5.6.9

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Rodney a user in the research Department uses a Windows notebook system with a single NTFS volume which can you do to let Kate open the file

Log on to the laptop using an account with dra privileges clear the encrypt attribute on the file

You want to prepare a USB flash drive that you can use as a Windows 10 installation source.

Media Creation Tool Windows 7 USB/DVD Download Tool DiskPart

You have mounted and dismounted the image several times. You want to reduce the overall size of the image file by removing unnecessary resource files from the image file.

imagex /export

You need to interactively access the command prompt on a remote Windows system named WS1 from your Windows workstation.

psexec \\WS1 cmd

Which DAC component is used to scan files for specific information such as texturing or a regular expression

Classification rules

How do you configure your Windows system to require BitLocker To Go for write access to removable storage devices?

Configure the local group policy.

Drag the tool on the left to the description on the right that explains how it is used to deploy images.

ImageX BCDboot WinPE DiskPart DISM

Letting apps use your advertising ID for experience across apps

Privacy

You need to change the web page that opens when you launch the Edge browser.

. . .

You decide to use a system image to deploy Windows to multiple computers. You have installed Windows on a reference computer. You need to restart Windows and manually install applications and make other changes prior to capturing the image. You want to prevent the Windows Welcome screen from showing when the system reboots prior to customizing the installation. You do not want any changes you make to prevent the end-user from seeing the full Out-of-Box Experience after the image is applied.

/audit option.

Prior to capturing the system image, you need to use the sysprep utility to prepare a system image for deployment to other computers.

/generalize

Drag each Scanstate command-line option on the left to the description of its function on the right.

/o /ue /ui /p /nocompress

Drag each Sysprep command line option on the left to its description on the right.

/oobe /unattend: answerfile /reboot /generalize /audit

Drag ImageX command line option on the left to its description on the right.

/split /capture /compress /apply /verify /config

Drag each loadstate command-line option on the left to the description of its function on the right.

/ui /lae /ue /lac

You need to create a virtualization environment on your Windows 10 system using Client Hyper-V to test potentially rogue applications that end users' downloads from the Internet. Because the applications may be malicious, you need to isolate the virtual machines from your production network and the host system; however, you need the virtual machines to be able to communicate with each other.

A private virtual network

LAB12 is a virtual machine running in Client Hyper-V on a Windows desktop system. You've just finished installing the operating system on LAB12 and now need to connect it to an external virtual network. However, no virtual networks have been defined on the system yet.

Action

slmgr

Activates Windows Displays summary license information Displays a license's expiration date Displays detailed license information Installs a new product key

You are planning to install Windows 7 Home Premium edition on a new 64-bit computer. 500 GB hard drive

Add more memory

Desktop users access an in-house application that is hosted on your intranet web server. When users click a specific option in the application, they receive an error message that the pop-up was blocked.

Add the URL of the website to the Local Intranet zone.

You manage Windows computers connected to the mydomain.com Active Directory domain. You have decided to implement DirectAccess on your network. You run the setup for DirectAccess on the DA1 server using the folloing config settings: End-to-end authentication with a smart card required for authentication

Add the computer account for each client computer to the DirectAccessGroup security group.

Your organization provides its sales force with Windows 10 notebooks to use while visiting customer sites. You manage these devices by enrolling them in a cloud-based Windows Intune account. One of your sales representatives left his notebook at a customer's site. The device contains sensitive information, and you want to change the password to prevent the data from being compromised.

Admin Portal

Your organization provides its sales force with Windows RT tablets to use while visiting customer sites. You manage these devices by enrolling them in your cloud-based Windows Intune account.One of your sales representatives left her tablet at an airport. The device contains sensitive information, and you need to remove it in case the device is compromised.

Admin Portal

You recently purchased a large number of Windows 10 systems for deployment in your organization's network. These system already have Windows 10 Professional installed and configured. You need to customize these systems to work in a corporate environment. For each system, you need to:

Advanced provisioning

You need to configure Remote Assistance on your Windows system so that invitations can only be used from computers running Windows Vista or later.

Advanced...

You want the files in the Data You want the files in the Data share

All files and programs that users open from the shared folder are automatically available offline. Optimaize for performance

Click the menu option you would use to make a cached version of the Info.txt file available when you are disconnected from the office network.

Always available offline

Your organization is formulating a Bring Your Own Device (BYOD) security policy for mobile devices running Windows RT.

Apps will only run on Windows RT if you leave User Account Control enabled. Windows RT will refuse to run apps not digitally signed by Microsoft.

They should not be able to delete or rename files Taking the least amount of actions possible and affecting existing permissions as little as possible how can you assign these NTFS permissions?

Assign Allow Read & Execute, List folder contents, Read, and Write to the Accounting group. For the Mary user account, deny the Write permission.

Making the fewest rights assignments how can you assign these NTFS permissions?

Assign Allow Read & Execute, List folder contents, and Read to the Accounting group. Assign Allow Write to Mary.

You configure your Windows notebook system to enter sleep mode after 10 minutes of inactivity. However, after 15 minutes with no activity, the computer does not enter sleep mode.

At a command prompt, run powercfg /energy

You configured a power plan that is optimized for your Windows notebook system and set it as the active plan. You need to migrate the settings to other laptops running the same version of Windows. Before you migrate the plan, you need to validate the power plan.

At a command prompt, run powercfg /export At a command prompt, run powercfg /energy

You have created a VHD file that contains a Windows installation image. The VHD file is currently not attached. You would like to perform offline servicing of the image in the VHD file to add a driver and enable some Windows features.

Attach the VHD file.

You want to configure a Windows computer to boot to a Windows 10 installation on a VHD file. You will use the image on the Windows installation disk.

Attach the VHD.

You manage several Windows systems that are members of The Domain you are configuring security settings that will be distributed to all computers on your network you want to identify tonight attempts to change users group membership and computers local database click the audit policy that should be an able to meet this requirement

Audit account management

You manage several Windows systems that are members of a domain click the audit policy that should be enabled to meet this requirement

Audit object access

You are publishing an app in Microsoft Intune that you want deployed to the Intune Company Portal, allowing users to decide whether they want to install it on their managed devices or not.

Available install

Click the category you would expand to configure this setting.

Battery

You have a Windows certified external USB drive that you want to use for the Windows To Go drive.

BitLocker

You want to protect all of the files on the hard drive of your Windows notebook system to prevent unauthorized access. You want to prevent access to any file on the hard drive, even if the hard drive is moved to another computer.

BitLocker

You have a single computer without an operating system installed. This system will be used by an employee who works with sensitive information, so the operating system partition must be encrypted. You have an image of a Windows installation stored on a network share. What must you do to manually deploy the image to an encrypted partition on the computer?

Boot the new computer using WinPE. Use DiskPart to create a BitLocker partition. Use DiskPart to create a system partition for the image. Use DISM to apply the image to the local drive.

