Windows 10 Certification

Ace your homework & exams now with Quizwiz!

33) You have an on-premises Active Directory domain and a Microsoft Azure Active Directory. You have a Microsoft Intune subscription that is linked to the Azure Active Directory. You configure directory synchronization between the on-premises Active Directory and the Azure Active Directory. You import 100 users into the Azure Active Directory. Users report that they are unable to sign into Microsoft Intune. You confirm that each user has a valid Active Directory account and password. You open the Microsoft Intune Console and see the configuration of User1 as shown in the exhibit. (Click the Exhibit button.)

a. Activate the synchronized user accounts.

14) You administer Windows 10 Enterprise tablets that are members of an Active Directory domain. You want to create an archived copy of My Documents folders that are stored on the tablets. You create a standard domain user account to run a backup task. You need to grant the backup task user account access to the folders. What should you do

a. Add the backup task account to the Backup Operators group on every tablet.

35) You plan to deploy a Microsoft Azure Remote App collection by using a custom template image. The image will contain Microsoft Office 365 apps. The image will be used to deploy a collection that will be accessed by 50 users. You need to identify licensing requirements for the deployment. Which two requirements should you identify? Each correct answer presents part of the solution.

a. An activated Office 365 ProPlus installation

19) You have a Microsoft Intune subscription. You create two compliance policies named Comp1 and Comp2. You create a configuration policy named ConfigPol1. The settings in each policy do not conflict with other policies. Comp1 has low security settings. Comp2 has medium security settings. ConfigPol1 has high security settings. You have a device named Device1. Device1 is a member of groups that have Comp1, Comp2 and ConfigPol1 applied. You need to identify which policies with be enforced on Device1. What should you identify?

a. Comp1, Comp2 and ConfigPol1

1) A company has Windows 10 Enterprise client computers. Users store data files in their user profile libraries. You need to ensure that you can restore data files to any date while minimizing system overhead. Which two actions should you perform? Each answer presents part of the solution. NOTE: Each correct selection is worth one point

a. Configure setting to save copies of files daily b. Turn on file history

21) You administer Windows 10 Enterprise client computers in your company network. You need to configure a backup and recovery solution that meets the following requirements: Recovers the system if it doesn't start. Recovers the system if the hard drive fails. Which two actions should you perform? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point

a. Create a system repair disk. b. Create a system image backup.

3)A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 10 Enterprise and are joined to the domain. Corporate police prohibits homegroups on the corporate network. You need to ensure that client computer network adapter settings do not support joining a homegroup. What should you do?

a. Disable IPV6

29 A company has Windows 10 Enterprise client computers. A client computer named COMPUTER1 has a shared folder named Folder1 located in the user's Downloads folder. Folder1 is shared only with employees in the Marketing department. All Marketing employees can connect to Folder1 from their client computers. A Marketing employee is unable to connect to Folder1 from a legacy device that is not compatible with the Windows 10 Enterprise default sharing settings. The device is able to connect to resources on other client computers. You need to configure COMPUTER1 to allow the device to connect to Folder1. Which setting should you enable?

a. Enable file sharing for devices that use 40- or 56-bit encryption

31) A company has Windows 10 Enterprise client computers. A client computer named COMPUTER1 has a shared folder named Folder1 located in the user's Downloads folder. Folder1 is shared only with employees in the Marketing department. All Marketing employees can connect to Folder1 from their client computers. A Marketing employee is unable to connect to Folder1 from a legacy device that is not compatible with the Windows 10 Enterprise default sharing settings. The device is able to connect to resources on other client computers. You need to configure COMPUTER1 to allow the device to connect to Folder1. Which setting should you enable?

a. Enable file sharing for devices that use 40- or 56-bit encryption

2) You have a computer named Computer1 that runs Windows 10 Enterprise. You add a 1 TB hard drive and create a new volume that has the drive letter D. You format the drive by using NTFS. You need to limit the amount of space that each user can consume on D: to 200 GB. Members of the Administrators group should have no limit. Which three actions should you perform? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.

a. Enable the Deny disk space to users exceeding quota limit setting b. Run fsutil quota violations D: c. Set a default quota limit

10) A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 10 Enterprise. You are configuring security for a portable client computer that does not have a Trusted Platform Module (TPM) chip installed. You need to configure local Group Policy to tum on Windows BitLocker Drive Encryption on the computer. Which two actions should you perform? Each correct answer presents part of the solution. NOTE Each correct selection is worth one point.

a. Enable the option to allow BitLocker without a compatible TPM b. Enable the Require additional authentication at startup policy setting

12) You manage Windows 10 Enterprise desktop and laptop computers for your company. They are part of a Windows Server 2012 R2 Active Directory Domain Services (AD DS) environment. The system administrators implement DFS for flexibility and availability. Laptops are able to connect to the company's private network by using local Ethernet or secure wireless. Three users report that their files on the server are missing, and they no longer have drive G. You need to ensure that the three users' computers can access the DFS namespace so that you can troubleshoot by using the DFS client. What should you do?

a. Ensure that the Net Logon service is running on all servers that are hosting the DFS namespace.

