Windows Client Pro

Ace your homework & exams now with Quizwiz!

The first account created on a Windows system during installation is given what level privileges?

Administrator

Which of the following are found in the East of Use options?

Cursor and pointer High contrast

What are the two types of groups Microsoft system provide?

Distribution Security

Your company wants to activate Enterprise licenses on a one-time basis by calling Microsoft. Which of the following activation processed will they need to use?

Multiple Activation Key (MAK)

Which of the following are valid IPv6 addresses?

bab3:b834:45a3:0000:0000:762e:0270:5554 35BC:FA77:4898:DAFC:200C:FBBC:A007:8973

Which of the following utilities allows you to change the startup type of a service of Automatic (Delayed)?

services.msc

What's the benefit of using User Account Control (UAC)?

Elevate privileges to complete specific tasks without logging in as admin.

You have open the Indexing Options dialog and navigated to Advanced > Files Types tab. From this page, you can specify how the file should be indexed. Which of the following options are available? (Select two.)

Index Properties and File Contents Index Properties Only

Your Windows 10 computer has two hard drives. The C: drive is the system drive, and the D: drive holds data files. You perform a system image backup that includes both drives using the Backup and Restore console. You computer takes regular restore point snapshots. One day, you find that the D:\finances folders has been deleted. You check previous version of the drive, but find nothing listed. Which action can you take to restore the folder and its contents as quickly as possible?

Mount the .vhd file in the backup and then copy the folder to the drive.

You recently set up a DHCP server and need to configure your computer to start using it. Click the IPv4 properties option that you would select to use the DHCP server to receive IP configuration information

Obtain an IP address automatically

You need to customize which utilities and programs loads on your Windows system at startup. What should you do?

Run System Configuration

The PowerShell command line interface (CLI) uses simple command construction. What is the typical form of a PowerShell command?

verb-noun -adverb

Match each description on the left with the corresponding slmgr command option on the right.

/ato Activates Windows /dli Displays summary license information /xpr Displays a license's expiration date /dlv Displays detailed license information /ipk Installs a new product key

Which data transmission rate is defined by the IEEE 802.11b wireless standard?

11 Mbps

You need to determine the binary equivalent of the IPv4 address 192.168.1.1. What is the correct binary version of this IP address?

11000000. 10101000.00000001.00000001

Which block of addresses is defined for use with Automatic Private IP Addressing (APIPA)?

169.254.0.0/16

You are designing a wireless network for a client. Your client needs the network to support a data rate of at least 54 Mbps. In addition, the client already has a wireless telephone system installed that operates 2.4 GHz. Which 802.11 standard will work best in this situation?

802.11a 802.11n

You need to configure Remote Assistance on your Windows system so that invitations can only be used from computers running Windows Vista or later. Click the System Properties option you would use to do this.

Advanced

Your remote users run a Universal Windows Platform (UWP) application that requires access to certain files on a network share each time it runs. What would you implement in order for your remote users to make sure that the network resources are always available when they run that application?

Application trigger

One of the users support VKumar, has just turned on File History and selected the internal D: drive as the location to which his files will be copied. By default, which directory does File History copy files from to save on the D: drive?

C:\Users\VKumar

Your Windows workstation has a binary address of 00001010.00000000.01000001 assigned to it. Which class of IP addresses does this address fall within?

Class A

You want to set up a Windows device with a 4-digit PIN for authentication. Which should you do? (Select two.)

Click Create a PIN. Open the Setting app and click Accounts > Sign-in options.

Several weeks ago, you installed a desktop application on your Windows system using the default the parameters suggested by the application installer. After, after using the application for a time, you realize that you need an optional application feature that wasn't included in the default installation. You have opened the Settings app and have navigated to the Apps and features page. You have also selected the application. Using the least amount of effort, what would you do to add the optional features?

Click Modify.

You are researching the hardware components to assist power management in your users' Windows 10 laptops. Chose the three most common components.

Common components to help with power management CUs Lower-power hard drives Mobile graphic cards

You need to configure the following power options on your Windows notebook system when running on battery power: Put the computer to sleep after 15 minutes of idle time, Have the wireless adapter enter a strict power saving mode. Shut down the computer if you close the lid. What should you do?

Configure the advanced settings of any power plan.

How do you configure your Windows 10 system to require all removable data drives to mount as read-only unless the device is protected with BitLocker To Go?

Configure the local Group Policy.

Which application would you use to include device updates with Windows Update?

Control Panel

Your company has started the transition to IPv6. You need to configure records on the DNS server so that clients can submit an IPv6 address and receive the host name for that computer. What should you do?

Create PTR records

Which special permissions specifies whether a user can make changes to the end of the file but not change, delete, or overwrite existing data?

Create folders / append data

Which of the following describes the role of a DHCP server?

Delivers DNS server addresses and other configuration information to hosts. Automates the process of assigning IP address, subnet masks, and default gateway address to network hosts.

When you right-click the Start menu tile, the following menu of configuration tools appear. Select the configuration tool that lets you create a virtual hard disk (VHD).

Disk Management

What is it called when the hard drive light on your PC is staying on constantly, and the application have slowed down significantly?

Disk thrashing

Which of the following tools log significant events on a computer, such as when a process encounters an error?

Event Viewer

Below is an image of the Windows 10 interface. Select the icon that is used to view the file system on a Windows 10 system.

File Explorer

Which action can you take to see disk activity performance for an application running on your Windows system?

Filter by the application in Resource Monitor.

You have a computer running Windows 10. The C: drive holds all system files and is the boot volume. The C: volume holds only user data files. You want to schedule a backup that includes everything on the C: and D: drives so you could restore your entire computer if necessary. How do you configure the backup to run on Monday, Wednesday, and Friday?

In Windows Task Scheduler, create a task to run wbadmin.

You need to connect to a remote Windows system using Remote Desktop. How can you copy files from your local hard drives to the remote computer with the least amount of effort?

In the Remote Desktop Connection options, edit the local devices and resources options.

You need to install an updated driver for a hardware device on your Windows system. You need to use a driver file that has been tested by Microsoft and is from a legitimate source. What should you do?

Install an updated driver with a digital signature.

What are some reasons that the Microsoft Store for Business so appealing? (Select two.)

Legal Financial

You manage a Windows system that is a member of a Workgroup. The computer is shared by three users. Each user has a standard user account. Mary is one of the three users of this computer. She wants to access the computer using a Remote Desktop connection. How do you allow Remote Desktop access for Mary while granting her the least amount of privileges possible?

Make Mary's user account a member of the Remote Desktop Users group.

You have a new windows notebook system with both wired and wireless network adapters. You want to configure a small wireless network at home. You install an access point/router device that connects your network to the Internet. You have turned off SSID broadcast on the access point. You will connect the device using a pre-shared key. You need to configure your notebook to connect to the wireless network. You would like to use the most secure method available as well. What should you do? (Select two)

Manually create a network profile. Use WPA2-Personal security.

What is the cloud computing system that provides services such as Access, Excel, and Outlook called?

Microsoft Office 365 ProPlus

This tool allows a business to create a private store and load it with just the apps needed for their business. What is this tool called?

Microsoft Store for Business

You have opened the System Information app, which is now displaying the System Summary. Which information can be seen from this view?

Name of the operating system, the operating system manufacturer, and system model number.

You would like to leverage services like machine learning together with cloud-based technology to provide more security for your organization. Which Defender ATP component would you implement?

Next Generation Protection

You need to create a recovery drive for your Windows system. To do this, you've procured a USB flash drive with the following characteristics: USB version 2.0 Capacity: 4 GB Can you create a recovery drive using this device?

No. The device must be 8 GB (or larger) in size.

You have two computers. ComputerA is running Windows 7. ComputerB is running Windows 10. You need to migrate all user profiles and data files from ComputerA to ComputerB. Which command options must you include to ensure the user accounts on the destination computer are created and enabled during the migration?

On Computer B, run loadstate with the /lae and /lac options.

You have a computer running Windows 8.1. You want to migrate to Windows 10 using a wipe-and-load migration to transfer files and folders. Which of the following methods could you use?

PCmover Express

On the C: drive, what is the difference between the Program Files folder and the Program Files (x86) folder?

Program Files keeps the 64-bit files, while Program Files (x86) keeps the 32-bit files.

You want to implement 802.1x authentication on your wireless network. Which of the following will be required?

RADIUS

NTFS permissions include which of the following? (Select three.)

Read & execute Special permissions Full control

You have a Windows system that is shared by multiple users. Sally wants to access a file in the Reports folder. A group Sales has been granted the Full Control permission to the Reports folder and all subfolders and files. You add Sally as a member of the Sales group, but she still cannot access the file that she needs. You want to let Sally access the Reports folder?

Remove Sally from any other groups that have been explicitly denied access to the Reports folder.

You manage a Windows system with an attached printer. You share the printer using a share name of Printer1. You assign the Print permission for the printer to the Sales group. Then you discover that users who are not members of this group can print to the printer. How do you configure permissions so that only members of the Sales group to print to Printer1.

Remove the Everyone group from the printer's access control list.

You have a Windows system that you use at home on a small network shared by members of your family. You want to share the contents of a folder with other users over your network. Most users should have read-only access, but you want to explicitly deny access to other users. How can you configure the permissions using the least amount of effort possible?

Right-click the folder and select Properties. On the Sharing tab, configure Advanced Sharing on the Sharing tab.

You Windows 10 computer has two hard drives formatted with NTFS. You have enabled System Restore on both disks. How can you delete all restore points except for the last restore point?

Run Disk Cleanup

You have an app installed on your Windows system that has not been pinned to your Start menu. How can you locate the app (select two.)

Search for the app by typing it's name in the search field on the taskbar. Click the Start tile, and then and then scroll through the list of apps.

You are using the Office 365 Admin center to deploy Microsoft Office 365 to your end users. Your purchased the Office 365 Business plan, which includes the following versions of Office: Office 2016 Office 2013 Office 2011 You want to limit users to just the Office 2016 version of the product. Click on the option in the Office 365 Admin center that you would use to do this.

Service Settings

You need to enable Remote Registry on your Windows desktop system. Click the Task Manager option you would use to do this.

Services

Your Windows system hosts the shared printer displayed in the example image. This printer is heavily used by workgroup users in your department. Click the tab you would use in the Printer Properties dialog to enable client-side rendering and reduce the load on your local system.

Sharing

What tool can be used to automatically fix common startup problems?

Startup Repair

You want to show reminders and incoming VoIP calls on the lock screen. Which of the Setting app categories would you use to make this adjustment?

System

Which of the following are minimum requirements to implement Credential Guard? (Select three.)

TMP chip on motherboard CPU virtualization extensions Windows Secure Boot

Which of the following BitLocker modes is the recommended option and provides the highest level of security?

TPM with PIN and startup key

Which of the following are examples of the something you do authentication method? (Select two.)

Taking a typing test Handwriting sample

You have a utility on your computer that needs to run regularly on a set time and day each week. What tool would you use to accomplish this task?

Task Scheduler

What is the main purpose of the dxdiag utility?

Test the system's multimedia capabilities.

You do not use the Microsoft XPS Document Writer. Which option could you use to disable it?

Turn Windows features on or off

You have installed a test network with one server and two WIndows workstations. All running IPv6. You have disabled IPv4 and now want to test to make sure that IPv6 is used to communicate between hosts. You want to ping the link-local address for a host. Which command can you use to do this?

ping FE80::AB134:7845:10C:9956%12

Which command would you enter in Command Prompt to list all third-party drivers on a Windows system?

pnpputile -e

You want to set the power scheme using the command line. Which command would you use?

powercfg

You want to set the power scheme using the command line for power management. What command would you issue in Command Prompt?

powercfg /s guid

You need to find out if there are any device drivers on your system that do not have a digital signature. Which of the following tools should you use?

sigverif.exe

You need to enable a Secondary Logon on your system. Where do you go to do this?