To deploy Windows 10, you want to use the Windows 10 installation on this computer as a system image. After removing machine-specific information from the computer, you are ready to capture the image as a WIM file.

Boot to Windows PE and use ImageX to capture the Windows installation onto a network share.

Which DAC component specifies conditions that must be matched for permission assignment to be made

Central Access rules

You have implemented UE-V in your Windows domain. A settings storage location has been defined on a Windows server to store users' settings packages. The UE-V agent has been installed on all Windows workstations. A settings location template has been defined to identify the settings the UE-V agent will monitor, including changes to certain application settings as well as several Windows settings.

Changes to monitored Windows settings are captured when the user logs off the system.

You connect an external USB hard drive to your Windows notebook system to access specific data files. After editing the files, you need to disconnect the external USB hard drive. You do not want to lose your work on the data files.

Check the drive's Policies tab and ensure that the Quick Removal option is selected, then remove the USB connector.

You want to change how the long date is displayed from the English (United States) format to the English (United Kingdom) format. For example, February 14, 2016 is the English (United States) format, while 14 February 2016 is the English (United Kingdom) format.

Clock, Language, and Region

You would like to configure your Windows desktop system so that an event is recorded anytime you guys are successfully or unsuccessfully logs on how can you configure your settings so you don't do not also record log off events

Configure Advanced audit policies in the local security policy

You have a new notebook that you want to install Windows on. You would like to use BitLocker on the notebook to protect the volume used for the operating system and all user data. Your notebook does not have a Trusted Platform Module (TPM). You need to configure the computer to use BitLocker.

Configure BitLocker to use a startup key on a USB drive.

You would like to implement DirectAccess on your corporate network. Which of the following is not an infrastructure requirement for using DirectAccess?

Configure MS-CHAPv2 authentication

You manage Windows notebook systems that are members of a domain. You have ten regional sales people who travel extensively and use these notebooks to access company resources. The users have complained that although they can take copies of important files with them into the field, occasionally they have been caught with out-of-date documents because no one told them the files had been updated. Additionally, some files they modify need to be distributed to all the other sales staff.

Configure Offline Files for the folder that contains these files.

While managing the available memory for applications on your Windows system, you discover that the paging file is set below the recommended size.

Configure the paging file to one and a half to two times the amount of physical RAM.

You have a laptop computer that runs Windows 10. The computer is a member of a domain. You want to use DirectAccess to access application servers on your corporate intranet. Application servers run Windows Server 2003. You need to implement a solution that does the following:

Configure selected server access (modified end-to-edge). Upgrade application servers to Windows Server 2008 R2.

You use a VPN connection on your Windows desktop system to access resources on a corporate intranet. In addition to accessing the intranet resources, you need to access the Internet while the VPN connection is active.

Configure the advanced TCP/IP settings of the VPN connection.

You need to configure the following power options on your Windows notebook system when running on battery power: Put the computer to sleep after 15 minutes of idle time. Have the wireless adapter enter a strict power saving mode.Shut down the computer if you close the lid.

Configure the advanced settings of any power plan.

You use an external USB hard drive to store data files on your Windows system. You often find yourself waiting as Windows writes data to the external drive. Although it is portable, you rarely remove the external drive from the computer.

Configure the write caching drive policies for better performance.

you have to come Windows systems name comp 1 and, to both computers are members of a homegroup neither computer is a domain number what can you do that will allow you to access the data.doc on comp2

Copy your private key from comp 1 to comp 2

Fill in the blank with the name of the personal assistant feature that is available with Windows 10.

Cortana

You have two computers. ComputerA is running Windows 8.1 and ComputerB is running Windows 10. You are using USMT to migrate the user profiles and the default date files from ComputerA to ComputerB. The user works with graphics, so you must also include .jpg files.

Create a custom XML file and then use <include> statements to specify the file types to be included in the migration.

You have a Windows 7 Enterprise system that you are upgrading to Windows 10 Enterprise. You've already purchased and downloaded the installation ISO file and burned it to a DVD. Next, you ran the Windows 10 Upgrade Assistant. It alerted you to the fact that you needed to install the latest update to Windows 7 before proceeding with the upgrade. Everything else on your system meets the Windows 10 requirements.

Create a system image. Back up your data. Gather installation discs and product keys for applications you want to keep.

Many of the end users in your organization are bringing their own personal mobile devices to work and storing sensitive data on them. To prevent the data from being compromised, you create a cloud-based Windows Intune account and configure mobile device security policies. You need to apply those security policies to the end users' mobile devices.

Create a user account for each user who has a managed mobile device. Enroll the devices with the Intune service.

You are getting ready to install Windows on a new laptop. You would like to configure the laptop to use BitLocker. How can you configure the laptop to start up without requiring a PIN or a USB device? (Select two. Each answer is part of the complete solution.)

Create two partitions on the hard disk. Put boot files on the first partition and operating system files and data on the second partition. Enable the TPM.

Consider the Reliability Monitor output shown in the exhibit. What does the red circle with the letter x represent?

Critical Event

You were having trouble with your Windows system and initiated a Remote Assistance session with a Help Desk technician. The technician has taken control of your systems to perform several checks. She has now asked you to take back control of the system.

Crtl + C // Esc

You booted the system from the Windows 10 installation DVD and navigated through the first few screens of the installation wizard. You've reached the screen shown in the exhibit.

Custom: Install Windows only (advanced)

You are running the Windows 10 upgrade process and have reached the point in the process shown below. You are very concerned about keeping your personal data private.

Customize settings

You want to deploy Windows to multiple computers from a previously captured system image. You have received an update in the form of a .cab file.

DISM

You manage several Windows systems that are members of a domain.

Decrease the timeout in invitation files. // Require a password on invitation files.

Drag the task on the left to the Internet options tab on the right where the task can be performed.

Delete temporary Internet files, cookies, browsing history, form data, and passwords. Enable Protected Mode. Configure Pop-up Blocker settings. Manage certificates, trusted root CAs, and trusted publishers. Configure proxy server settings. Add, disable, or remove browser add-ons. Reset Internet Explorer settings to their default values.

The users in your organization bring their own mobile devices to the office and want to be able to access the network with them. You want to protect your network from malware threats that might be on these devices. You want to make sure these devices meet certain requirements before they can connect to the network, such as the following: Hardware and Windows startup components are clean

Device Health Attestation

You want to use your Windows notebook to connect to your corporate intranet while you are at home or traveling. Your solution should meet the following requirements: The computer should connect automatically to the intranet without user initiation.

DirectAccess

You want to divide the hard disk into two volumes. The C: volume should be 150 GB in size. The D: volume should consume the remaining available space on the drive.

Drive options (advanced)

You need to migrate all user profiles and data files from WS1 to WS2. You need to ensure the user accounts on the destination computer are created and enabled during the migration.

Dynamically expanding

You have been asked to configure remote VPN connections to use smart cards for the authentication process.