30) You have 100 Windows computers that are managed by using Microsoft Intune. You need to ensure that when a new critical update is released, the update is approved automatically and deployed to the computers within 24 hours of approval. What should you do from the Microsoft Intune administration portal?

a. From the Admin node, click Updates, and then create a new automatic approval rule.

32) You have 100 Windows computers that are managed by using Microsoft Intune. You need to ensure that when a new critical update is released, the update is approved automatically and deployed to the computers within 24 hours of approval. What should you do from the Microsoft Intune administration portal?

a. From the Admin node, click Updates, and then create a new automatic approval rule.

17) You have a computer named Client1. Client 1 is joined to an Active Directory domain. You need to join Client1 to an Azure Active Directory (Azure AD) tenant. What should you do first?

a. From the System in the Settings app, click Disconnect from organization.

11). You have a computer named Client1. Client1 is joined to an Active Directory domain. You need to join Client1 to an Azure Active Directory (Azure AD) tenant. What should you do first?

a. From the System in the Settings app, modify the sign-in options

23) You provide IT support for a small startup company. The company wants users to have Read and Write permissions to the company's shared folder. The network consists of a workgroup that uses Windows 10 Enterprise computers. You add each user to a group named NetworkUsers. You need to grant permissions to the share. You have the following requirements: All users must have Read and Write access to existing files. Any new files must allow the creator to modify the new file's permissions. Which two actions should you take? Each correct answer presents part of the solution.

a. Grant Modify permissions to the NetworkUsers group on the shared folder. b. Grant Full Control permissions to the Creator Owner group on the shared folder.

8) Note: This question is part of a series of questions that use the same or similar answer choices. An answer choice may be correct for more than one question in the series. Each question is independent of the other questions in this series. Information and details provided in a question apply only to that question. You have five computers that runs Windows 10. Each computer is used by a different user. All of the computers are members of the same workgroup. You need to ensure that all of the users can access the files located in one another's libraries. Access must be granted based on a shared password. What should you configure?

a. HomeGroup settings

4). You administer computers that run Windows XP Professional. These computers have a wide range of line of business (LOB) applications installed. You want to migrate from Windows XP Professional to Windows 10 Enterprise. You need to identify which application will prompt users for elevated privileges. What should you do first?

a. Install the Microsoft Application Compatibility Toolkit (ACT)

7) You manage desktop computers on your company network. The finance department uses computers that run Widows 7 Enterprise and a 32-bit legacy application. The application has some compatibility issues with Windows 10 Enterprise. The application uses domain single sign-on for authentication. The vendor releases a new version of the application that is fully compatible with Windows 10 Enterprise These versions cannot be installed on the same computer due to HKEY_CURRENT_USER registry setting conflicts. You need to migrate the finance department computers Widows 10 Enterprise while meeting the following requirements: Users are able to use the original version of the application while validating the new version. Once the new version is validated, the old version is removed with minimal effort. Users authenticate only once to use the application. Which technology should you choose

a. Microsoft Application Compatibility Toolkit (ACT)

22) A company has Windows 10 Enterprise client computers. Finance department employees store files in the C:\\Finance directory. File History is on. A Finance department employee attempts to restore a file to a previous version by using File History. The file is not available to restore. You need to establish why the file history is not available and ensure that it is available in the future. Which two actions should you perform? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.

a. Move the file into a library. b. Review the File History backup log.

34) Note: This question is part of a series of questions that use the same or similar answer choices. An answer choice may be correct for more than one question in the series. Each question is independent of the other questions in this series. Information and details in a question apply only to that question. You have a laptop that is joined to an Active Directory domain. You establish a Wi-Fi connection to a customer's Wi-Fi network. You need to identify whether the current network location of the Wi-Fi connection is private or public. Which Control Panel application should you use?

a. Network and Sharing Center

5). Note: This question is part of a series of questions that use the same or similar answer choices. An answer choice may be correct for more than one question in the series. Each question is independent of the other questions in this series. Information and details in a question apply only to that question. You need to change the password used for an L2TP VPN connection. Which Control Panel application should you use?

a. Network and Sharing Center

16) You administer Windows 10 Enterprise. Your network includes an Active Directory domain and a standalone server in a perimeter network that runs Windows Server 2008 R2. Your company purchases five new tablets that run Windows 8. The tablets will be used to access domain resources and shared folders located on the standalone server. You need to implement single sign-on (SSO) authentication for tablet users. You also need to ensure that you can audit personnel access to the shared folder. Which two actions should you perform? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.

a. On the stand-alone server, create user accounts that have the same logon names and passwords as the user domain accounts. b. Join the tablets to a domain.