Services

How should cmdlets in a PowerShell script be organized?

In the order that they should run

As an administrator, you are very concerned with network, application, device, user, and data security. You want to minimize the number of places where an attacker could compromise your devices or networks. Which Defender ATP component would you implement?

Attack Surface Reduction

What is the name of the process of submitting and checking credentials to validate or prove user intentity?

Authentication

You are about to install a new desktop application that you downloaded from a website. What should you do before you start the installation?

Create a restore point. Scan the installer for malware.

Match the function description on the left with the appropriate netstat command option on the right.

-a Displays all connection and listening ports -n Displays addresses and port numbers in numerical form. -b displays the executable that created each connection or listening port -e Displays Ethernet statistics -o Displays the owning process Id associated with each connection -r Displayed the routing table -p Shows connections for a specific protocol -s Displays per-protocol staticsics

What are the most common types of files used to install Windows desktop applications? (Select two.)

.msi .exe

You need to run the zip.exe executable on your Windows system as the Admin user (which is a member of the Administrators group) on your system. To accomplish this, which option should you use with the runas command?

/user:Admin

Which of the following describes a system image backup? (Select two.)

A system image contains everything on the system volume, including the operating system, installed programs, drivers, and user data files. A system image backup consists of an entire volume backed up to .vhd files.

What is used to provide security groups access to system resources?

ACL

You've decided to use a subnet mask of 255.255.192.0 with your 172.17.0.0 network to create four separate subnets. The network ID for one of the subnets is 172.17.0.0. You are installing the first host (a server) on this subnet, and you want to assign the lowest numbered IP address possible to the system. What should you do?

Assign the system an IP address of 172.17.0.1

Your systems have been hacked! As you try to discover the extent of the breach, you realize that you need help accessing the depth of the attack and amount of damage. Which Defender ATP component would you utilize?

Automated Investigation & Remediation

Which of the following would require you to enter a product key to activate Windows 10?

Buying a new or refurbished device running Windows 10

You connect your Windows laptop to the network at work to allow an associate to copy files from your computer. Other computers on the network are not able to discover your computer. You open the Networking and Sharing Center and see information shown in the image. How can you make your computer visible to other computers on the network?

Change the network type to Private.

You are using the Systems Information utility, and you want to see the size of the disks installed and how much fee space you have. Which option would you expand?

Components

Office deployment is managed from the Office 365 Admin center. What can be done from the Dashboard on Admin center? (Select two.)

Configure Office 365 services through Service Settings. Perform administrative tasks like managing users.

While managing the available memory for applications on your Windows system, you discover that the paging file is set below the recommended size. Which answer is a common recommendation for setting the size of the paging file?

Configure the paging file to one and a half to two times the amount of physical RAM.

Sales team members use standard user accounts to log on a shared notebook computer. You want to allow users to change the system time and the time zone. How can you grant users this ability while limiting their ability to perform unrelated tasks?

Configure user rights for the sales group in the Local Security Policy.

Your Windows system has two volumes defined. The C: volume contains the Windows system and is formatted with NTFS. The D: volume is formatted with FAT32. Which action must you take to create a system image backup with the D: volume as the destination?

Convert the D: drive to NTFS.

You have been asked to install Windows 10 on several computers that do no have optical drives. What should you do? (Select three.)

Copy the product DVD to a USB flash drive and boot from the drive. Use the bootsect command to make the USB flash drive bootable. Use a USB flash drive with at least 4 GB of storage space.

Your company has started the transition to IPv6. You need to configure records on the DNS server so that clients can submit a hostname query and receive back an IPv6 address for the specific host. What should you do?

Create AAAA records.

You have a WIndows 7 Enterprise system that you are upgrading to Windows 10 Enterprise. You've already purchased and downloaded the installation ISO file and burned it to a DVD. Next, you ran the Windows 10 Upgrade Assistant. It alerted you to the fact that you needed to install the latest update to Windows 7 before proceeding with the upgrade. Everything else on your system meets the Windows 10 requirements. After installing the latest Windows 7 update, which of the following are recommended steps you should perform to prepare for the upgrade? (Select three.)

Create a system image. Gather installation discs and product keys for applications you want to keep. Back up your data.

You visit your grandmother, and she complains that she saved some pictures her friends had posted on social media, but she can't find them anymore. You turn on her computer to realize her desktop is completely covered with files and pictures. What is the best way to help your grandmother find what she's looking for?

Create folders and sort files by type.

Consider the Reliability output shown below. What does the red circle with the letter x represent?

Critical Event

Microsoft Defender ATP can be combined with Intune to form a robust and powerful security system for all mobile devices on the network. The organization must meet which of the following three requirements? (Select three.)

Defender ATP Requirements Licensed for Enterprise Mobility + Security Have an Intune account with Azure Active Directory Have a Microsoft Defender and access to the Security Portal

Using the Settings app, you have accessed Windows Update > Delivery Optimization. What function does this open provide?

Delivery Optimization provides you with Windows and Store app updates and other Microsoft products.

You are using the Services app. You have double-clicked on a service. Which tab will allow you to see the system drivers that the service uses?

Dependencies

Which of the following measures will make your wireless network invisible to the casual attacker?

Disable SSID broadcast

You want to prepare a USB flash drive that you can use as a Windows 10 installation source. Which of the following tools can be used to prepare the USB flash drive? (Select three.)

DiskPart Windows 7 USB/DVD Download Tool Media Creation Tool

You would like to update the video driver that is used on your computer. Click the hardware category type you would expand to make this change.

Display adapters

Which Group Policy settings, when disables, forces users to update their system before the system is shut down?

Do not display Install Updates and Shut Down option in Shut Down Windows dialog box.

While working from home, you prepared to share a project folder with your team at work. When you arrived at the office, you told your team about the folder, but they couldn't find it on the network. You're sure you remember correctly configuring your sharing options by turning on Network discovery and File and printer sharing. Click on the network profile you should open to make sure these options are turned on for your team at work to access the folder.

Domain

A user has connect their phone to a computer using Bluetooth. The computer automatically locks when the user walks away with the phone. Which sign-in setting is being implemented?

Dynamic lock

Which of the following are prerequisites to set up a Microsoft for Business? (Select three.)

Each employee much have their own Azue AD user account. All employees must be running Windows 10. The organization much have a Microsoft Azure Directory domain configured.

You need to migrate specific application settings from ComputerA to Comptuer B by using USMT. What should you do? (Select two.)

Edit the config.xml file Run scanstate with the /genconfig option.

You need to configure content-based restrictions for apps available to child users in the Windows Store. Which Accounts option do you use to set these restrictions?

Family & other users

Which of the following are types of operating system updates for Windows 10 powered by Microsoft? (Select two.)

Feature updates Quality updates

How do you manage the items in the Windows Action Center?

From the Settings app.

You have been put in charge of providing a VPN solution for employees who work remotely. When these employees change locations, they lost their VPN connection. You want them to automatically reconnect if the VPN connection is lost or disconnected. Which VPN security protocol supports the VPN Reconnect functionality?

IKEv2

By default, Windows does not show file extensions for known file types. When is displaying file name extensions most useful?

Icons view

Inputting a username and password falls under which of the following? (Select two.)

Identification Authentication

When should you start monitoring system performance?

Immediately after the system is set up.

You want to use BitLocker on a laptop that belongs to a domain. Your implementation should meet the following requirements: The laptop should start without requiring a PIN or a USB device. To meet security requirements, USB support must be disable on the laptop. The computer should automatically recovery keys and store them in a central location. How can you implement a solution that meets the stated requirements? (Select two. Each answer is part of the complete solution.)

Implement BitLocker with a TPM. Configure Group Policy to store recovery keys in Active Directory.

You manage several Windows systems that are members of a domain. Your company has an internal website that requires HTTPS. The website's certificate is self-signed. You use HTTPS to browse to the website and receive the warning message as seen in the image. What must you do to prevent the warning message from appearing when you access the website?

Import the website's certificate into the Trusted Root CA list.

You want to use a USB flash drive as a system recovery drive. Which of the following steps can you use to launch the utility you must use to perform this task?

In the taskbar search field, type Create a recovery drive. Then select the Create a recovery drive entry in the search results.

Which special feature does your webcam need to support facial recognition?

Infrared

Addresses that are valid on only the current subnet are known as:

Link-local

The applications below are only available through the Microsoft Store, and you must be signed into your Microsoft account to download them. Which type of applications are they?

Microsoft Store apps

Standard user accounts have the rights and privileges required to perform which of the following tasks? (Select two.)

Modify advanced display settings. Troubleshoot network connectivity.

Ho do you increase the size of the paging file on your Windows system?

Modify the Advanced system settings.

Office 365 ProPlus can be deployed to your enterprise. When doing so, which tools enables you to choose the language, hardware architecture, and the version of Office you want to install?

Office Deployment Tool

Which Settings app category would you use to customize the appearance and behavior of the Start menu?

Personalization

Which power plan enables your Windows system to have as much battery power as possible?

Power saver power plan

You manage 20 Windows systems in a domain network. You want to prevent the Sales team members from making system changes. Whenever a change is initiated, you want to allow only those who can enter administrator credentials to be able to make the change. You open Group Policy Editor to configure the User Account Control: Behavior of the elevation prompt for standard users policy. Which setting should you select for this policy?

Prompt for credentials

You are on an airplane. You are instructed to turn off your Windows system completely and immediately. You have several open windows with critical data that you cannot lose. What should you do?

Put the notebook into hibernation.

After upgrading a video driver on a Windows system, the screen becomes unresponsive. You need to get the system working properly with the least amount of effort and time. Which of the following options can you use to get your Windows system back to a stable state?

Reboot the computer with the Windows installation disk and select Repair your computer to launch the system restore utility. Reboot the computer into Safe Mode and use Device Manager to roll back the driver.

Which steps must you take to uninstall an app you installed from the Windows Store?

Right-click the app tile and click Uninstall.

Your network has just transitioned from using IPv4 to IPv6. IPv6 configuration is performed automatically using information received by network routers. The network does not use a DHCPv6 server. Your Windows system is unable to communicate with a server named Srv1. A ping test to the server works using its IPv6 address, but fails when you use its host name. What should you do?

Run netsh with the add dnssserver option.

You need to see a list of third-party drivers on a Windows system. What should you do?

Run pnputil -e in Command Prompt.

You have a Windows 7 system that you would like to upgrade to Windows 10. How can you make sure that everything in your current system is compatible with Windows 10?

Run the Windows 10 Upgrade Assistant

You are troubleshooting a problem that keeps occurring on your Windows system. When the problem happens, there are several Warning and Error events logged to the Application log in Even Viewer. You create a Custom View that shows only Warning and Error events. During troubleshooting, you filter the Custom View to show only Error messages. How can you create a new Custom View using the current filter settings?

Save the filter to a Custom View.

You need to make sure the Users group has the List folder contents and Read permissions on the TestOut folder. Click on the tab that allows you to verify the permissions the Users group has to this folder.

Security

Which of the following Windows Hello options most likely requires a device to be purchased?

Security key

After running the Backup and Restore console on your Windows computer, you notice that backups are not created for open files. To troubleshoot the issue, you want to confirm that the Volume Shadow Copy Service (VSS) is running and configured to start automatically when the computer boots. Which tool can you use to make sure VSS is configured to start automatically?

Services

Once you have opened Printer Management, you can right-click on a printer. From there, which of the following tasks can you perform? (Select two.)

Set Printing Defaults Open Printer Queue

You manage a computer running windows 10. You recently upgraded the computer from Windows 7. The employee who uses the computer has called to complain that the Windows 10 interface is very slow. What can you do to improve performance without upgrading any hardware?