EAP

Click on the option in Settings you would use to configure accommodations for users with impaired vision or hearing.

Ease of Access

You work on Windows desktop system that shared by three other users you notice that some of your documents have been modified so you decided use auditing to track any changes to your documents how can you make sure an event is listed in the security log whenever one of your documents is modified

Edit Advanced security properties of the folder containing your documents

For several months, your Windows computer acted like a server in the workgroup. It was optimized to share files and folders to the other computers. You no longer need the computer to act like a server; you want the computer to focus on applications. After installing the applications, you believe the computer is not reacting quickly enough while using the applications. You know the machine has enough video memory and physical memory to handle the applications.

Edit the Processor Scheduling settings.

You have a computer that runs Windows XP Professional. You want to upgrade your computer to Windows 7 Professional. You want to customize the migration of application, user profile, and user data.

Edit the config.xml file. Run scanstate with the /genconfig option

You need to migrate specific application settings from ComputerA to ComputerB by using USMT.

Edit the config.xml file. Run scanstate with the /genconfig option.

The D: drive in your computer has been formatted with NTFS The Sales group on your computer has been given Allow Modify to the D:|Sales folder. The Mary user account is a member of the Sales group. You want to accomplish the following •Mary should not be allowed access to the D:|sales|2010sales.doc file. •Mary should be able to read,write and create new files in the D:|Sales folder •your solution should not affect the abilities of other sales group members to access files in the D:|Sales folder. What should you do?

Edit the properties for the file and assign Mary the Deny Full Control permission.

When running multiple applications, your Windows system is slow to respond. You need to improve performance, especially for the application that you are actively working in. The computer already meets the minimum hardware requirements for the operating system.

Enable ReadyBoost on a USB flash drive.

You want to be able to stop working on your Windows notebook system, save battery power, and resume work as quickly as possible. You also want to protect yourself from data loss should the battery fail.

Enable hybrid sleep.

You are configuring security settings that will identify when people attend to log onto a Windows desktop system with an incorrect password you need to computer to note the failed attempts and its own audit log which the local security policy setting can you enable to track failed logon attempts

Enable the audit account log-on events setting

You need to be able to remotely execute commands on a Windows workstation named WS1. Which commands can be used to enable remote management on this system? (Select two. Each answer is a complete solution.)

Enable-PSRemoting // winrm quickconfig

You have to Windows systems name comp 1 and comp to both computers are members of a domain what should you do

Export the recovery agent keys from comp 1 and import them to comp 2

There is an app available in the Windows store that users need to complete their day-to-day tasks. You want to deep-link this app in Microsoft Intune to make it available on your Company Portal.

External link Available install

You have a virtual machine and have installed the Windows 10 operating system on it. You want this machine to be able to communicate with the physical network using a bridged connection over the physical host's network adapter.

External network

You currently use a Windows 7 Ultimate desktop system. You have been asked to evaluate Windows 10 as a possible upgrade for the Windows 7 systems you manage. You decide to install Windows 10 in a VHD file on your Windows 7 system. To ensure that the evaluation is realistic, you need to ensure the best possible performance.

Fixed size

Which User Experience Virtualization (UE-V) component relocates a user's profile data from the local storage device to a network share?

Folder Redirection

You want to save some files on a USB thumb drive and protect the drive using BitLocker To Go. You want to be able to read these files on a computer that is running Windows XP Professional. You need to implement a solution with the least amount of effort as possible.

Format the drive using FAT32. Include the BitLockerToGo.exe file on the USB drive.

You have a computer on your workbench without an operating system. You would like to install Windows 7 Enterprise 32-bit edition on the computer.Hard drive with 12 GB of free space

Free up some space on the hard drive

You want to use DirectAccess so your laptop computer can access application servers on your corporate intranet. Application servers run Windows Server 2003 and Windows Server 2008. You want to configure a single access method for all servers and clients.

Full enterprise network access (end-to-edge)

You need to perform a clean installation of Windows 10, but it is very important that you are able to continue using this system with the same applications and data. You must retain the existing data files from the Windows 7 installation and be able to continue using the same applications after the Windows 10 clean install is complete.

Gather application installation media and product keys. Back up the user data. Create a system image.

Which rights must you assign to each user to give them the necessary NTFS permissions to the D:|Reports folder?

Grant Read & Execute to Judith and modify to Dalton

You have created a Windows To Go drive for a user who needs to work at home. The Windows To Go drive contains the user's corporate working environment, including the user's work applications and data.

Group Policies Management Tools BitLocker

You use a Windows notebook system that is shared by three users the computer is a member of a domain after you add a data recovery agent using Group Policy which is the next step

Have each user run Cypher space for rent / you

You keep your Windows laptop plugged in most of the time and would like to use the full CPU power for a video project you are working on.

High Performance

You have been put in charge of providing a VPN solution for employees who work remotely. When these employees change locations, they lose their VPN connection, so you want them to automatically reconnect if the VPN connection is lost or disconnected.

IKEv2

You have a computer that you will use as a reference computer to install Windows from a system image. You have already used Sysprep to remove machine-specific information from the reference computer. You need to capture the image using compression, but excluding some file types from being compressed. You create a file named

Identify files that are not compressed using the CompressionExclusionList section.

You have just finished capturing image files from a Windows 10 reference system. You are now ready to deploy the image files on the target systems on your network.

ImageX Deployment Image Servicing and Management

You have just finished installing a Windows 10 reference system that you need to capture an image from. You've already removed device-specific information from the system and are ready to capture the image files.

ImageX Deployment Image Servicing and Management

You have a Windows notebook system that is a member of a domain.You would like to protect the data on your notebook to meet the following requirements: All operating system and user data should be encrypted.

Implement BitLocker with a TPM

You want to use BitLocker on a laptop that belongs to a domain. Your implementation should meet the following requirements: The computer should start up automatically without user intervention. To meet security requirements, USB support must be disabled on the laptop.

Implement BitLocker with a TPM. Configure Group Policy to store recovery keys in Active Directory.

Your company has an internal website that requires HTTPS. The website's certificate is self-signed. You use HTTPS to browse to the website and receive the warning message as seen in the image.

Import the website's certificate into the Trusted Root CA list.

A user made some modifications on the Advanced tab in Internet Explorer and is now having some problems.

In Internet Options on the Advanced tab, click Restore advanced settings.

You manage a Windows system. Multiple people use the computer. Users sometimes allow Internet Explorer to remember passwords when accessing various websites.

In the AutoComplete settings, deselect the user names and passwords on forms checkbox.

You copy the installation files from a DVD to a USB flash drive and then use bootsect to make the USB drive bootable. Using the RAID controller on the motherboard, you configure three hard disks in a RAID 5 array. Using disk tools, you create a single partition that takes up the entire array.

In the BIOS, modify the boot order to boot from the USB device first.

You need to connect to a remote Windows system using Remote Desktop. How can you copy files from your local hard drives to the remote computer with the least amount of effort?