9) Your company network includes a main office and multiple small branch offices. All of the computers in the branch offices run Windows 10 Enterprise and are members of an Active Directory domain. The company has no plans to deploy any servers in the branch offices. Users from some branch offices report that it takes a long time to open documents from a file server that is located in the main office. You need to enable BranchCache on all computers located in the branch offices. What should you do?

a. Open Group Policy Editor and enable BranchCache in Distributed Cache mode for the computers in the branch offices

6). You administer Windows 10 Enterprise tablets that are members of an Active Directory domain. Your company policy allows users to download and install only certain few Windows Store apps. You have created a new AppLocker Packaged Apps policy to help enforce the company policy. You need to test the new AppLocker Packaged Apps policy before you implement it for the entire company. What should you do?

a. Open Group Policy Management console and enforce the new AppLocker Policy in Audit only mode

13) You are an IT professional for a bank. All of the user's files on the external drives are encrypted by using EFS. You replace a user's computer with a new Windows 10 Enterprise computer. The user needs to connect her external hard drive to the new computer. You have the original computer's certificate and key. You need to import the certificate and key onto the new computer. Into which certificate store should you import the certificate and key?

a. Personal

25) Note: This question is part of a series of questions that use the same or similar answer choices. An answer choice may be correct for more than one question in the series. Each question is independent of the other questions in this series. Information and details in a question apply only to that question. You make a folder available for offline use. Currently, the folder is synchronizing and will take approximately 15 minutes to complete. You need to ensure that the files continue to synchronize when you close the lid of the computer. Which Control Panel application should you use?

a. Power Options

15) You support Windows 10 Enterprise computers. Your company protects all laptops by using the BitLocker Network Unlock feature. Some employees work from home. You need to ensure that employees can log on to their laptops when they work from home. What should you do?

a. Provide employees with their BitLocker PINs.

28) You plan to deploy a customized Windows To Go workspace that uses an Unattend.xml file. You need to prevent a local fixed disk from appearing in File Explorer when a computer starts from Windows To Go. Which setting should you modify in Unattend.xml?

a. SanPolicy

24) You administer Windows 10 Enterprise client computers in your company network. A computer that is used by non-administrator users has a directory named C:\\Folder1. A shared collection of Microsoft Excel files is stored in the C:\\Folder1 directory, with non-administrator users being granted modify permissions to the directory. You discover that some files have been incorrectly modified by a user. You need to determine which users are making changes to the files in the directory. Which two actions should you perform? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point

a. Set local policy: Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Audit Policy \\Audit object access to Success.

20) You are the desktop administrator for a small company. The company modifies its policy for retaining company financial documents from six months to three years. You currently use File History, retaining files for six months and saving copies of files every 20 minutes. You need to adjust your current backup solution to accommodate the policy change. What should you do?

a. Set the Keep Saved Versions option in File History to Forever.

27) Note: This question is part of a series of questions that use the same or similar answer choices. An answer choice may be correct for more than one question in the series. Each question is independent of the other questions in this series. Information and details in a question apply only to that question. On the corporate network, you have an Active Directory user account. The domain contains a sync share named Share1. You have a personal computer that runs Windows 10. The computer is a member of a workgroup. You need to access the files in Share1. Which Control Panel application should you use?

a. Sync Center

26) Note: This question is part of a series of questions that use the same or similar answer choices. An answer choice may be correct for more than one question in the series. Each question is independent of the other questions in this series. Information and details in a question apply only to that question. Your network contains a shared folder that is located at \\\\server1\\data. On a computer, you make the shared folder available for offline use. You need to ensure that you have the most up-to-date version of the folder cached. Which Control Panel application should you use?

a. Work Folders

18) Your network contains an Active Directory domain named contoso.com. All client computers run Windows 10 Enterprise and Microsoft Office 2013. All of the computers are joined to the domain. Your company purchases a subscription to Office 365. An administrator creates an Office 365 account for each user and deploys a federated solution for Office 365. You need to prevent the users from being prompted for a user account and a password each time they access services from Office 365. Which account should you instruct the users to use when they sign in to their computer?

a. a contoso.com account


Related study sets

Chapter 19: Disorders of Visual Function

View Set

A&P Lab Exercise 3 The Microscope

View Set

CHEM 112 ICE TABLE SB ASSIGNMENT

View Set

Physics Practice Questions - Quiz- Heat

View Set

MSN 377: Ch 70 Workbook Questions

View Set

Early Beliefs About the Origin of Life

View Set

Legal Environment of Business (MindTap) 8-11 & 23

View Set