Set the visual effects for best performance.

You need to configure your Windows 10 laptop to use a VPN connection to the company VPN server. Click the link you would use to configure the VPN connection.

Set up a new connection or network.

You are a new system administrator, and your company has just mandated that users need to work from home and connect to files and folders on the network. Which option will allow users to connect to the corporate network remotely and securely?

Set up a virtual private (VPN) on the server side and install the client on each remote user's laptop.

You have just set up a new Windows 10 system. You want to be able to recover this system if a major failure occurs. With some system failures you can still boot the system and log on and then perform tasks to recover the system using a backup. Click the option you must use if you want to be able to recover from a system failure when this type of failure occurs.

Set up backup

You are configuring an application trigger and split tunneling on your VPN connections for your users. Match each command with its description.

Set up the app trigger Add-VpnConnectionTriggerApplication -Name %Name of VPN% - ApplicationID %Path to Application% Enable split tunneling Set-VpnConnection -Name %Name of VPN% -SplittingTunneling $True Set the idle disconnect time Setu-VPNConnection -Name $vpn -IdleDisconnectSeconds 5 Remove auto-trigger Remove-VPNConnectionTriggerApplication -Name $vpn -ApplicationID $app Confirm auto-trigger settings Get-VpnConnectionTrigger - Name $vpn

After you right-click Start, the following menu of configuration tools appear. Select the configuration option that allows you to enable and configure the Windows 10 File History feature.

Settings

Select the Start menu option that is used to see settings for the operating system.

Settings

Which path would you use to uninstall an update that was automatically installed by Windows Update?

Settings > Update & Security > View Update History > Uninstall Updates

Where can you find the Windows Update settings in Windows 10?

Settings > Update & Security > Windows Update

What are two ways you can change the default program that opens a certain file type? (Select two.)

Settings app File Properties > Change

What data on a Windows system in monitored to create the reliability and problem history chart in Reliability Monitor (Select two.)

Software memory failures Software installs/uninstalls

Drag each Loadstate command line option on the left to the description of the function it performs on the right.

Specify user(s) to be migrated /ui Enable user accounts /lae Specify user(s) to omit from migration /ue Create user accounts /lac

Below is an image of the Windows 10 interface. Select the interface element you can use to launch applications and configure system settings.

Start

Your organization's security policy prohibits end users from downloading and installing applications on their workstations. Th comply with these policies, you need to completely disable access to the Windows Store for the Windows systems you manage. Click the option you would use in the Group Policy Editor to enable the Turn off the Store application policy.

Store

After running the System Diagnostics found in the Data Collector Sets, you want to view the results of the diagnostics and review any suggestions from improving system performance. Click on the folder that contains the diagnostics results.

System Diagnostics

An employee was just fired. Before he returned his Windows notebook, he assigned Deny Full Control permission to the group named Everyone. This affected all the files and folders on the system. All users including you, are now blacked from accessing these important files. As an administrator, what can you do to make these files available as quickly as possible?

Take ownership of the files, and change the permissions.

You have an IPv4 network that has two IPv6-onty hosts that need to be able to communicate with each other. You want to implement a solution that onty requires you to configure the two IPv6 hosts and that also work throughNAT. Which tunneling method should you use?

Teredo tunneling

Match the tool or command on the left with its appropriate description on the right.

Tests connectivity between two devices and displaus the path between them. - tracert Displays all current TCP/IP network configuration values and refreshes the DHCP and DNS settings. - ipconfig Shows the network status and a graphical representation of network connections. - Network and Sharing Center Logs significant events on a computer such as when a process encounters an error. - Event Viewer Resolves the IP address of a hostname. - NSLookup Verifies IP connectivity between two nodes in a network by send ICMP packets and measuring response time in milliseconds. - ping Attempts to diagnose connection problems and present possible solutions. - Windows Network Diagnostic Displays TCP/IP information for both IPvb4 and IPv6 addresses. - netsh

Which of the following statements are true regarding user accounts? (Select two.)

The Computer Management method allows you to restrict the user from changing their password. The Windows Setting app requires you to create three security questions.

On computers with TPM chips, BitLocker can be used to encrypt the system partition and protect hard disks that have been moved to a different computer. Drag the BitLocker security component on the left to it description on the right.

The only options for systems without a TPM chip Startup key Provides access to encrypted volumes if there are problems related to BitLocker as the computer boots. Recovery key A user account that can recover encrypted data from BitLocker-protected devices when the password or keys are lost. Data Recovery Agent A copy of this is saved in the TPM. PIN Must be present on a USB flash device during system startup Startup key Without this, the system can only boot to recovery mode, and the data on the disk cannot be accessed. Recovery key

You are viewing reliability and problem history chart in Reliability Monitor on a Windows System. Some sections of the graph are displayed with a dotted line. What does the dotted line indicate?

There is not enough data to calculate the stability index.

You have been running Windows 10 on your system for 6 months. You need to know which version of Windows 10 it is running, so you open the Settings app and click System. On the About tab, the information shown below is displayed. What does this information tell you?

This is the original version of Windows 10, and it has not been receiving updates

You are reviewing configuration scores from all your devices in the categories of Application, Network, Accounts, Security Controls, and OS. Which component of Microsoft Defender ATP are you using?

Threat & Vulnerability Management

Enter the name of the tool that generates an alert when a task or operation requires administrative privileges.

User Account Control

Which of the following terms is a collection of a user's person settings and data files?

User profile

To protect the data on your Windows 10 computer from loss or corruption, you enable system protection on all drive in your computer. You also schedule regular backups with the following settings: Back up all user libraries Back up all drives Include a system image Today, you notice that your user profile settings are corrupt. How can you restore the user profile settings with the least amount of effort?

User the Backup and Restore console to restore the user profile from backup.

You are creating a new standard user on a Windows 10 system. By default, to which of the following groups will that user be automatically added?

Users

Which of the following syntax examples is used by a PowerShell cmdlet?

Verb - noun

The Windows 10 Pro and Enterprise editions let you manage your printers using the Printer Management app. Which of the following are tasks that can be managed from the Print Management console. (Select three.)

View and manage printer queues. View all printers and print servers. Deploy printers using Group Policy

Which of the following offers the weakest form of encryption for an 802.11 wireless network?

WEP

You need to add security for your wireless network. You would like to use the most secure method. Which method should you implement?

WPA2

You use a Windows notebook system that is a member of the domain on your network at work. You need to configure the wireless network card in the system to connect to the wireless network at work. The connection should require a user name and password for authentication using AES encryption. Which type of security standard should you use while configuring the connection?

WPA2-Enterprise

Consider the Reliability Monitor output shown below. What status does the yellow icon with an exclamation point represent?

Warning

While deploying Windows updates, when would you use the critical update ring?

When deploying updates to machines (only after the update has been vetted).

Which of the following editions of Windows 10 is described below? Runs on standard desktop computers and notebooks based on the Intel-compatible x86/x64 architecture. Supports traditional desktop applications as well as apps from the Windows Store. Built-in apps include Mail,Calendar,Photos and Microsoft Edge. Cannot connect to a corporate network.

Windows 10 Home

In the Windows Action Center, notifications are provided for which of the following? (Select two.)

Windows Defender Network firewill

Which of the following is available in all editions of Windows 10 and require special hardware for use?

Windows Hello

You have a Windows system that you would like to manage remotely. The computer connects to the network behind a firewall that blocks all but the most common parts. Which remote management solution does not require additional firewall ports opened?

Windows Remote Shell (WinRS)

Which of the following tools can be used to troubleshoot and validate Windows updates/. (Select three.)

Windows Update Troubleshooter PowerShell Windows Server Update Service (WSUS)

Which of the following are networking models that can be used with the Windows operating system? (Select two.)

Workgroup Client-server

You are a contract support specialist managing the computers in a small office. You see that all the computers are only using local user accounts. Which of the following models could this office be using. (Select two.)

Workgroup Standalone

You need to use command line tools to prepare the default drive on a Windows system for use by BitLocker. The new system partition should be 500 MB in size and should not be assigned a drive letter. Which command should you use?

bdehdcfg -target default -size 500

Your user account is User1. You want to sign into the corpwest domain from a computer that you haven't used before. You are at the sign-in screen. Just below the username and password fields, you see that this computer will try to sign into the corpsouth domain by default. Which of the following should you enter in the username field to change the domain the computer signs onto?

corpwest\User1

You need to be able to remotely execute commands on a Windows workstation name WS1. Which commands can be used to enable remote management on this system? (Select two.)

winrm quickconfig Enable-PSRemoting

You've just connected your Windows system to a large CRT monitor. The monitor supports screen refresh rates up to 75 Hertz and a resolution of up to 1280 by 1024. The video adapter in your system is plugged into a PCI Express slot and has 1 GB of video memory installed. It supports screen refresh rates from 55 Hertz to 75 Hertz and it has screen resolutions up to 2560 by 1600. What screen resolution and refresh rate would be best to use with this system? (Choose two options. Each option is part of the solution.)

1280 x 1024 75 Hz

You've just connected a new LCD monitor to your windows system. Your LCD monitor has a native resolution of 1440 x 900 at 64 Hz. The video adapter in your systemis plugged into a PCI Express slot and has 1 GB of video memory. It support screen refresh rates between 55 and 75 Hz and screen resolutions up to 2560 x 1600. Which screen resolution should you use with this system?

1440 x 900

Consider the following IP address that uses CIDR notation: 172.17.8.5/22. Which subnet mask corresponds to the CIDR notation used in this address?

255.255.252.0

How many lines must be drawn for a picture password?

3

A feature update includes new capabilities and improvements. What is the maximum number of days you can defer feature updates?

365

A user is allowed to install Office from the Cloud on up to how many devices?

5

You have a Windows 10 system. You have used the Settings app to access Windows update. From this location, how long can you pause updates?

7 days

What is Windows Action Center?

A central location for managing system messages and resolving issues within your system.

What is WindowsUpdate.log?

A log file that can be created and saved and can be used to locate errors or problems.

You want to connect a laptop computer running Windows to a wireless network. The wireless network uses multiple access points and is coonfigured to use WPA2-Personal security. SSID broadcast has been disabled. Which type of authentication method and encryption combination should you use for the strongest security possible?

A pre-shared key and AES encryption.

You want to connect your client computer to a wireless access point connected to your wired network at work. The network administrator tell you that the access point is configured to use WPA2-Personal with the strongest encryption method possible. SSID broadcast is turned off. Which of the following must you configure manually on the client? (Select three.)

AES Pre-shared key SSID

you need to reconfigure a windows 10 system to give the user RJesen user rights to the following: Ability to connect to shared resources on the computer (such as shared folders and printers) Access to the system's desktop using the Remote Desktop client Click the user rights that much be modified to accomplish this. (Select two.)

Access this computer from the network Allow log on through Remote Desktop Services

You purchased a copy of Windows 10 Pro for Workstations from a Microsoft reseller. You need to activate the software. Which methods would you use?

Activate the license over the internet or call Microsoft.

What is the name of the service included with the Widows Server operating system that managed a centralized database containing user account and security information?

Active Directory

You manage a small network with Windows clients, multiple subnets, and servers.You want your computer to be able to resolve a host name for a server on your network to it IPv4 address. What should you do? (Select two. Each choice is a possible solution.)

Add an A record on the DNS server. Edit the hosts file on the computer.

Desktop users access an in-house application that is hosted on your intranet web server. When users click a specific option in the applications, they receive an error message that the pop-up was blocked. How do you configure the security settings so that users can see the pop-up without compromising overall security?

Add the URL of the website to the Local intranet zone.