In the Remote Desktop client properties, edit the local devices and resources options.

You are about to give a presentation and have connected your laptop to a multimedia projector. You are concerned about interruptions to your presentation such as notification balloons and the screen turning black.

In the Windows Mobility Center, enable the Presentation Settings option.

You manage a notebook system running Windows which tasks can you perform to love all packets are job by the firewall on your computer

In the local security policy a configure object access policies for the Windows filtering platform view audit entries in the security log viewer

You need to connect a Windows tablet device to a mobile broadband 4G network. You've signed up for service with a provider. What should you do next? (Choose two. Each option is a part of the complete solution.)

Install a 4G data modem. Let Windows retrieve and install the appropriate app from the Windows Store.

You have previously deployed Windows to all of the desktop computers in your company using a single system image. To install this image, you created a WinPE boot CD. One of the employees you support is not able to install the image on a new desktop computer using the WinPE CD because it cannot boot to the network drive.

Install the latest hardware drivers for these new desktop computers on the WinPE image.

You manage a custom application that is currently installed on the computers in the domain you manage. You receive a new version of the software. Installing the software on a client computer overwrites the existing installation and makes is so both versions cannot be used at the same time on the same computer. You decide to use Remote Desktop Services on a server in the domain to allow clients to run both the new and the old version of the software. Clients should be able to run each version using an icon on their desktops.

Install the new version of the application on the server. // Configure RemoteApp on the server.

Mary and Mark share a window system how can you ensure that Mary can grant Marc access to the file

Instruct Mart to log on the computer encrypt a file

Rodney a user in the research Department uses a Windows notebook system with a single NTFS volume how can you encrypt the contents of the C colon backslash data folder so that Kate and Rodney are the only authorized user

Instruct brawny to log on his computer at the properties on the seat colon backslash data folder and enable encryption add Kate as an authorized user for each file in the C colon backslash data folder

One of the users installs a new Internet Explorer add-on that interferes with the browsing functionality of other users on the system, but the add-on is necessary for business purposes. What should you do?

Instruct the other users to log on and disable the add-on.

An end user in your organization has been issued a Windows 10 notebook to use while traveling and working from home. Because of the way the notebook system will be used, security settings can't be easily applied using domain-based Group Policies. To enforce security settings, you decide to manage the notebook by enrolling it with your cloud-based Windows Intune account. However, the user has already taken the notebook home.

Instruct the user to enroll the notebook using the Company portal.

You have created a virtual machine and installed a Windows operating system on it. You want to be able to copy and paste between the host and guest machines.

Integration Services

You are evaluating Wi-Fi Direct for establishing wireless connections between Windows notebooks and mobile devices such as phones and tablets. Which of the following statements are true regarding Wi-Fi Direct? (Select two.)

It uses WPA2 security. It uses the 802.11n wireless standard.

You want to use DirectAccess to connect the computer to your corporate intranet. You will use Group Policy to enforce DirectAccess settings on the client.

Join the computer to a domain. Ensure the computer is running Windows 7 (Ultimate or Enterprise) or later.

You have configured a Windows server in your network to provide activation for your Windows workstations using the Key Management Service (KMS).

KMS activations are valid for 180 days. The Windows client systems will attempt to renew their activation status every seven days.

Using the RAID controller on the motherboard, you configure three hard disks in a RAID 5 array. A fourth hard disk is connected to the IDE channel. You edit the BIOS boot order to boot from the optical drive. You insert the installation DVD, boot to the disc, and start the installation.

Load Driver

You are performing a clean installation of Windows 10 on a desktop workstation. The workstation has a high-end video adapter with 4 GB of video memory, 8 GB of system RAM, and a 1-TB RAID 5 disk array.

Load driver

You access the WidgetProject share on a server at your organization's headquarters over a WAN link using the following UNC path: \\FS3\WidgetProject

Local intranet

You manage a Windows system that is a member of a workgroup. The computer is shared by three users. Each user has a standard user account. Mary is one of the three users of this computer. She wants to access the computer using a Remote Desktop connection.

Make Mary's user account a member of the Remote Desktop Users group.

You want to manually back up the key used for drive encryption on your Windows RT tablet.

Manage BItLocker

Many of your users have iPhones and iPads that they use to complete their day-to-day tasks. You have enrolled these devices with Microsoft Intune. You now need to publish an app from the Apple App Store to these devices.

Managed iOS App from the App Store

How do you increase the size of the paging file on your Windows system?

Modify the Advanced system settings.

You need to move the file from the existing folder to the D:|Confidential folder How can you accomplish this in the least amount of time?

Move the file to the new folder

You have two Windows systems named Computer1 and Computer2. Both computers are configured with BitLocker. Both computers have a TPM installed. You have two Windows systems named Computer1 and Computer2. Both computers are configured with BitLocker. Both computers have a TPM installed.

Move the hard disk from Computer1 to Computer2. Use the recovery key from Computer1 to gain access to the encrypted volume.

Management has decided to purchase new tablets for the administrative assistants in your organization. After conducting a needs assessment, they have determined that the new tablets must meet the following requirements: They must be joined to the organization's existing Active Directory domain. A sales rep from a computer manufacturer recently offered you a very competitive price on Windows RT tablet systems. Can you use these systems in this implementation?

No. Windows RT does not support domain join.

You use a 64-bit version of Windows 10 Professional on your desktop computer. This system has a 500 GB hard disk installed and 4 GB of system RAM. Using Hyper-V, you plan to test a network design that will have multiple virtual servers and virtual workstations.

No. You need more RAM if you plan to run multiple virtual machines using Client Hyper-V.

You manage two Windows systems named Comp1 and Comp2. Both computers are members of a domain. Which steps do you need to perform so you can remotely execute commands on Comp2 from Comp1?

ON Comp2 run winrm qc.

You are using a Windows desktop system to connect to a remote system using Remote Desktop. How do you prevent the desktop background on the remote computer from displaying on the local computer?

ON the Experience tab of the Remote Desktop connection, clear the Dekstop Background checkbox.

You want to use DirectAccess to connect your new laptop to your corporate intranet from home. Your home network is connected to the Internet with a single public IP address and NAT. Firewalls between your network and the intranet allow only HTTP and HTTPS traffic.

Obtain a computer certificate for the laptop.

You have set up Work Folders on your desktop computer at work. You are planning to travel to make a proposal to a potential client, so you saved the presentation files in your Work Folders folder. You need to be able to access these files from your Windows tablet when you are at the client's site. Before you leave home to go on your trip, you want to make sure Work Folders is set up and working on your tablet and the files are synced. However, when you enter the URL to the Work Folders server, you get a message that says the site's security certificate is not trusted.

Obtain a copy of the SSL certificate that the Work Folders server is using. Import the SSL certificate on the Windows tablet.

You manage two Windows systems named Comp1 and Comp2. You need to use the command-line to remotely manage Comp1 from Comp2.

