Win 10 being used. (End user must not be required to accpet the End User License Agreement (EULA)) -The only interaction required from the end user is to connect to a network and to verify the credentials. Everything beyond that is automated

ComputerA must be configured to have an Encrypting File System (EFS) recovery agent. You need to meet the quality update requirement for ComputerA. For how long should you defer the updates?

(E) 30 days Quality updates -Monthly updates in previous Windows versions were often overwhelming because of the sheer number of updates available each month. Many organizations selectively chose which updates they wanted to install and which they didn't. - Under "Choose when updates are installed" select "qualtiy updates for 0-30 days"

The company uses an application that checks for network connectivity to a server by sending a ping request to the IPv6 address of the server replies, the application loads. A user cannot open the application. You manually send a ping request from the computer of the user and the server does not reply. You send the ping request from your computer and the server replies. You need to ensure that the ping request works from the user's computer. Which Windows Defender firewall rule is a possible cause of the issue?

File and Printer Sharing (Echo Request ICMPv6-Out)

You have a Win 10 computer named Computer1. When in range, Computer1 connects automatically to a Wi-Fi network named Wireless1. You need to prevent Computer1 from automatically connecting to Wireless1.

From command prompt, you run - netsh wlan delete profile name="Wireless1"

Helpdesk users must be able to troubleshoot Group Policy objects (GPO) processing on the Win 10 computers. The helpdesk users must be able to identify which Group Policies are applied to the computers. You need to meet the technical requirements for the helpdesk users. What should you do?

Group to add the helpdesk users to: -Administrators Troubleshooting tool that the helpdesk users should use: -gpresult -Gpresult creates a report that displays what group policies objects are applied to a user and computer. If you're using group policy in your environment then you definitely should know how to use gpresult.

User2 has a Win 10 computer named Computer2. User2 joins Computer2 to contoso.com by using [email protected] User2 attempts to access Share1 and receives the following error message: "The username or password is incorrrect." You need to ensure that User2 can connect to Share1.

In Azure AD, you create a group named Group1 that contains User1 and User2. You grant Group1 Modify access to Folder1 (shared as Shared1)

Users in the HR department must be able to view the list of files in a folder named D:\Reports on Computer3 You need to meet the technical requirements for the HR department users. Which permissions should you assign the HR department users for the D:\Reports folder?

In Permissions Entry for Reports, under Advanced permissions, select: "List folder/read data" check box Click "Advanced" "Effective Permissions" then select "List folder/read data"

You have a file named Reg1.reg that contains the following content. Windows Editor Version 5.00 [HKEY_CLASSES_ROOT\Directory\Background\shell\Notepad] [HKEY_CLASSES_ROOT\Directory\Background\shell\Notepad\command] @="notepad.exe" What is the effect of importing the file?

In a key named command, the default value will be set to notepad.exe

A domain contains a server named Server1 that runs Windows Server 2016 and a Win 10 computer named Computer1. On Monday at 13:00, you configure Backup and Restore (Windows 7) on Computer1 to use the follwoing settings: What do you want to back up?: Local Disk (D:), Include a system image of drives: System Reserved, (C:) Schedule: Daily at 23:00. You need to identify how many backups will be available on Thursday at 17:00. What should you identify?

Local Disk (D:) backups: Three backups that use ZIP files System image backups of drive (C:) One backup that uses VHDX file

You need to create recovery procedures to roll back feature updates and quality updates. What should you include in the procedure?

To roll back feature updates: Recovery from the Settings App To roll back quality updates: Windows Update from the Settings App

Assigned access must be configured on Computer1 Computer1 has the local users shown in the following table: User11 - Administrators User12 - Users User13 - Guests You need to meet the technical requirements for Computer1

User who should configure Kiosk(Assigned Access): -User11 - Administrators Configure Kiosk (Assigned Access) for: -User12 - User12 - Users Assigned Access - is a feature on Win 10 that allows you to create a lockdown environment that lets users interact with only one app when they sign into a specified account. With Assigned Access, users won't be able to get to the desktop, Start menu or any other app, including the Settings app.

You have 100 Win 10 computers. No servers. All computers are joined to Azure AD. The computers have different update settings and some are configured for manual updates. You need to configure Windows Updates and the solution must meet the following requirements: -The configuration must be managed from a central location. -Internet traffic must be minimized -Costs must be minimized How should you configure Windows Update?

Windows Update technology to use: Windows for Business Manage the configuration by using: Microsoft Intune Manage the traffic by using: Delivery Optimization - Windows Update for Business allows IT professionals to utilize the cloud-based Windows Update services to deploy and manage Windows updates. You can use Group Policy or MDM solutions such as Microsoft Intune to configure the Windows Update for Business settings that control how and when Win 10 devices are updated. Microsoft Intune is a cloud-based service that focuses on mobile device management (MDM) and mobile application management (MAM). -Set rules and configure settings on personal and organization-owned devices to access data and network -Deploy and authenticate apps on devices. On-premise and mobile. -Protect your company and information by controlling the way users access and share information. -Be sure devices and apps are compliant with your security requirements Delivery Optimization to reduce bandwidth consumption by sharing the work of downloading packages among multiple devices in your deployment. Delivery Optimization is a self-organizing distributed cache that allows clients to download those package from alternate sources.

You deploy Win 10 to a computer named Computer1. Computer1 contains a folder named C:\Folder1. Folder1 contains multiple documents. You need to ensure that you can recover the files in Folder1 by using the Previous Versions tab.

You set up Backup and Restore (Windows 7) and include Folder1 in the back up. Backup and Restore creates backups in Previous Versions as well as the backup location


संबंधित स्टडी सेट्स

Mr. Dye Period 5 AP classroom questions and Khan questions

View Set

p. 55 ex. 1 - Mise en pratique - Les Invites

View Set

Ch.15 Professional Practice Models, Leadership Exam #3

View Set

Chapter 8: Communicating in Intimate Relationships

View Set

Thermochemical Equations assignment and quiz

View Set

NCLEX questions, answers, rationals

View Set