You share the D:\Reports folder on your windows system using a share name of Reports. You need to configure permissions on the shared folder as follows: Members of the accounting group should be able to view files, but not modify them. Phil, a member of the accounting group, needs to be able to open and edit files in the shared folder. No one else should be allowed access. How can you assign the necessary permissions without assigning extra permissions beyond what is required and without affecting other access that might already be configured on the computer?

Add the accounting group and assign the Read permission. Add the Phil user account and assign Read/Write permission.

You create the D:\drivers folder on your Windows system for third-party drivers and copy drivers for special devices to that folder. You want non-administrative users to be able to install devices on the computer under the following conditions: Without need administrative privileges Without being prompted for the driver Only for devices that have a driver in the D:\drivers folder Which action should you take?

Add the driver folder to the DevicePath registry key.

There are registry-based settings that can be configured within a GPO to control the computer and the overall user experience such as: Use of Windows features BitLocker, Offline Files, and Parental Controls. Customize the Start menu, taskbar, or desktop environment. Control notification. Restrict access to Control Panel features. Configure Internet Explorer features and options. What are these setting known as?

Administrative templates

You manage a Windows 10 system, on which File History has been turned on. You want to keep all versions of your files until space on the hard drive is needed. You have used Control Panel to access File History as shown in the image. Click on the option which will let you configure the required setting.

Advanced settings

You have two computers. ComputerA is running Windows 8.1, and ComputerB is running Windows 10. You need to migrate all user profiles and data files from ComputerA to ComputerB. In Command Prompt, you have entered the following command: LoadState f:\UserA_Profile /i:migapp.xml i:miguser.xml /ui:UserA /ue:* /lac /lae What will the result of this command be?

All of UserA's information is migrated, and UserA's account is diabled.

What are some of the execution policies that Windows has in place to protect PowerShell against malicious users? (Select two.)

AllSigned and RemoteSigned Restricted and Unrestricted

You have 400 Windows 10 workstations and a Windows Server Update Service (WSUS) in your office. Which option would you use to stop the workstations in your organization from using Microsoft's servers for system updates?

Allow downloads from other PCs.

You have open the Local Group Policy Editor and under Computer Configuration, you have navigated to: Computer Configuration > Windows Settings > Security Settings > Local Policies > User Rights Assignment. Which of the following policies needs to be configured to define which users can log on to the local computer?

Allow log on locally

Drag each Scanstate command-line option on the left to the description of its function on the right.

Allows overwriting of existing data /o Specifes users to omit from migration /ue Specifes users to be migrated /ui Generates a space estimate /p

You try to install internally developed accounting software on several new computers. You discover that the software will not run because user Account Control (UAC) causes it to fail. Because the accounting software will not be upgraded anytime soon, you must make it to work with UAC as-is. What is the best way to make the application to work with UAC?

Alter the program settings to Run this program as an administrator.

When do you need to use the full path to a script in order to run it in PowerShell?

Always

You manage a Windows system and need to control access to the D:\Reports folder as follows: Members of the Accounting group should be able to open, view edit and add files. They should not be able to delete or rename files. Mary needs to be able to open and view files, but should not be able to modify them. Mary is a member of Accounting group. Taking the least amount of actions possible and affecting existing permissions as little as possible, how can you assign the NTFS permissions.

Assign Allow Read & execute, List folder contents, Read, and Write to the Accounting group. For the Mary user account, Deny the Write permission.

You share the D:\Apps folder on your windows system using a share name of Apps. You need to configure permissions to the share as follows: Members of the appusers group should be able to open and view files in the shared folder. User JohnS should not have any access to files in the shared folder. JohnS is a member of the Appusers group. How can you assign the necessary permissions without assigning extra permissions beyond what is required and without affecting other access that might already be configured on the computer?

Assign Allow Read permission to Appusers, and assign Deny Read permission to JohnS.

You manage a Windows system with an attached printer. You share the printer using a share name of Printer1. You want to allow the user named Chad to pause, restart, and delete print jobs on the printer. Chad should not be allowed to delete the printer or change its properties. Chad is a member of the Sales group. Currently. the group named Everyone has the Print permission for this printer. Which permission should you assign to allow only Chad to perform specified print actions?

Assign Chad the Manage Documents permission to the printer.

You manage a Windows system with a printer that is used by Sales department. The sales manager has asked you to restrict access to printer as follows: Sally needs to connect to a printer, print documents, and have the ability to pause and resume her own print jobs. Damien needs to pause and resume documents for all users, but does not need to change printer properties. You want to assign the most restrictive permission that meet the sale manager's requirements. What should you do? (Select two.)

Assign Damien the Manage Documents permission. Assign Sally the Print permission.

You've decided to use a subnet mask of 255.255.192.0 with your 172.17.0.0 network to create four separate subnets. The network ID for one of the subnets is 172.17.0.0. You are installing a DNS/DHCP on this subnet, and you want to assign the highest numbered IP address possible to the system. What should you do?

Assign the system an IP address of 172.17.191.254

As part of the regular system maintenance on your Windows system, you are checking Performance Monitor statistics and event log events. You notice that there are several error events listed with the same ID number. They also contain description that sounds as if the error is related to system hardware. You check your Performance Monitor logs but don't notice anything unusual around the time that the events were generated. Which step must you take to get an email every time the event is logged so you can check the system statistics at that moment?

Attach a task to the event.

To protect your system and the data on your Windows 10 computer, you use the Backup and Restore console to create system image backup. While working with a file, you accidentally delete some of the data. You need to restore the older version of the file, but you cannot find any previous versions on the file. What should you do? (Select two.)

Attach the .vhd file created from the Backup and Restore console. Use Windows Explorer to browse to and then copy the file.

You do not want any on-premises servers, and you want users to be able to sign in and access both internal and external resources. Which option would you select for user accounts?

Azure AD accounts

You are reviewing your corporate policies for mobile device security. You want to include a policy for letting users bring their own devices (BYOD). Which of the following should be included in a robust BYOD policy? (Choose five.)

BYOD Policy All software must be kept up to date. Backup and device encryption solutions. Never connect to a public Wi-Fi network. A PIN or other strong device unlock method must be read. A method to easily report lost or stolen devices immediately.

You want to use an optical disc as a system recovery drive. In the System and Security category, click the Control Panel item you must use to create a system repair disc.

Backup and Restore (Windows 7)

You have a computer that currently has Windows 7 installed on it. You need to perform a clean installation of Windows 10. You must retain the existing data files from the Windows 7 installation and be able to continue using the same applications after the Windows 10 clean install is complete. What should you do? (Select two.)

Backup the user data. Gather application installation media and product keys.

You would like your Windows laptop to sleep when the battery level becomes critically low. Click the category you would expand to configure this setting.

Battery

Why is command history so useful in PowerShell?

Because it allows you use the arrow key to select a previously used command instead of retyping it.

You want to protect all the files on the hard drive of your Windows notebook system to prevent unauthorized access. You want to prevent access to any encrypted file on the hard drive, even if the hard drive is moved to another computer. Which feature should you implement?

BitLocker

You install a new graphics application on your Windows machine. During installation, the computer, reboots, but hangs during the startup. Pressing F8 has no effect. To fix your computer so it will start, what should you try first?

Boot from the installation disc and restore to a restore point.

You have recently made some changes to your Windows system. Things seems to run file for several days, Today, however, your computer has started to be unstable. Shortly after you log on on, the system crashes and hangs. Which of the following will most likely correct the problem in the least amount of time?

Boot in Safe Mode and restore to a restore point.

One day while trying to start your Windows 10 system, you see the error Operating system not found displayed. Which of the following options will most likely fix the problem?

Boot into the recovery environment and run the bootrec /fixmbr command on the boot volume.

One day while trying to start your Windows 10 system, you see the following error displayed: Could not read from the selected boot disk. Check boot path and disk hardware. Which of the following will most likely fix the problem?

Boot into the recovery environment and run the bootrec /rebuildbcd

You have opened the Settings app and selected System > Display. Which of the following option can you adjust?

Brightness and color Display orientation

Which of the following is true about Windows Update? (Select two.)

By default, each client contacts the Microsoft website for updates. Windows 10 allows the user to turn security updates off using the Settings app or Control Panel.

Match the activation service with their descriptions. Services may be used more than once.

Can be activated over the internet or by calling Microsoft MAK Can only activate Windows Server 2012, Windows 8.1, and newer operating systems. ADBA Ensures that DNS is correctly configured, allowing clients to locate the server. KMS Any domain controller that is part of the forest can be used to activate a client. ADBA Systems are activated on a one-time basis. MAK

Match the folder permissions description with the proper permission level. Each permission level will only be used once.

Can open files and run programs in the folder. Read and execute. Can open file, but not change anything. Read Can do anything with the folder and subfolders including changing permissions and ownership. Full control Can see files and folders, but not open any. List folder contents Can do anything with folder and subfolders except change permissions or ownership. Modify Can create new files and folders and change existing files. Write

Which of the following are limitations of standard user account? (Select three.)

Cannot run applications in an elevated state. Can change some setting that apply only to themselves. Can use applications, but cannot install them.

Drag the group policy setting on the left to the appropriate description of how the setting is enforced on the right.

Causes the policy to be enforced - Enabled Does not change the current setting for the policy - Not configured Prevents the policy from being enforced - Disabled

You manage a group of twenty Windows workstations that are currently configured as a workgroup. You have been thinking about switching to an Active Directory configuration. Which advantages would there be to switching to Active Directory? (Select two.)

Centralized configuration control Centralized authenticiation

When you initially set up your Windows 10 system, you configured it to create regular backups. You have also kept an up-to-date system image. Recently, your system has been experiencing some issues. At first, the system would boo and let you log on, but then it would crash within a couple of minutes. You tried booting from the installation DVD, clicking the Repair your computer option, and running Startup Repair and System Restore to resolved the issue. Both of these option failed to recover your system. You want to avoid losing installed applications and data. You have again booted from the installation disc. Which of the following option should you try next?

Click Repair your computer. Click Troubleshoot. Run the System Image Recovery option.

Several weeks ago, you installed a desktop application on your Windows system. Yesterday, you installed another desktop application on your system that has developed in-house. After doing so, you notice that the first application behaves erratically and frequently locks up. You have opened Control Panel on your Windows system, accessed Programs and Features, and selected the application. What should you do?

Click Repair.

You were having trouble with your Windows system, and you initiated a Remote Assistance session with a Help Desk technician. The technician has taken control of your system to perform several checks. She has now asked you to take back control of the system. What should you do? (Select two.)

Click Stop Sharing Press Esc

You are using a Windows 10 system to work on the schedule for a very important project. You saved your files in the Documents library of your user account. Unfortunately, malware from a malicious website has infected your system. You were able to remove the infection with anti-malware software. However, after shutting down, you discover that Windows does not boot properly. Which action can you take to get your system back up and running properly without losing your project files and while minimizing the risk of infecting other systems on the network? (Select two.)

Click Troubleshoot > Reset this PC > Keep My Files. Boot the system from a recovery drive.

The image above shows the cursor over the Maps tile in the list of applications on the system. You want to manually add the Maps tile to the Start menu. Which options can be used to accomplish this? (Select two. Each option represents a complete solution.)

Click and drag the Maps tile to the Start menu Right-click the Maps tile and select Pin to Start

You've been using a Windows Store app and need to exit out of it. What should you do?

Click the close button in the app window.

You are consulting for a small startup company that needs to know which kind of Windows computer network model they should implement. The company will start small, with only twelve employees, but they plan to double or triple in size within 12 months. The company founders want to make sure they are prepared for growth. Which networking model should you implement?

Client-server

Below is an image of the Windows 10 interface. Select the icon that you can hover the mouse over to see the network status.

Computer icon

If you need to customize the files gathered from the standard user profile folders to be migrated, it is recommended that you edit which of the following files?