On Comp1 run winrm qc // Authenticate Comp2 to Comp1.

You work in a branch office and use a desktop system named Comp1. A Windows server named Srv1 is located in the main office. On Srv1, you share a folder named Data using the default caching settings. You use Offline Files to automatically access files when the WAN link connecting the two offices is slow. You want to encrypt the Offline Files cache on Comp1.

On Comp1, edit the Local Security Policy. On Comp1, edit the Offline Files settings in the Sync Center.

You manage two Windows systems named Comp1 and Comp2. Both computers are members of a domain. Windows Remote Management (WinRM) is enabled on both computers.

On Comp2 run winrs and then run diskpart

You have two computers. ComputerA is running Windows 7, and ComputerB is running Windows 10. You need to migrate all user profiles and data files from ComputerA to ComputerB. Which command options must you include to ensure the user accounts on the destination computer are created and enabled during the migration?

On ComputerB, run loadstate

You use a Windows notebook system named M400. It is a member of a domain and is located in a branch office. A Windows server named Server1 contains a shared folder named You use a Windows notebook system named M400. It is a member of a domain and is located in a branch office. A Windows server named Server1 contains a shared folder named

On M400, make the Data share available offline and enable encryption of offline files.

You work in a branch office and use a desktop system named Comp1. A Windows server named Srv1 is located in the main office. On Srv1, you share a folder named Data using the default caching settings. You use Offline Files to make the files in the Data share available when the WAN link is down. How can you prevent all files with the .iso and .mp3 extensions from being cached?

On Srv1, edit the Local Security Policy.

You work in a branch office and use a desktop system named Comp1. A Windows server named Srv1 is located in the main office. On Srv1, you share a folder named Data using the default caching settings. You use Offline Files to make the files in the Data share available when the WAN link is down. How can you prevent all files in the Data share from being cached while making sure files in other shared folders are still available?

On Srv1, edit the properties for the Data folder.

You have two computers. WS1 is running Windows 7, and WS2 is running Windows 10. You need to migrate all user profiles and data files from WS1 to WS2. You need to ensure the user accounts on the destination computer are created and enabled during the migration.

On WS2, run loadstate with the /lae and /lac options.

You want to capture a system image to deploy Windows to multiple computers. You want to install Windows on the reference computer using an answer file.

On a technician computer, insert the Windows product DVD. Run Windows SIM and load a preloaded install image (install..wim) from the DVD Select and edit the responses to the questions presented during product installation. Validate the file in Windows SIM. Save the answer file.

When running multiple applications, your Windows system is slow to respond. To improve performance, you enable ReadyBoost on a USB flash drive.

On the Ready Boost tab in the properties of the USB flash drive.

You have configured a reference computer with Windows and are ready to capture and deploy the image to several computers. You want to save the image file using three smaller files instead of one large file. Then you need to install the image to the new computers. You want to perform these actions with the least amount of effort possible.

On the reference computer, run imagex /capture. After the image is captured, run imagex /split. On the target computer, rn imagex /apply /ref.

Using the RAID controller on the motherboard, you configure three hard disks in a RAID 5 array. You leave the array unpartitioned and unformatted. You edit the BIOS boot order to boot from the optical drive. You insert the installation DVD, boot to the disc, and start the installation.

On the screen where you select the disk to install Windows, click Load Driver

You are the desktop administrator for your company. You would like to manage the computers remotely using a tool with a graphical user interface (GUI).

Open Computer Management and connect to each remote computer. // Establish a Remote Desktop connection to each computer.

You started using a new Windows server three months ago. Since that time, you have found that the system slows down and crashes from time to time. You want to look at a report that shows important events for the server since it was installed. You'd like to see both when software was installed and with any hardware or application failures.

Open Reliability Monitor.

You are using your Windows 10 notebook system as you travel to client sites. You about to board an airplane and decide to switch your notebook to Airplane Mode prior to boarding.

Open Settings and click Network & Internet. Use the Airplane Mode switch at the top of the Networks panel to turn wireless communications off.

You need to use a VPN connection to access company resources from your home office, so you configure a new VPN connection using the IKEv2 security protocol. While at work, you tested the connection, and it was successful.

Open UDP ports 500 and 4500 and protocol 50 on your home router.

On your Windows system, you must prevent Edge from leaving a trail of your browsing session.

Open a new InPrivate window.

On your Windows system, you must prevent Internet Explorer from leaving a trail of your browsing session.

Open an InPrivate Browsing session.

You have a Windows system that you would like to manage remotely. You enable Remote Desktop on the computer. While working from home, you find that your home firewall is blocking Remote Desktop.

Open port 3389 in the network firewall.

You work in a branch office and use a desktop system named Comp1. A Windows server named Srv1 is located in the main office. On Srv1, you share a folder named Data using the default caching settings. You use Offline Files to automatically access files when the WAN link is down. On Comp1, you want to see your synchronization partners, see the results of the latest synchronization, and view and resolve any conflicts.

Open the Sync Center in the Control Panel.

You need to manually synchronize the offline files on your Windows system with the versions of the same files stored on a network share.

Open the Sync Center.

The sales reps in your organization use a VPN connection on their Windows notebook systems to access the corporate network while traveling. You are concerned that a sales rep has configured his VPN connection to automatically remember his credentials for accessing the VPN server. This violates your organization's security policy.

Options

You have a computer running Windows 10. You have just enabled Remote Desktop on the computer so you can connect to it using a low-speed broadband connection from home and run a few reports. You need to optimize the performance of your Remote Desktop session for your slow connection.

Persistent bitmap caching

Click on the option in Settings you would use to customize the appearance and behavior of the Start menu.

Personalization

You have been having trouble with your Windows notebook system crashing. The support technician wants you to send him a memory dump that occurred when the computer crashed. You find that the computer did not create the memory dump file.

Place the paging file on the system drive.

Which power plan will enable your Windows notebook system to save as much battery power as possible?

Power Saver power plan

Match the distribution channel on the left with the mechanism on the right that must be used to activate copies of Windows 10 purchased through that channel. (Each channel may be used more than once.)

Preinstalled (OEM) Volume licensed Volume licensed Full-packaged (retail)

Drag the description on the left to its Manage-bde.exe command option on the right.

Prevents access to BitLocker data Removes unused data fragments from the free space on a drive Enables BitLocker recovery mode Displays BitLocker information for all drives on the computer Encrypts the drive and enables BitLocker Enables access to BitLocker-protected data with a recovery password or a recovery key

Your organization's security policy dictates that apps must be denied access to location information from the Windows Location Platform.

Privacy

You are using a 64-bit version of Windows 10 Professional, and you want to enable Client Hyper-V so you can create and manage virtual machines.

Programs

You recently purchased a large number of Windows 10 systems for deployment in a university writing lab. These system already have Windows 10 Professional installed and configured. You need to customize these systems to work in an open lab environment, where they will be used by a large number of different users. For each system, you need to:

Provision school devices

Drag each Windows Automated Installation Kit component on the left to its description on the right.

