Intro windows server final study prep
What IEEE standard supports a maximum data throughput of 600 Mbps and functions on 2.4 and 5 GHz radio frequencies?
802.11n
Your supervisor has asked you to provide information regarding the use of File History with Group Policy. Specifically, the supervisor wishes to know what settings are configurable. What statement is accurate?
Only the ability to turn off File History exists in Group Policy.
A VPN client's account was recently compromised after use at a public wifi hotspot. After examining the client settings, you determine that the password was sent in clear text. What authentication protocol was used?
Password Authentication Protocol
What sign-in method for Windows 10 requires a user to press CTRL + ALT + DELETE before they can sign in?
Secure sign-in
When applying NTFS permissions, what statement accurately reflects best practices?
Standard NTFS permissions should be utilized wherever it is possible to use them, rather than use individual NTFS permissions.
What statement regarding the Current Branch for Business servicing branch is accurate?
The branch is updated four months after the Current Branch, and is then updated for another 4 months after that.
If a computer is in the S0 state, what is it doing?
The computer is currently working, and is fully functioning.
What two items are not integrated into Microsoft account profile synchronization? (Choose two.)
installed drivers documents on C: drive
What option when passed to the powercfg.exe command will display the settings in a power plan?
/Query
What is NOT a valid method for configuring the RemoteApp and Desktop Connections URL for clients on a network?
A DHCP option can be set to distribute the configuration to all DHCP enabled clients.
You are deploying an .msi application on the network, but have discovered that the application requires user input during install. How can the deployment of this application be automated, despite the requirement?
A transform file can be created to provide the information requested by the application.
What encryption type is used by the WPA2-Personal and WPA2-Enterprise wireless security types?
AES
When using Protected EAP, how is the authentication process protected?
All authentication is protected using the SSL standard.
What statement correctly describes the process by which an Apple device may be managed by Microsoft Intune?
An administrator must request an APN certificate using a CSR from Intune, and must maintain access to an Apple ID.
What statement reflects a valid use case for deployment of Windows To Go?
An organization wants to provide a standard environment for users to work in when they are not in the office.
When enabling the "Turn on password protected sharing" for the Public folder, how are accounts granted access?
Any valid local or domain user account can be used to access the share.
What statements reflect valid requirements for placing content into Intune's cloud storage? (Choose two.)
Application installation files must be consolidated into a single folder and subfolders in order to be uploaded properly. A single file within the chosen target to upload cannot exceed 2 GB in size.
Regarding the deployment of Remote Desktop to mobile devices, what statement is accurate?
Both Android and IOS devices have Microsoft Remote Desktop clients available for use with RDP services.
What is the result of connecting to a new network and selecting the location as "public network"?
Communications initiated by other computers on the network are blocked by default, and your computer is not able to share files or printers on the network.
You are reviewing the available updates for clients in Microsoft Intune, and have discovered a large number of updates are available. What is the most efficient way to approve the updates for install?
Enable automatic update rules for specific categories relevant to the downstream devices.
A DFS client is connecting to a DFS target that differs from the preferred target. By default, what will cause the DFS client to connect to the preferred target? (Choose two.)
If the "Clients fail back to preferred targets" option is selected, then it will occur during the next refresh. It will occur during the next startup process, which forces the cache to be cleared.
What occurs if an Intune configuration policy modifies the same setting as a Group Policy for a domain member device?
If the device is able to log into the domain, the Group Policy setting has higher priority, otherwise the Intune setting is used.
Windows 10 computers that support and enter the Modern Standby mode are most similar to devices that are in what ACPI power state?
S3
What component of the Application Compatibility Toolkit is used to identify applications that are installed on desktop computers?
Inventory-collector package
When configuring audit policy settings, what does the Object Access event category include?
It includes audit information to track access to files, folders, and registry keys.
When configuring Windows Firewall rules, what tab under a rule's properties allows you to restrict connections to include or exclude specific users or application package properties?
Local Principals
The use of external links inside of Intune is only available to user groups using what deployment actions? (Choose two.)
Not Applicable Available Install
After performing a recent update to the video card drivers on a Windows 10 workstation, you begin to experience instability. What should you do?