Config.xml

Your organization's security policy dictates that users are not allowed to load Windows Connect Now (WCN) settings from a USB drive to connect to a wireless network. Which Group Policy contains settings that can be enabled to block this functionality?

Configuration of wireless settings using Windows Connect Now

You have just installed Windows 10 on a new notebook. The notebook does not have a Trusted Platform Module (TPM) chip. You want to configure the computer to use BitLocker to protect the volume used for the operating system and all user data. What should you do? (Select two.)

Configure BitLocker to use a startup key on a USB drive. Configure BitLocker to require a PIN for startup.

You use a custom application that was developed in-house. On a periodic basis, the application writes and modifies several registry entries. You want to monitor these registry keys so that you can created a reports that shows their corresponding settings over the next 5 days. What should you do?

Configure a configuration data collector in Performance Monitor.

You share your Windows system with several other users. You are concerned about the amount of disk space use on the computer. What can you do to be notified by email when the used disk space exceeds 85%?

Configure a performance counter alert.

You have just received a new laptop that you will use on your company network and at home. The company network uses dynamic addressing, and your home network uses static addressing. When you connect the laptop to the company network, everything works fine. When you take your laptop home you cannot connect to devices on your home network or to the internet. You run ipconfig on the laptop and receive the following output: Connections-specific DNS Suffix: IPv4 Address........................................:169.254.22.74 Subnet Mask.........................................:255.255.0.0 Default Gateway..................................: You need to be able to connect to both the company network and your home network with the least amount of configurations and cost. What should you do?

Configure an alternate TCP/IP configuration

An employee in your organization, has started to work from home two days a week. The employee uses the same company laptop at the office and at home. The laptop automatically connects to the wireless network in the office, but it does not automatically connect to the employee's home wireless network. The employee would like the laptop to connect automatically at home and at work. What should you do?

Configure an alternate TCP/IP configuration on the laptop's wireless adapter to use a static IP address that is compatible with the home network.

You have a folder on your Windows system that you would like members of your development team to access. You want to restrict network and local access to only specific users. All other users must not be able to view or modify the files in the folder. What should you do? (Select two.)

Configure both share and NTFS permissions Place the files on an NTFS partition.

You use a VPN connection on your Windows desktop system to access resources on a corporate intranet. In addition to accessing the intranet resources, you need to access the Internet while the VPN connection is active. How can you prevent internet traffic from going through the VPN connection?

Configure the Advanced TCP/IP Settings on the VPN connection.

You would like to configure Event Subscriptions on your Windows system to forward events to a network server. You need to configure your computer as a source computer for a source-initiated subscription. Which of the following will be a part of your configuration? (Select two.)

Configure the Local Security Policy to identify the FQDN of the collector. Run the winrm qc -q command.

You have a notebook computer running Windows that you use both at home and in the office. The laptop has both an Ethernet and a wireless network connection. At home, you have created a simple Ethernet network that connects your home computers to the internet through a cable modem. A friend comes over to your house for some help configuring his new laptop computer. His computer has a wireless network adapter but not an Ethernet network adapter. He wants to connect his laptop to the internet through your network to download some drivers. What should you do? (Select two.)

Configure the wireless connection to use WPA2-Personal. On your laptop, configure a network bridge. Set up an ad hoc wireless connection between his computer and yours.

Many of the features of Windows 10 are included in different editions. Match the Windows 10 edition(s) on the left to the included feature on the right. (Each edition(s) may be used more than once.)

Cortana Home, Pro, and Enterprise Always On VPN Enterprise Encrypting File System Pro and Enterprise Boot from VHD Pro and Enterprise Mobile Device Management Home, Pro, and Enterprise

On your Windows system, you run a custom application that was developed in-house. The application generates Event Viewer events and logs those events to the default Application and the Security logs in Event Viewer. As you monitor the application, you'd like to be able to do the following: View all events related to the application from a single log. View only the events related to the application and no others. View the necessary events with minimal future configuration. Save the vent viewer configuration so that you can easily export and import the solution to other servers that will be running the application. What should you do?

Create a Custom View

You have just installed a custom application on your Windows system. The application generates Event Viewer events and logs those events to the default Application and the Security logs in Event Viewer. You are concerned about system performance will running the application. You would like to be able to view the current statistics for the processor, memory, and disk reads and writes. You only want to see these statistics and no others, and you want to be able to easily save the configuration so that the same statistics are shown each time. What should you do?

Create a Data Collector Set in Performance Monitor

You have two computers. ComputerA is running Windows 8.1, and ComputerB is running Windows 10. You are using USMT to migrate the user profiles and the default date files from ComputerA to ComputerB. The user works with graphics, so you must also include .jpg files. Which actions should you take to specify that the migration includes all .jpg files?

Create a custom XML file.

You have all Windows 10 devices in your cloud-based Intune environment. You want to set up Always On VPN on each device to utilize the build-in VPN client in Windows 10. What is the fastest way for you to configure all your devices?

Create an Always On VPN configuration profile in Intune and assign it to the AllUsers group.

You are getting ready to install Windows 10 on a new laptop. You would like to configure the laptop to use BitLocker. How can you configure the laptop to start without requiring a PIN or USB device? (Select two.)

Create two partitions on the hard disk. Put boot files on the first partition and operating sysytem files and dara on the second partition. Enable the TPM.

Your Windows computer has system protection enabled on the system drive. By default, restore points are only created when a Windows update occurs. In the last week, since the last Windows update, you have installed a video application that you use ever day. Today you installed a new sound card with the driver that came with it. Your system started behaving erratically after you rebooted. You tried updating the latest driver for the sound card, but that didn't help. So you use System Restore to get your computer back to the state it was in before you installed the smart card. After you reboot your computer, you realize you have to install your video editing application again. Which action would have helped you avoid having to reinstall the application?

Creating a manual restore point just before installing the sound card.

You are performing an installation of Windows 10 on a desktop PC that uses a newly configured RAID 1 disk array. You booted the system from the Windows 10 installation DVD and navigated through the first few screens of the installation wizard. You've reached the following screen. Which action should you take?

Custom: Install Windows only (advanced).

You are running the Windows 10 upgrade process and have reached the point in the process shown below. You are very concerned about keeping your personal data private. Which option should you select?

Customize settings

You are using the Office 365 Admin center to deploy Microsoft Office 365 to your end users. You need to assign each user a license to use Microsoft Office. Click on the options in the Office 365 Admin center that you could use to do this. (Select two.)

Dashboard Users

You manage a large number of workstations that belong to a Windows domain. You want to prevent anyone that might try to gain access to a computer from guessing login information by trying multiple passwords. Which GPO contains a policy you can enable to guard all computer in the domain against the security breach?

Default Domain Policy

The users in your organization bring their own mobile devices to the office and want to be able to access the network with them. You want to protect your network from malware threats that might be on these devices. You want to make sure these devices meet certain requirements before they can connect to the network. For example, you want them to meeting the following criteria: Hardware and Windows startup components are clean The kernel is not infected with a rootkit• Boot drivers are clean. Which Windows feature can you use to protect your network from malware threats that might be on your users' mobile devices?

Device Health Attestation

Which of the following are true concerning the Password must meet complexity requirements policy? (Select three.)

Dictionary words are not allowed in passwords. Users must create a password that uses a minimum of three types of special characters. Passwords must be at least 6 characters long.

What are two ways you can run PowerShell cmdlets remotely? (Select two.)

Directly from the command, use the computername parameter. Use invoke-command followed by the name of the remote computer and then the PowerShell cmdlet within brackets.

Your Windows workstation has an IP address of 192.168.1.35 assigned with a subnet mask of 255.255.255.0. It also has a DNS server address of 192.168.1.1 and a default gateway router address of 192.168.1.254 assigned. Your workstation is a member of the wastsim.com domain. The domain controller's address is 192.168.1.3. Your workstation needs to connect to a web server using the HTTP protocol. The web server has an IP address of 192.168.1.2 and a subnet mask of 255.255.255.0 assigned. Where will the packets be sent next?

Directly to the web server.

You want to modify the default settings of User Account Control (UAC) on your Windows system to meet the following criteria: • Prompts should be shown when programs make changes to your computer and when you make changes to Windows settings. • The desktop should not be dimmed and locked out, but should allow you to continue working in other applications without responding immediately to the prompt. •Settings should apply to all standard users. Which UAC setting can you use to meet these criteria?

Disable the Switch to the secure desktop when prompting for elevation setting in Group Policy.

Your company has asked you to look at strategies for migrating from IPv4 to IPv6. Instead of using IPv6 only, you decided you want to allow hosts to use both IPv4 and IPv6 addresses. Which of the following technologies should you implement to allow hosts to use both IPv4 and IPv6 at the same time?

Dual stack

How do you configure your Windows system to prompt for additional credentials whenever a sensitive action is taken?

Edit User Account Control (UAC) settings.

To increase security for your Windows notebook system while traveling, you decide to require a smart card in order to sign on. You also want users to be signed out automatically when the smart card is removed. What should you do?

Edit setting in Local Security Policy.

Using Event Viewer, you have created a Custom View to track Warning and Error events from both the Application and System logs. After a few days, there are several events in the Custom View. You would like to clear the messages from the view so that you only see messages starting from today. How do you make sure that any messages from today are in the corresponding logs still exist?

Edit the Custom View properties and create a custom range fro the logged events, starting with today's date.

You manage a Windows system connected to a business network that uses switches and multiple subnets. You connect a worstation to the 192.168.1.0/24 subnet. The workstation can communicate with some hosts on the private network, but it cannot communicate with other hosts. You enter ipconfig /all at the command prompt and see the following output: Ethernet adapter Local Area Connection Connection-specific DNS Suffix...: my domain.local Description..............................................: Broadcom network adapter Physical Address...................................: 00-AA-BB-CC-74-EF DHCP Enabled.......................................: No Autoconfiguration Enabled.............: Yes IPv4 Address...........................................: 192.168.1.102 Subnet Mask............................................: 255.255.0.0 Default Gateway....................................: 192.168.2.1 DNS Servers............................................: 192.168.2.20

Edit the IPv4 properties and change the default gateway.

For several months, your Windows computer acted like a server in the workgroup. It was optimized to share files and folders to the other computers. You no longer need the computer to act like a server. Now, you want the computer to focus on applications. After installing the applications, you believe the computer is not reacting quickly enough while using the applications. You know the machine has enough video memory and physical memory to handle the applications. What should you do?

Edit the Processor Scheduling settings.

Your Windows computer has two hard drives, both formatted with NTFS, You have enabled system protection on both disk. How do you delete restore points while keeping system protection enable on both drives?

Edit the System Protection configuration in System Properties, and delete restore points.

You have configured scheduled backups in the Backup and Restore console to take a backup each week. You save the backups to a network location. You find that backups are not being completed because the destination computer is asleep when the schedule time starts. The destination computer is not waking up to perform the backup. How can you make sure the backup destination device is awake and available?

Edit the backup task in Task Scheduler.

The D:\ drive in your computer has been formatted with New Technology File System (NTFS). The Sales group on your computer has been given Allow Modify permissions to the D:\Sales folder. The Mary user account is a member of the Sales group. You want to accomplish the following: Mary should not be allowed to access to the D:\Sales\2012sales.doc file. Mary should be able to read, write, and create new files in the D:\Sales folder. Your solution should not affect the abilities of other Sales group members to access files in the D:\Sales folder. What should you do?

Edit the properties for the file and assign Mary the Deny Full control permission

You have a Windows 10 system with several standard users. You want all standard users to be able to install devices and necessary drivers. Which of the following actions gives this permission? (Select two. Each answer is a complete solution.)

Enable All non-administrators to install drivers for these device setup classes in a Group Policy. Run the pnputil -i -a command to add drivers to the Driver Store.