Windows SIM Sysprep DISM Oscdimg WinPE ImageX

Management has decided to purchase new desktop systems for the users in the engineering department. A needs assessment has determined that the new systems must meet the following requirements: They must be joined to the organization's existing Active Directory domain. CPU: 64-bit AMD 3.0 GHz quad-core (SLAT-enabled)

Purchase the desktop systems as configured and implement them in the network.

You are on an airplane and are being instructed to turn off your Windows notebook system completely and immediately. You have several open windows with critical data that you cannot lose.

Put the notebook into hibernation.

Windows server has a shared folder named HR what is D Connors effective access to Performance - reviews. Docx file

Read

You have previously installed Windows on two new computers and configured both computers with BitLocker. Both computers have a TPM installed. Because of a hardware failure, one of the computers will not boot. You replace the failed hardware, but now BitLocker is preventing the system from starting because it has failed the startup system integrity checks.

Recovery key

The hard drive in your Windows notebook has been encrypted using BitLocker. BitLocker uses a TPM with a PIN and a startup key. You have lost the USB device containing the startup key. You also find that you are unable to locate the recovery key.

Reformat the hard drive and reinstall Windows.

Members of the Accounting group should be able to open and view all files edit them add new files and rename and delete files Taking the least amount of actions possible and affecting existing permissions as little as possible how can you assign these NTFS permissions?

Remove Mary from the Accounting group. Assign Allow Read & Execute, List folder contents,Read, and Modify to the Accounting group. Assign Allow Read & Execute List folder contents and read to Mary

How can you let Sally access the Reports folder?

Remove Sally from any other groups that have been explicitly denied access to the Reports folder

You notice that the Aero features are not displayed. The computer has a 19-inch CRT screen that supports refresh rates up to 65 Hz and a graphics card with 64 MB RAM

Replace the graphics card with one that has at least 128 MB of RAM

You are publishing an app in Microsoft Intune that you wish to be automatically deployed on managed devices using the InTune agent.

Required install

There is an app available in the Windows store that users need to complete their day-to-day tasks. You want to deep-link this app in Microsoft Intune to automatically install it on managed devices using the Intune agent.

Required install External link

Which DAC component is used to tag scanned files

Resource properties

You've been assigned to gather information from a website on the Internet. However, you are concerned that the site may be malicious.

Restricted sites

You want to configure a computer to boot to a Windows installation on a VHD file. You will use the install.wim image on the Windows installation disk. You have downloaded the Windows AIK tools. You create and attach a virtual disk file using Disk Management. You run ImageX to apply the image to the VHD file.

Run BCDEdit to create a BCD entry pointing to the VHD file.

You have a Windows notebook system that is shared by three years and computer is not a member of a domain what should you do first

Run Cypher space forward slash letter r

You need to deploy Windows to multiple new computers using a system image. You mount the image and use Dism to make several changes to the image, but decide not to keep any of the changes you have made to the image. The image is still attached.

Run DIsm with the /unmount-wim and /discard options.

You have an image of a Windows installation that is stored on the following network share: \\imgserv\images. You need to manually deploy the image onto a computer that has no operating system installed. You have booted the computer using WinPE and mapped a drive to the network share.

Run Diskpart

You want to configure a computer to boot to a Windows installation on a VHD file.You have downloaded the Windows AIK tools. You create and attach a virtual disk file using Disk Management.

Run ImageX to apply the install.wim image to the VHD

You have a computer that runs Windows 7. You want to perform a clean installation of Windows 10 and maintain as much of the application settings, user profile, and user data as possible.

Run Scanstate in Windows 7. Perform a custom (advanced) installation of Windows 10 to the existing hard drive. Boot into Windows 10 and re-install all applications. Run Loadstate.

You want to capture your Windows installation as a system image. You need to remove any computer-specific information from the computer prior to capturing the image.

Run Sysprep.

You would like to boot your computer to a VHD file that contains a Windows 10 installation. You will use the install.wim

Run WIM2VHD.

You would like to use an answer file to automate the process of deploying Windows to multiple computers using a system image.

Run Windows System Image Manager (Windows SIM).

You have Windows installed on a VHD on a system that is not running a hypervisor.

Run Windows from the VHD concurrently with the system's host operating system.

You need to copy files to a VHD file that contains a Windows installation.

Run diskpart.exe and then use the list, select, amd attach commands.

You want to capture the installation as a system image. You have already used Sysprep to remove machine-specific information from the reference computer. You need to exclude specific files from the ImageX capture operation.

Run imagex.exe Create a wimscript.ini file and include an exclusion list section.

You have been encrypting files on your windows notebook system using EFS and a self-signed certificate you not want to protect your encrypted files using a certificate on a smart card what should you do first

Run rekeywiz

You want to configure a computer to boot to a Windows 7 installation on a VHD file. You will use the install.wim image on the Windows installation disk. Your computer does not have the Windows AIK installed.

Run the Install-WindowsImage.ps1 PowerShell script.

You have a workstation running Windows 10 Home that you would like to upgrade to the Windows 10 Pro edition. TestOut LabSim http://cdn.testout.com/client-v5-1-10-395/startlabsim.html?culture=en-us

Run the Windows 10 Anytime Upgrade.

You have a Windows 7 system that you would like to upgrade to Windows 10.

Run the Windows 10 Upgrade Assistant.

Your Windows system has two hard drives, as shown in the image. How can you accomplish this with the least amount of effort?

Run the convert command followed by the xcopy command.

Your Windows system has two hard drives as shown in the exhibit how can you accomplish this with the least amount of effort possible

Run the convert command followed by xcopy command

You are the Windows desktop administrator for your company. You would like to manage your computers remotely using the Windows Remote Shell. You need to enable remote management on each computer.

Run winrm quickconfig.

You need to implement a solution for the Sales reps who complain that they are unable to establish VPN connections when they travel because the hotel or airport firewalls block the necessary VPN ports.

SSTP

Using Internet Options, you must set restrictions for downloading unsigned ActiveX controls.

Security

You are setting up a cloud-based Intune deployment. You have created accounts for your users, and you have defined the policies you need to manage your organization's mobile devices. You are ready to enroll mobile devices.

Set Intune as your mobile device management authority.

You manage a computer running Windows 10. You recently upgraded the computer from Windows 7. The employee who uses the computer has called to complain that the Windows 10 interface is very slow. For example, after clicking on the Start tile, the Start Menu slowly appears on the screen.

Set the visual effects for best performance.

You need to configure your Windows 10 laptop to use a VPN connection to the company VPN server.

Set up a new connection or network

Which User Experience Virtualization (UE-V) component is an XML file that defines the settings that the UE-V Agent will monitor on a user's workstation?

Settings Location Template

Which User Experience Virtualization (UE-V) component contains a user's captured settings?