Perform a rollback of the driver for the card.
After creating a virtual machine on a host with a single external network connection, you lose network connection on the host. The virtual machine guest appears to be able to communicate with the network. What is most likely the cause?
The "Allow management operating system to share this network adapter" option has been disabled.
You have connected to a public network with your Windows 10 computer, and have enabled an exception for a specific application in Windows Firewall. You have verified the correct ports and traffic are configured in the exception. However, the application is still being blocked from access. What is most likely the issue?
The "block all incoming connections, including those in the list of allowed apps" setting is checked.
What statement accurately describes the use of the 255.255.255.255 IPv4 address?
The 255.255.255.255 address is used as a broadcast address to send traffic to all locally connected devices.
What statement reflects a functionality that is NOT available in the Intune desktop client?
The Intune client can perform operating system upgrades automatically.
When using Kerberos for IPSec authentication, what statement is accurate?
The VPN client computer and remote access server must be members of the same Active Directory forest.
You are configuring the use of automatic update rules for Microsoft Intune. Your company has instructed that new updates must be applied within 90 days after approval. What statement regarding automatic update rules is accurate given this scenario?
The automatic updates can only be delayed for up to 28 days after approval.
Using the default configuration for EFS, what happens if a user loses the EFS key?
The data is unrecoverable.
When performing an upgrade to Windows 10 from Windows 7, what occurs to any user profiles that are on the system being upgraded?
The profile settings are maintained through the upgrade, so that when the user signs in, the settings haven't changed.
A user on a Windows 10 Enterprise workstation connected to an IPv4 only network is attempting to share libraries over a homegroup network. However, the user discovers the libraries are not properly being shared. What is the issue?
The sharing of libraries over homegroup networks requires that IPv6 be available, at least locally.
Three hard drives that make up a single storage pool are moved from one Windows 10 machine to another. What happens to the storage pool on the new host computer?
The storage pool becomes available for read/write operation without user intervention.
A user is attempting to enable system protection for a FAT32 formatted data drive containing compressed data, but finds they are unable to proceed. What is the problem?
The system protection feature requires the use of an NTFS formatted drive.
When setting up the Office 365 tenant account, what statements are accurate? (Choose two.)
The tenant account must be created before any users can be added to Office 365 under the tenant. The nickname used for the Office 365 tenant can't be changed without destroying the tenant account.
A technician at a remote site has been tasked with the setup of a three-way mirror on a Windows 10 system with three physical SATA hard drives for the pool. The technician tells you that the system will not allow the creation of the three-way mirror storage pool. What is most likely the issue?
The three-way mirroring feature requires a minimum of five physical drives to be members of the storage pool.
A new user at a small company utilizing workgroups requires network access. What must be done in order to enable the user's access to resources on the network? (Choose two.)
The user must be created on all workgroup computers that will be accessed. Permissions must be configured for all workgroup computers that the user will access.
What Windows 10 tool can be used to move desktop settings and applications from one computer to another?
User State Migration Tool
What statement regarding the use of virtual machine based virtual desktops is accurate?
Users each have their own dedicated operating system services.
What will be the effect if a domain workstation's clock is off by more than 5 minutes in comparison to the domain controllers for the domain?
Users will not be able to log into the workstation because authentication can't be performed when clocks are not synched.
You are configuring test bed workstations for developers in your network that need to have access to the latest and greatest Windows 10 features. What servicing branch should you use?
Windows Insider Preview Branch
What statement regarding the use of domain computers in conjunction with non-domain workgroup-based resources is accurate?
Workgroup resources can be accessed by domain computers as long as a valid user ID and password is provided to authenticate to the remote system.
A folder exists on your workstation that has had all permission inheritance removed and all permissions removed. As owner of the folder, what are you able to do with the folder?
You are able to assign yourself the Full Control permission.
What type of broadband service provides a high speed Internet connection over telephone lines?
digital subscriber line
While trying to clear a stuck print job by stopping the print spooler service, you receive an error that the spooler can't be stopped. What process can be killed using Task Manager to kill the spooler service?
spoolsv.exe