You want to be able to stop working on your Windows notebook system, save battery power, and resume work as quickly as possible. You also want to protect yourself from data loss if your battery fails. What should you do?

Enable Hibernate.

You attempt to run a program but don't have full access to all features. Which options let you tun the program with needed permissions using the least amount of effort? (Select two.)

Enable Secondary Logon and run as a privileged user. Right-click the program shortcut and select Run as administrator.

To provide additional storage space, you have added a second internal hard drive to your Windows 10 system. For the past several weeks, you have created and changed many files stored on the new hard drive. One of the files on the new drive has become corrupted. You want to recover as much as you can by reverting to a previous version of that file. After viewing file properties, you notice that no previous versions are available. Which action must you take to ensure that you can revert files to previous versions on the new hard drive of your Windows 10 computer?

Enable System Protection on the new hard drive.

You have a small network setup at home. Each member of the family has their own computer. You would like to share files on your computer, such as pictures, videos, and music, with other members of your family. Your mother should be able to modify an of these files, while everyone else should only have read-only access. You want to use the simplest method to make these files available while providing the level of access specified. What should you do?

Enable file and printer sharing in the Network and Sharing Center. Share specific folders and configure necessary permissions.

You have a user remotely connecting to the corporate network from a client location. They can connect to the corporate network file server. But they cannot access files and folders they need on the client LAN in order to work on their project. What would you enable in order to allow the user to access resources on both networks while the VPN is connected?

Enable split tunneling

You are supporting a Windows 10 computer that is used by three different users. The computer has the following volumes with default System Protection settings: C: (System drive with user profiles and individual user files) E: (Data files common to all users) Which option is the easiest way to protect the data on both volumes with restore points?

Enable system protection for the E: volume.

Your company has several office locations that you travel to frequently. You want to configure your Windows 10 laptop to easily switch the default printer as you move from one location to another. Which printer configuration setting will allow your laptop to set the last used printer as your default printer?

Enable the Let Windows manage my default printer option.

You are trying to listen to Audio CDs on a Windows system, but no audio is coming from the speakers. After checking the speaker cables, the volume level, and the mute feature, you check Device Manage and see the dialog shown in the image below. What should you do?

Enable the SoundMax Integrated Digital HD Audio Driver device.

You manage a Windows system that is shared by several users. The system is currently configured to require password changes every 42 days. But, you are concerned that users are reusing their favorite passwords over and over, which violates your organization's security policy. Click the policies you would use in the Local Group Policy Editor to enforce this. (Select two.)

Enforce password history Minimum password age

You are an administrator that needs to implement mobile device security. Match the available security options with their descriptions.

Enterprise Mobility Management (EMM) The combination of MDM and MAM solutions is one package, like Intune. Mobile Application Manangement (MAM) Focuses on managing the applications on a mobile device not the device itself. Mobile Device Management (MDM) Manages the user's device, including remotely wiping the device.

What's the best tool to manage files using the graphical user interface?

File Explorer

Which of the following are true about File History backups or restore point? (Select three.)

File History can be used to recover offline OneDrive files. File History backups use Volume Shadow Copy (VSS) to take snapshots of files and folders. File History only works on NTFS parition

How can files and folders be managed? (Select two.)

File explorer Command prompt

What are some security measures Microsoft has implemented to protect your system against users trying to use PowerShell for malicious purposes?

File extension, scripts full path, and execution policies.

You are configuring file backups using Backup and Restore (Windows 7) in Control Panel on a Windows system. Which information can be included in the backup? (Select two.)

Files on user desktops Files in user Documents libraries

You want to see memory statistics for a specific process running on your Windows system. What do you need to do to view the working set, shareable, and private memory for the process?

Filter by the process in Resource Monitor.

Match each authentication method to the proper authentication factor. Factors may be used more than once.

Fingerprint - Something you are Password - Something you know Smart Card - Something you have Typing Test - Something you do RFID Proximity Reader - Somewhere you are Pin - Something you know Voice Recognition - Something you are

You have a computer on your workbench that has not operating system installed on it. You would like to install Windows 10 Enterprise 32-bit edition on the computer. The computer has the following hardware specifications: Hard drive with 12 GB of free space. 1 GB of RAM, one additional socket available One Pentium 2.8 GHz processor, one additional socket available Display supports 800 x 600 pixels What should you do?

Free up some space on the hard drive.

You would like to generate a report that shows the status of hardware resources, processes, and configuration information on your Windows system. How can you generate a reports that includes suggestions for ways to improve the performance of your system? (Select two.)

From Command Prompt, run perfmon /report. From Performance Monitor, under Data Collector Sets, run System Diagnostics.

Your office computer (from which you perform your day-today-tasks) is a Windows system. You are currently signing into this computer using the account named Mary. However, this computer is also a member of the company's domain. Using the least amount of effort possible, you want to ensure that every time you connect to a shared folder on Server1, you authenticate by using an account named Admin. What should you do to accomplish this?

From Credential Manager, click Add a Windows credential. From User Account, click Manage your credentials.

You have used the runas command with the /savecred option to start an application on your Windows system.For security reasons, you have changed you mind and don't want to keep the password in Windows Vault. How can you delete the stored password?

From Credential Manager, remove the credential from the Vault.

You have a computer running Windows 10 Enterprise. The computer is a member of a domain. A file server on the network named Server1 runs Windows Server 2012 R2. You log on to the computer using an account named Fred. With the least amount of effort possible, you need to ensure that every time you connect to a shared folder on Server1, you authenticate using a domain account named Bill. What should you do?

From Credential Manager, select Add a Windows credential.

Your frequently use an app from the Windows Store. How can you configure the app so you can access it without having to open the Start menu? (Select two.)

From the Start menu, click and drag the app's tile to the taskbar. From the Start menu, right-click the app's tile and select More > Pin to taskbar.

Administrators can control which Office 365 ProPlus apps users are allowed to download. Once an administrator is logged into their global admin account, what should they do next?

From the home page select Office Software, and then select Software download settings.

A user has complained about not being able to remove a program that is no longer needed on a computer. The Programs and Features page is not available in Control Panel. You suspect that a policy is enabled that hides this page from the user. But after opening the Local Group PolicyEditor, you see that the policy to hide Programs and Features is not configured. You know that other users in this domain can access the Programs and Features page. To determine whether the policy is enabled, where should you look next?

GPOs linked to organizational units that contain this users object

You have opened the System Information a (msconfig.exe) and selected the tab named Boot. In the Boot options section, you have checked Boot log., What will selecting this option do?

Gather information about a service or device that is running when the system starts up.

Drag each task on the left to the Internet options tab on the right where the task can be performed.

General - Delete temporary internet files. cookies, browsing history, form data, and passwords. Security - Enable Protected Mode. Privacy - Configure Pop-up Blacker settings. Content - Manage certificates, trusted roots CAs, and trusted publishers. Connections - Configure proxy server settings. Programs - Add, disable, or remove browser add-ons. Advanced - Reset Internet Explorer settings to their default values.

Which PowerShell cmdlet would you use to find how a specified printer has been setup on your computer?

Get-PrintConfiguration

Your Windows system is a member of a domain. Windows Update settings are being controlled through Group Policy. How can you determine whether a specific security updates from Windows Update is installed on the computer?

Go to Programs and Features in Control Panel

You updated a driver from the manufacturer's website, and now it is making your system unstable. You have decided to restore your system to a restore point. Which two options allow you access to restore points on your system?

Go to System Properties and then System Protection. Use your installation media and run a repair.

You have a folder on your Windows desktop system that you would like to share with members of your product management team. Your team needs to be able to view and edit any file in the shared folder. To accomplish this, you configure advanced sharing and gave give each team members Full Control share permissions. The team is doing some competitive analysis that need to remain confidential. Unfortunately, you learn that people outside of your team are able to see and read the documents your team is creating. After looking into this issue, you learn that sharing a resource using advanced sharing gives the Everyone group the Read share permission by default. You remedy the issue by removing Everyone from the Share Permissions list. Which of the following is a permissions management best practice that, if followed at the domain level, would have prevented this issue from arising in the first place?

Grant Everyone Full Control share permissions, but configure NTFS permissions to be more restrictive.

Your windows system has a folder named D:\SalesDept. The D: drive is formatted with FAT32. you need to allow network access to the folder as follows: Members of the sales group should have read-only access to the content in the folder. Members of the SalesAdmin group should be able to open, edit, and add new files to the folder. No other users should have access. Members of the SalesAdmin group are also members of the Sales group. you want to assign as few permissions as possible. When sharing the D:SalesDept, what should you do?

Grant Read permission to the Sales group and Change permission to the SalesAdmin group. Remove Everyone from the access control list.

You are a single Windows system with Judith and Dalton. You are the owner of the D:\Reports folder. Judith needs to be able to see the files and subfolders in the D:\Reports folder. Dalton needs these abilities as well as the ability to delete folders. Which rights must you assign to each user to give them the necessary NTFS permissions to the D:\Reports folder?

Grant the Read and execute permission to Judith and the Modify permission to Dalton.

Match the Credential Guard component on the left with its function on the right. (Each component may be used once, more than once, or not at all.)

Grants users access to local and domain resources Kerberos tickets Stores user authentication information Local Security Authority Tags running processes as belonging to a virtual machine Virtual Secure Mode Provides virtualization functionality on a Windows system Hyper-V

Which tool can you use to remotely manage a system using a graphical user interface?

Graphical Microsoft Management Console

You use a Windows 10 system with File History enabled. You've been working on the index.html in the HTML Files folder in your Temp\HTML library. You realized this evening that you've made many erroneous changes during the day that will require a great deal of work to correct. You decide that the best option is to restore the version of this file as it was this afternoon. You've used File History to identify the version of the file you want to restore. Click the option you would use to restore version 6 of the file shown.

Green refresh button

As an IT admin, you have 6 employees that all need the same level of access to the same resources. Using the least amount of effort, which of the following can be used to accomplish this?

Group

What are the profile choices when sharing folder? (Select three.)

Guest or Public Private Domain

Installed desktop applications on a Windows system that are displayed in Programs and Features typically have associated entries in which Registry key?

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall

Match the distribution channel on the left with the mechanism on the right that must be used to activate copies of Windows 10 purchased through that channel. (Each channel may be used more than once.)

Hardware manufacturer activation OEM - Preinstalled KMS activation Commercial-Volume Licensing Microsoft Active Directory activation Commercial-Volume Licensing Phone or Internet activation Full-Packaged (Retail)

You keep your Windows laptop plugged in most of the time, and you would like to use the full CPU power for a video project you are working on. Click the power plan you would use to provide full CPU power.

High performance

Microsoft offers three different servicing channels for Windows 10. Match each channel on the left with its description on the right. (Each channel may be used once, more than once, not at all.)

Ideal for pilot deployments and lab testing of Windows Updates. - Semi-Annual Channel For highly sensitive systems that can't tolerate any down time. - Long-Term Servicing Channel Give system administrators a chance to give feedback to Microsoft on any bugs before Microsoft releases the update. - Windows Insider Program (WIP) New updates are typically released every 2-3 years.- Long-Term Servicing Channel Feature updates are automatically installed as soon as they are released unless deferred. - Semi-Annual Channel Provides very early pre-released Windows builds or feature updates. - Windows Insider Program (WIP)

Put the network troubleshooting steps in the proper order.

Identify the scope of the problem Check IP address configuration Check hardware configuration Perform communication tests.

You have a small wireless network with 10 client computers configured in a Workgroup. You need to secure the wireless network using the most security and least amount of effort. You also want to do this without replacing any of the existing wireless infrastructure. Which tasks should you perform to secure the network? (Select two.)

Implement WPA2-Personal. Configure each client with the same key.