Settings Package

Which User Experience Virtualization (UE-V) component is a shared folder on a server where the UE-V Agent stores users' profile and application settings?

Settings Storage Location

You want to enable Data Execution Protection (DEP) for all programs and services on your Windows system.

Settings... under Performance

Your organization's security policy specifies that any mobile device that connects to your internal network (regardless of ownership) must have remote wipe enabled. If the device is lost or stolen, then it must be wiped to remove any sensitive data from it. Your organization recently purchased several Windows RT tablets.

Sign up for a Windows Intune account to manage the tablets.

You need to deploy a new cloud-based Windows Intune deployment to manage mobile devices in your organization. You need to deploy a new cloud-based Windows Intune deployment to manage mobile devices in your organization.

Sign up for an Intune account. Create Intune user accounts. Define Intune policies. Enroll mobile devices.

You are publishing a standard desktop app in Microsoft Intune that you want deployed to the Intune Company Portal, allowing users to install it if they need it. The app is intended to be installed on Windows 10 desktop and notebook managed devices.

Software installer

Drag the BitLocker security component on the left to its description on the right. (Components may be used once, more than once, or not at all.)

Startup key Recovery key Data Recovery Agent PIN Startup key Recovery key

hich of the folloing are not features of Work Folders? (Select two.)

Storage provided by Microsoft's Internet cloud storage service Sharing of synced files or folders between users

You have just finished installing a Windows 10 reference system that you need to capture an image from. The other systems in your network that you want to deploy that image to were made by several different manufacturers and use a wide range of hardware. Therefore, you need to remove all device-specific information from the reference system prior to capturing the image.

System Preparation Tool

What data on a Windows system is monitored to create the reliability and problem history chart in Reliability Monitor? (Select two.)

System memory failures // Software installs/uninstalls

Which of the following BitLocker modes is the recommended option and provides the highest level of security?

TPM with PIN and startup key

As an administrator which can you do to make the files available as quickly as possible?

Take ownership of the files and change the permissions

You have a new set of wireless headphones that you need to set up for use with your Windows tablet device. To set up the wireless headphones, all you have to do is place them near the tablet so the tablet can communicate with them.

Tap and Do NFC

You have already used Sysprep to remove machine-specific information from the reference computer. You need to capture the image using compression, but excluding some file types from being compressed. You create a file named

The /capture, /compress, and /config options.

You've booted your home PC from a Windows To Go drive you created at work from your Windows 10 Enterprise desktop system.

The Windows Recovery Environment isn't available. The Windows Store is disabled by default.

Which User Experience Virtualization (UE-V) component is an optional component that can be used to create customized settings location templates?

UE-V Generator

You have configured a Windows server in your network to provide activation for your Windows workstations through Active Directory.

The Windows client systems and the Windows server must all be members of the same domain. The Windows client systems will remain activated as long as they remain members of the domain.

The hardware in a user's Windows 10 Professional system is configured as follows: The hardware in a user's Windows 10 Professional system is configured as follows: Integrated 100 Mbps network board You recently made the following changes to the system hardware: You installed a new 1000 Mbps network board in an expansion slot in the original motherboard.

The activation status of Windows has not changed. The system's hardware ID (HWID) has changed.

You have been given a USB drive that has been encrypted with BitLocker To Go.Which of the following options is required before you can access the data from this drive on a Windows 10 computer? (Select two.)

The correct password A smart card

Previously you can figure the following auditing settings on Windows desktop system you enable the audit object audit policy to log failed events how can you make the change with the least amount of effort possible

The local security policy stop auditing for the audit object access policy enabled the audit registry Advanced audit policy

You just created a provisioning package for Windows 10 desktops using the Windows Imaging and Configuration Designer (ICD) found within the Windows ADK.

The provisioning package can be applied to a running Windows 10 system. The provisioning package can be applied to an existing Windows 10 image.

You need to be able to create Windows To Go drives for your organization.

Windows 10 Enterprise

The hardware in a user's Windows 10 Professional system is configured as follows: Integrated 1000 Mbps network board The network board quit working recently, so you made the following changes to the system hardware: You installed a new network board in an expansion slot in the original motherboard.

The system's hardware ID (HWID) has changed. The activation status of Windows has not changed.

You are helping a user who has been running Windows 10 for over a year. You notice that some features don't look the same as they do on your Windows 10 system. For example, the title bars on windows are plain white, and the Start menu is not as polished. You wonder if this user's computer has received the latest update. The user is sure that updates have been happening, but you're not sure, so you open the Settings app and click System. On the About tab, you see the information shown below.

There is no entry for an OS Build number. There is no entry for a Windows 10 Version number.

You are viewing the reliability and problem history chart in Reliability Monitor on a Windows system. Some sections of the graph are displayed with a dotted line.

There is not enough data to calculate the stability index.

You have been running Windows 10 on your system for 6 months. You need to know which version of Windows 10 it is running, so you open the Settings app and click System. On the About tab, the information shown below is displayed.

This is not the original version of Windows 10, and it has been receiving updates.

You have been running Windows 10 on your system for six months. You need to know which version of Windows 10 it is running, so you open a command prompt and enter the winver command.

This is the original version of Windows 10, and it has not been receiving updates.

Which Internet Explorer security feature restricts the browsing session information that can be tracked by external third-party websites and applications?

Tracking Protection

You are having problems with your Windows system and have been instructed by a Help Desk technician to initiate a Remote Assistance session so she can troubleshoot the issue.

Troubleshootings

You have a laptop running Windows. You are about to give a presentation and would like to minimize interruptions to your presentation.

Turn on

You are planning to install Windows 7 on a new 64-bit computer. The computer will be joined to a domain, and you plan to configure the computer to boot from a VHD.

Ultimate (64-bit)

You're trying to establish a Wi-Fi Direct connection between a Windows desktop system and a Windows tablet device. You've installed an 802.11n wireless adapter in the desktop system, but are unable to see the tablet device. Which action must you take to see the tablet device from the desktop?

Update the wireless network adapter driver on the desktop system to one that is compatible with Wi-Fi Direct.

You have configured a USB thumb drive with BitLocker To Go that has been formatted with FAT32. You use a password to protect the drive. You have configured a USB thumb drive with BitLocker To Go that has been formatted with FAT32. You use a password to protect the drive.

Upgrade the Windows XP computer to Windows 7 Ultimate or Enterprise, or later.

You manage desktop systems for a small organization. Currently, all of your systems have the following hardware installed: CPU: AMD Sempron 2.8 GHz Windows 7 Home Premium edition came pre-installed on all of the systems, and they are currently configured to run in a workgroup environment.

Upgrade the desktop systems to Windows 7 Professional.

Management has decided to purchase new notebook systems for the users in Marketing and Sales. After conducting a needs assessment, they have determined that the new systems must meet the following requirements: They must be joined to the organization's existing Active Directory domain. A sales rep from a computer manufacturer recently offered you a very competitive price on notebook systems with the following specifications: CPU: 64-bit AMD 3.6 GHz quad-core

Upgrade the operating system to Windows 10 Enterprise.

Management has decided to purchase new desktop systems for the users in Accounting. A needs assessment has determined that the new systems must meet the following requirements: They must be joined to the organization's existing Active Directory domain.

Upgrade the operating systems to Windows 7 Enterprise or Ultimate.

After copying EFS encrypted files from comp 1 to comp 2 no one can open the files and access the data on comp 2 which can you do to give users access to files on comp 2

Use Cipher and use usmt

You want to view but not modify the Windows installation and data files in a VHD file.

Use Disk Management to attach the VHD file as read-only.

You have an image of a Windows installation that is stored on the following network share: \\imgserv\images. You need to manually deploy the image onto a computer that has no operating system installed. You have booted the computer into WinPE and partitioned and formatted the local hard drive with DiskPart.

Use imagex.exe with the /apply Use the net use command to connect to the network

You need to deploy Windows to multiple new computers using a system image on a network share. You updated the offline image with a Windows Update Stand-alone Installer (.msu) file, but the new .msu file seems to be causing a boot failure. What can you do to get the system image back to its previous state?

Use the dism /cleanup-image and /revertpendingactions options.

Your Windoes sysytem has two hard drives C and D How can you accomplish this with the least amount of effort?

Use the robocopy command to copy the file to the C:|Reports2folder

Before deploying the image, you need to append several files to the image. You want to compress the appended files to minimize disk space.

Use the same compression type as the initial capture.

You have created two virtual machines and installed the Windows 10 operating system on them. You want these machines to be able to communicate with only each other as if they were on an isolated physical network.

Virtual switch

Consider the Reliability Monitor output shown in the exhibit What does the red circle with the letter x represent?

Warning

You need to implement a wireless solution to connect Windows notebook systems with mobile devices such as tablets and phones. You need to do this without investing in additional technology. Which mobile wireless technology can leverage the existing 802.11n wireless network adapters already installed in your notebook systems?

Wi-Fi Direct

You need to implement a wireless solution to allow Windows notebook systems to send audio and video streams to projectors so employees can give presentations.

Wi-Fi Direct Miracast

Your organization has launched a new initiative that will require hiring a large number of new employees. You have been asked to implement a large-scale deployment of new Windows 10 workstations for these employees. One of the specifications you received for this deployment indicates that activation for these workstations must be handled using an internally-hosted Key Management Service (KMS) server.

Windows 10 Professional Windows 10 Enterprise

You need to upgrade a notebook system running 64-bit Windows 7 Home Premium edition to 64-bit Windows 10 Enterprise.

Windows 7 Home Premium cannot be upgraded to Windows 10 Enterprise.

In the Windows Action Center, notifications are provided for which of the following? (Select two.)

Windows Defender // Network firewall

Your organization is formulating a Bring Your Own Device (BYOD) security policy for mobile devices running Windows RT. You want to ensure that the storage devices in all Windows RT mobile devices are encrypted to prevent them from being removed and read in a different system. Which statements should be considered as you formulate your policy? (Select two.)

Windows RT devices rely on the Trusted Platform Module (TPM) in the system firmware for drive-encryption. To enable device encryption, you must sign in to Windows RT using a Microsoft account.

You have a Windows system that you would like to manage remotely. The computer connects to the network behind a firewall that blocks all but the most common ports.

Windows Remote Shell (WinRS)

Recently, you installed a Windows 10 reference system and used the ImageX command to create an image from it. Since creating the image, you have determined that several customizations need to be made. Rather than reconfigure the reference system and recapture the image from it, you decide to use the Windows Imaging and Configuration Designer (ICD) to create a provisioning package to apply the customizations to the existing image.

Windows image customization

Recently, several capacitors on the system motherboard began leaking, so you replaced it with a newer motherboard with a faster CPU. They system still uses the original hard disk and optical drive.

Windows must be reactivated. The system's hardware ID (HWID) has changed.

You have a PNY 32 GB USB 2.0 flash drive that you want to use for the Windows To Go drive.

Yes. But performance will be impacted because it is not USB 3.0 device.

You have a 64-bit computer that runs Windows 7 Professional. You would like to upgrade the computer to Windows 10 Pro. 1 GHz Processor 2 GB RAM

Yes. This system meets the system requirements for upgrading to Windows 10 Pro.

Your organization is formulating a Bring Your Own Device (BYOD) security policy for mobile devices. Which of the following statements should be considered as you formulate your policy?

You cannot use domain-based group policies to enforce security settings on mobile devices.

The computer currently boots to Windows 7 by default. You need the computer to boot to Windows 10 by default instead.

bcdedit.exe

You need to use command line tools to prepare the default drive on a Windows system for use by BitLocker. The new system partition should be 500 MB in size and should not be assigned a drive letter.

bdehdcfg -target default -size 500

You have been asked to install Windows 10 on several computers that do not have optical drives.

bootsect command to make the USB flash drive bootable. Copy the product DVD to a USB flash drive and boot from the drive. Use a USB flash drive with at least 4 GB of storage space.

You want to create a VHD file with the following settings: 200 GB F:\VHDS

create vdisk file=f:\VHDS\Win10vhd.vhd maximum=204800

Move the command line tools you would need to use to complete this task to the right. Then arrange the tools in the order that you would use them.

diskpart dism bcdboot

You need to deploy Windows to multiple new computers using a previously captured system image. Before deploying the image, which tool can you use to see a list of all the drivers included in the image?

dism

You need to deploy Windows to multiple new computers using a system image. Before deploying the image, you insert the third-party drivers from the C:\Drivers\Network and C:\Drivers\Custom directories intot the system image.

dism /add-driver /driver:c:\drivers\network /driver:c:\drivers\custom dism /add-driver /driver:c:\drivers /recurse

You need to deploy Windows 10 to multiple new computers using a system image. You have created an answer file called Win10Answer.xml in the E:\Images\AnswerFiles

dism /apply-unattend:e:\images\answerfiles

You need to deploy Windows to multiple new computers using a system image. Before deploying the image, you need to make sure there is a specific Windows application on the image.

dism /get-appinfo dism /get-apps

The hard drive in your Windows system has been protected using BitLocker. You need to update the BIOS on the computer.

manage-bde -pause

You plan to capture a Windows 10 installation on this computer and use the image to deploy to other computers. with Windows SIM. You now want to remove computer-specific information and apply the settings in the answer file before you capture the installation.

sysprep.exe /generalize /oobe /unattend:win7ent_answer.xml


Set pelajaran terkait

WW2 Lesson 2 Japan's Pacific Campaign

View Set

Know When To Hold 'Em Post Test Marketing

View Set

Chapter 71 fundamental of pediatric nursing

View Set

9.2.7 Virtual Networking Section Quiz

View Set