You recently installed a device that you only need temporarily. After you finish using the device, you remove it from the computer. Now you want to uninstall the device's driver. What should you do? (Select two. Each answer is a complete solution.)

In Command Prompt, run pnptil -d followed by the driver package. In Device Manager, right-click the device and click un-install.

You are only a standard user on a computer that you use at work. (You are not an administrator of the computer). You connect your Mp3 player to the computer. The computer is not able to play files from the device. You need to get information from the device to identify the problem. What should you do?

In Control Panel, click Devices and Printers

You use a Windows 10 system with File History running. Currently, File History is configured to save copies of files every hour. However, you've been assigned to work on a high-profile project, and you would like File History to save copies of files every 15 minutes. What should you do? (Select two.)

In Control Panel, click System and Security > File History Click Advanced settings and then set Save copies of files to Every 15 minutes.

The vendor of your accounting software recently released an update that you downloaded and installed on your Windows system. Unfortunately, now your accounting software crashes when launched. Which action can you take to get your system running properly as quickly as possible without losing your accounting files? (Select two.)

In Control Panel, go to System and Security > System > System Protection > System Restore. Boot the system from a recovery drive and click Troubleshoot > Advanced Options > System Restore.

The audio card in your Windows system is working, but you learn about an updated driver that adds some new features to the device. You download and install the new driver. After you restart and log on to Windows, you can no longer play audio files. Using a minimum of administrative tasks, you need to find a solution to be able to play audio. What should you do?

In Device Manager, roll back the driver.

You use a Windows computer that is shared by multiple users. The default printer on your computer is a Sharp AL-2040. When you send a print job to the default printer, nothing happens. The other users can send jobs to the same printer without any issues. What should you do?

In Devices and Printers, right-click the Sharp AL-2040 icon and select Troubleshoot.

You manage two Windows systems named Computer 1 and Computer 2. You have configured Event Subscriptions with the default settings to forward events from these two computers to a third Windows system name Computer 3. How do you view events from these two computers on Computer 3?

In Event Viewer, open the Forwarded Events log.

You have been asked to troubleshoot a Windows system that is a member or a workgroup. The director who uses the machine said he is able to install anything he wants as and change system settings on-demand. He has asked you to figure out why User Account Control (UAC) is not being activated when he performs a sensitive operation. You verify that the director's user account is a standard user and not a member of the local Administrators group. How do you configure UAC so the prompt is activated when he performs a sensitive operation?

In Group Policy, enable the Run all administrators in Admin Approval Mode policy.

A user made some modification on the Advanced tab in the Internet Explorer's Internet Options, and now she is having some problems. How do you restore the default Internet Properties setting with the least amount of effort?

In Internet Options on the Advanced tab. click Restore advanced settings.

You manage a Windows system. You would like to generate a report that runs several basic tests of the operating system, Security Center, hard disk, services, and hardware devices and drivers. How can you generate a report that includes suggestions for how to improve system performance?

In Performance Monitor, run the System Diagnostics Data Collector Set.

While working with a new application on your Windows system, the application stops responding. How can you analyze the application and its associated processes to identify which processes the application is waiting on?

In Resource Monitor, analyze the wait chain for the process.

You have a notebook system running Windows. The laptop has built-in wired and wireless network cards. Recently, the wireless card stopped working, so you connected an external USB wireless adapter to the system. After you install the wireless adapter, it is not displayed in the list of available network adapters in the Network and Sharing Center. What should you do to troubleshoot the problem?

In the Device Manager, right-click the wireless device and choose Properties. Examine the device configuration.

You have received a new laptop. It is running Windows. You've configured a wireless adapter to connect to the network at work. You also have a wireless network at home, and have configured a second profile for your home network. For several weeks, the wireless connection has worked fine. Whether you are at home or at work, you can start your computer and make a connection without browsing for the list of avaliable networks. One day you come to work to find that you can't connect. You check with the network administrator, and he states that they have prevented the SSID of the company network from being visible. You need to reconfigure your system to connect to the company wireless network now and in the future in the easiest manner possible. What should you do?

In the wireless network profile, select Connect even if the network is not broadcasting its name (SSID).

You use a Windows desktop system to edit and produce audio files. Your system has two hard disks installed. You applications are installed on the C: volume on the first hard disk. Because of the size of the audio file you produce, you keep them on a separate volume (D:) located on the second hard disk. Your Windows desktop system has system protection enabled on both drives. You need to configure system protection on this system to maximize overall protection. What should you do?

Increase the amount of disk space reserved for restore points on C:

You have several computers in a domain network. Your company develops software that runs on both Windows 7 and Windows 10. Programmers need to have computers that will dual-boot between Windows 7 and Windows 10. You need to configure each system to meet the programmer's requirements. What should you do?

Install Window 7 first, and then install Windows 10 on another partition.

A user calls to complain that her Windows system is running slowly. You launch Task Manager on her system and select the Processes tab. The output is shown in the image below. What should you do? (Select two.)

Install a faster CPU in the system. Install more RAM in the system.

The Windows Performance Toolkit (WPT) is not included with the Windows operating system. Which steps do you need to follow to install and run the WPT? (Select two.)

Install the Microsoft .NET Framework 4.5. Download the Windows Assessment and Deployment Kit (ADK).

You manage a Windows computer that is being used by multiple people. One of the user installs a new Internet Explorer add-on that interferes with the browsing functionality of other users on the system, but the add-on is necessary for business purposes. What should you ?

Instruct the other users to log on and disable the add-on.

You need to enable Credential Guard on a Windows 10 Enterprise system. Which Windows features need to be enabled to accomplish this? (Select two.)

Isolated User Mode Hyper-V Hypervisor

What does the File and printer sharing do?

It allows other computers to access the shares created on the host computer.

Why does virtual memory play an important role in the Windows OS?

It allows you to run more applications on the system that you have physical memory to support.

The Windows Network Diagnostics tool analyzes a computer's network connection and verifies connectivity. When connected to a domain, what does the Network Map display?

It displays your computer, the domain and the internet.

What happens when you double-click a PowerShell script file?

It opens as Notepad file.

When you open your Documents folder, you notice that one of the files is greyed out. What might be the cause?

It's a hidden file.

You have configured a Windows server in your network to provide activation for your Windows workstations using the KMS. Which of the following are true concerning activation in this network?

KMS activations are valid for 180 days. By default, the Windows client systems will attempt to renew their activation status every 7 days.

Which of the following activation processes requires one of the following threshold to be met? 25 or more client systems 5 or more servers

Key Management Service (KMS)

You are using the Privacy category found in the Setting app. If you do no want to send your browsing habits to Microsoft, which option would you turn off?

Let app use adverting ID to make ads more interesting to you based on your app activity.

You have created a new folder and added an Authenticated Users group. Which basic permissions will be applied by default? (Select three.)

List of folders contents Read & execute Read

You are managing a workstation that is not part of a Windows domain. Users on this computer should not be permitted to download applications from the Windows Store. Which administration toll can you use to enable a policy that turns off the Store application for all users on this computer?

Local Group Policy Editor

Which of the following can be used to manage policies and user rights for machines joined to a domain?

Local Group Policy Editor Group Policy Management

Where are user's Kerberos tickets and other security-related information stored.

Local Security Authority

Match each Active Directory on the left with the appropriate description on the right.

Logical organization of resources - Organizational unit Collection of network resources - Domain Collection of related domain trees - Forest Network resource in the directory - Object Group of related domains - Tree

Which of the following channels are provided by Microsoft to manage deployment of updates to your Windows 10 system? (Select three.)

Long-Term Servicing Channel Semi-Annual Windows Insider Program

Which of the following can be used to verify that the TCP/IP Protocol stack has been properly installed on the host?

Loopback

You manage a small office network with a single subnet. The network is connected to the Internet. All client computers run Windows. A single server runs Windows Server 2016. The client computers are not joined to a domain. All hosts use IPv6 addresses on the private network. All computers on the private network are assigned host names (e.g., Computer1, Computer2, etc). All hosts use the DNS server provided by the Internet Service Provider (ISP) to resolve host names for Internethosts. You need to implement a solution so that hosts on your private network can resolve host names for other hosts on the private network. You want to implement the solution with the least amount of effort. What should you do?

Make sure that LLMNR is enabled on all computers.

As an administrator, you feel like your in over your head with some attacks you are experiencing on your devices and network. You feel like you need help. Which Defender ATP component would you use?

Microsoft Threat Experts

Your company management is deeply concerned about a potential data breach because of sensitive patient data and HIPPA compliance. Currently, the system is configured to require password changes ever 90 days. You need to make sure that users are using password that are 15 or more characters in length, including special characters. Click on the policies you would use in the Local Group Policy Editor to enforce this. (Select two)

Minimum password length Password must meet complexity requirements

You have a folder on your Windows desktop system that you would like to share with members of your development team. Users need to be able to view and edit any file in the shared folder. You share the folder and give the Everyone Full Control permissions to the shared folder. Users connect to the shared folder and report they can open the files, but they cannot modify any of the files. What should you do?

Modify the NTFS permissions on the folder.

You are supporting a Windows 10 computer that has two volumes: The C: drive is the system drive with user profiles and individual user files. The D: drive holds data files common to all users. System Protection has been configured as follows: A system image backup has been created that includes both the C: and D: drives. Regular backups are scheduled to back up all user libraries. The scheduled backups includes a system image. System Restore has been used to take a snapshot. A user has edited and saved a file on the D: Drive. The user doesn't like the changes and wants to revert to a previous version of the file. The user goes to the Previous Versions tab of the file and sees nothing listed. To avoid this situation in the future, you must ensure that users can revert files on the D: drive to earlier versions of the file from the Previous Versions tab. What should you do? (Select two.)

Modify the backup settings in Backup and Restore to include the D: drive. Enable System Protection for the D: drive.

You are preparing to install Windows on a new computer. You copy the installation files from a DVD to a USB flash drive and then use bootsect to make the USB drive bootable. Using the RAID controller on the mother board, you configure three hard disks in a RAID 5 array. You insert the USB drive and boot the computer. The computer boots and displays the following message: Error loading operating system Reboot and select proper boot device What should you do?

Modify the boot order to boot from the USB device first in the BIOS.

Your notebook computer is configured to connect to the wireless network at work using a wireless profile named Company1. The profile is configured to connect using 802.11b. During a recent upgrade, your company added an 802.11n wireless access point. The access point is configured to support 802.11n using one radio and 802.11b/g with the other radio. You create a second profile on your computer for the 802.11n network. You notice that your computer is connecting automatically using 802.11b. You want the computer to connect to 802.11n whenever it's available and only use 802.11b if 802.11n is unavailable. What should you do?

Move the 802.11n profile up in the list of preferred networks.

For the D:\Reports\Finances.xls file on your Windows system, you explicitly grant the Mary user account the Allow Modify NTFS permissions. You need to move the file from the existing folder to the D:\Confidential folder. You want to keep the existing NTFS permissions on the file. How can you accomplish this with the least amount of effort?

Move the file to the new folder.

A user connects to their bank's website. When the user logs in, the bank accepts the user credentials, and the user's web browser the site's security certificates. Which security process is being used?

Mutual authentication

You are configuring a small Workgroup. You open System Properties on each computer that will be in the Workgroup. Click the System Properties options you can use to configure each computer's workgroup association. (Select two. Each is a complete solution.)

Network ID Change

What setting allows the computer hosting to share to be located by a remote system?

Network discovery

You have a Windows 10 computer that is shared by multiple users. You want to allow non-administrative users to install devices that use third-party drivers. Users should be able to install the device without prompts for administrative credentials. Users should only be able to install devices that use the drivers that you specifically identify. You copy the necessary drivers to the computer. You configure the DevicePath registry key to identify the folder where the drivers are located. A standard user logs on and tries to install the device. They receive a prompt for administrative credentials. What should you do?

Obtain drivers that have a digital signature.

You manage two Windows systems named Computer1 and Computer2. You need to use the command line to remotely manage Computer1 from Computer2. What should you do? (Select two.)

On Computer1, run winrmqc Authenticate Computer2 to Computer1

You manage two Windows systems named Computer1 and Computer2 Both computers are members of a domain. Which steps do you need to perform so you can remotely execute commands on Computer2 from Computer1?

On Computer2, run winrim qc

You manage two Windows systems name Computer1 and Computer2. Both computers are members of a domain. Windows Remote Management (WinRM) is enabled on both computers. Which steps do you need to perform so you can use Computer2 to create an additional disk volume on Computer1?

On Computer2, run winrs and then run diskpart.

You manage three Windows systems that are part of a Workgroup. You would like to configure Event Subscriptions so that you can view all events from those computers on your Windows notebook. You need to configure the three source computers and one collector computer. The subscription will be a source-initiated subscription. What should you do? (Select two.)

On all four computers, run the winrm qc-q command. On the collector computer, run the wecutil qc /q command. On the collector computer, configure the subscription.

You have two Windows systems named Computer 1 and Computer 2. Over the next few days, you want to be able to monitor Computer 1 and Computer 2. To do this, you want to automatically save and send Computer 1's Application and System logs to Computer 2. How would you do this?

On both computers, enable and configure Event Subscriptions. Configure Computer 1 as a source and Computer 2 as a collector.

Click on the screen saver option that can be used to increase security by requiring the user to enter a password to access the desktop after the screen saver has been activated.

On resume, display logon screen

You are troubleshooting a problem that keeps occurring on your Windows system. When the problem happens, Event Viewer shows several Error events in the Application and System logs. From a single view, you would like to see only Error events from both the Application and the System logs. What can you do in Event Viewer to make this happen?

On the Application log, filter the log to show only Error events. Save the filter to a Custom View and then add the System event log as an additional filter.

You are using a Windows desktop system to connect to a remote system using Remote Desktop, How do you prevent the desktop background on the remote computer from displaying on the local computer?

On the Experience tab of the Remote Desktop Connection, clear the Desktop Background checkbox.

Microsoft Office 365 ProPlus lets you determine where user data is stored. For example, it could be stored on your workstation. Which of the following are your other storage options? (Select two.)

On the cloud On a network

In Windows 10, there are two options to get to Display settings. What are the options? (Select two.)

On the desktop, right-click and then select Display settings. Right-click the Windows icon and then select System > Display

You are installing Windows on a new computer. Using the RAID controller on the motherboard, you configure three hard disks in a RAID 5 array. You leave the array unpartitioned and unformatted. You edit the BIOS boot order from the optical drive. You insert the installation DVD, boot the disc, and start the installation. When you are prompted to select the disk where you want to install Windows, the RAID array created does not show as a possible destination disk. What should you do?

On the screen where you select the disk to install Windows, click Load Driver.

You have several personal mobile devices that you use on a daily basis. You want to be able to authenticate to each device with the same username account so you can share your personal data and apps regardless of which mobile device you use. Which type of use account must you create?

Online user account

Who can access a line-of-business app?

Only the employees of the business who wrote the app.

When using the Indexing Service on your Windows system, how many directories should you typically catalog?

Only those containing data that is used often.

You are the desktop administrator for your company. You would like to manage the computers remotely using a tool with a graphical user interface (GUI). Which action should you take? (Select two).

Open Computer Management and connect to each remote computer. Establish a Remote Desktop connection to each computer.

You install a new internal sound card in your Windows system. After you reboot and install the driver, but the device does not appear to be working.You need to view information for the device and perform troubleshooting steps. What should you first?

Open Device Manager to view the status of the sound card.

You started using a new Windows server three months ago. Since that time, you have found that the system slows down and crashes from time to time. You want to look at a report that shows important evens for the server since it was installed. You'd like to see when software was installed and if there are any hardware or application failures. What is the simplest way to view this information?

Open Reliability Monitor

You have a Windows system that you would like to manage remotely. You enable Remote Desktop on the computer. While working from home, you find that your home firewall is blocking Remote Desktop. Using the ports assigned by default, how can you configure the firewall to allow a Remote Desktop connection to the system?

Open port 3389 in the network firewall.

During the initial installation of your Windows system, you elected to use a local user account for authentication because you had not set up an online Microsoft account. You now realize that you want to synchronize your desktop theme, browser settings, passwords, and other settings to other computer that you use. To do this, you need to create an online Microsoft account that you can use when authenticating to other computers. Which of the following steps can you use to create the online account and begin using it to sign in? (Select two.)

Open the Settings app and click Accounts > Sign in with a Microsoft account instead. Access http://www.live.com and create a new Microsoft user account.

The sales reps in your organization use a VPN connection on their Windows systems to access the corporate network while traveling. You are concerned that a sales rep has configured her VPN connection to automatically remember her credentials for accessing the VPN server. This violates your organization's security policy. Click the option in the VPN Connection Properties dialog you would use to disable this functionality.

Options

You have two computers. ComputerA is running Windows 7 Professional, and ComputerB is running Windows 10 Professional. You need to transfer user profiles and data files from ComputerA to ComputerB. Which tool should you use?

PCmover Express

Which of the following sign-in options must be setup before you can use Windows Hello to configure facial recognition or fingerprint authentication?

PIN

Which of the following authentication methods does Windows Hello support? (Select three.)

PIN Facial recognition Fingerprint scanning

You want to enable Data Execution Protection (DEP) for all programs and services on your Windows system. Click the option you would use in the System Properties to configure this function.

Performance Visual effects, processor scheduling, memory usage, and virtual memory Settings

There's a tool designed to collect data. It allow you to specify which counter you want to collect data for by clicking on the plus sign and adding the counters you want. What the name of this tool?

Performance Monitor

You need to monitor the process utilization on your Windows system. You want to get an email notification every time the processor utilization exceeds 90%, so you create a new Data Collector Set in Performance Monitor. Which type of Data Collector should you create?

Performance counter alert.

You have a computer running Windows 10. You have just enabled Remote Desktop on the computer so you can connect to it using a low-speed broadband connection from home and run a few reports. You need to optimize the performance of your Remote Desktop session for your slow connection. Select the Experience settings(s) that will optimize performance.

Persistent bitmap caching

You want to change the desktop background, window color, sounds, and mouse cursor all at once. Which of the options would you use?

Personalization

You manage a Windows network environment. As part of your IPv6 migration strategy, you have implemented Teredo on your network. You would like to test the communication of a client computer using Teredo. What should you do?

Ping the address beginning with 2001:

You manage a Windows network environment. As part of your IPv6 migration strategy, you have implemented ISATAP on your network. You would like to test the communication of the clients computer using ISATAP. What should you do?

Ping the address beginning with FE80:

You have been having trouble with your Windows notebook system crashing. The support technician want you to send him a memory dump that occurred when the computer crashed. You find that the computer did not create the memory dump file. How can you configure the system to create a memory dump file the next time it crashes?

Place the paging file on the system drive.

Consider the password policy settings shown. You just created a new account for a user named Austin Hammers on a Windows 10 system that is configured to use the password policy shown in the exhibit. The name of the user account is AHammer. You specified that the user much change the password on the first logon. Which of the following passwords would AHammer be allowed to use on this system? (Select two.)

PlymCud65#1 0badBeef!

Which of the following is an accurate description of the function of the Windows Performance Analyzer (WPA)?

Presents trace content in the form of interactive graphs and summary tables.

In the User Account Control policy settings for Behavior of the elevation prompt for standard users, which options can be configured? (Select two.)

Prompt for credentials on the secure desktop. Automatically deny elevation requests.

Windows comes with a special tool called the Microsoft Management Console (MMC). What does this tool do?

Provide a consistent interface for all management tools.

Management has decided to purchase new desktop systems for the users in the engineering department. A needs assessment has determined that the new systems must meet the following requirements: The systems must be joined ti the organization's existing Active Directory domain. The systems must support high-performance device configuration. Whole disk encryption much be implemented with BitLocker. The systems must support virtualization using Hyper-V Machine Manager. A sales rep from a computer manufacturer recently offered you a very competitive price on notebook systems with the following specifications: CPU: 64-bit AMD 3.0 GHz quad-core RAM: 8 GB Hard disk: 1 TB Operating system: Windows 10 Pro for Workstations What should you do?

Purchase the desktop systems as configured and implement them in the network.

You want to set up Office 365 for all employees in your company. You know that you must find out if your devices are compatible with Office 365 ProPlus before deploying it to your end users. Which tool should you use to determine this?

Readiness Toolkit

You install the drivers to connect your new music player to your Windows 10 computer. Immediately, following the device installation, you get a bluescreen error. You reboot the computer, but it displays the same bluescreen and stops the boot process. What should you try first to get the computer to boot successfully?

Reboot and Repair your computer and then choose Startup Repair.

Prior to installing some software on your Windows system, you turn off User Account Control (UAC), reboot the computer, and install the software. You turn UAC back on, but it does not prompt you before performing sensitive actions. How do you make UAC protection work again?

Reboot the machine.

You have previously installed Windows 10 on two new computers and configured both computers with BitLocker. Both computers have a TPM installed. Because of a hardware failure, one of the computers will not boot. You replace the failed hardware, but now BitLocker is preventing the system from starting because it has failed the startup system integrity checks. Which of the following options would you use to reconfigure BitLocker so the system will start?

Recovery key

Match each operating system updates on the left with its description on the right. (Each update may be used once or more than once.)

Release semi-annually in the spring and fall. - Feature updates Include security fixes and software updates. - Quality updates Deployed monthly (usually second Tuesday on the month.) - Quality updates New version of Windows operating system. - Feature updates Cumulative in nature, add and missed updates. - Quality updates

On your Windows computer, you share the D:\Promo folder using a share name of Promo. The share has been assigned the following permissions: User/Group Permission Telesales group = Allow Read Training group = Deny Full Control Managers group = Allow Change Mary user = Allow Change The Mary user account is a member of the Training group. NTFS permissions allow all access. Mary needs to be able to edit documents in the shared folder but cannot. You need to modify the share permissions to allow her the necessary access. What should you do? (Select two.)

Remove the Mary user account from the Training group. Change the Training group permission to allow Read.

You manage several Windows systems that are members of a domain. Your company uses Remote Assistance to help diagnose user desktop issues. All computer are configured to allow Remote Assistance. One day, you receive a Remote Assistance request from someone you don't know using an invitation file you created several weeks ago. What can you do to prevent this from happening again? (Select two.)

Require a password on invitation files. Decrease the timeout for invitation files.

You want to increase security as uses sign in to computers in the the domain you administer. How can you implement the strongest form of multi-factor authentication?

Require a password, a biometric scan, and a token device.

You suspect that a process on your Windows computer is causing a large amount of network activity. You would like to view the network activity on your computer filtered by specific processes. Which of the following tools will display the most detail information about network activity?

Resource Monitor

You are analyzing the CPU utilization on your system. Why would you use Resource Monitor rather than Task Manager?

Resource Monitor provide much more granular information than Task Manager.

You are supporting a Windows 10 computer that has the following volumes: The C: drive is the system drive with user profiles and individual user files. The D: drive holds data files common to all users. System Protection has been configured as follows: A system image backup has been created that includes both the C: and D: drives. Regular backups are scheduled to back up all user libraries. The scheduled backup includes a system image. System Restore has been used to take a snapshot. A user has edited and saved a file on the D: drive. The user doesn't like the changes and wants to revert to a previous version of the file. The user goes to the Previous Versions tab of the file and sees nothing listed. How can you help the user restore the previous version of the file?

Restore the file from the system image.

As part of your regular system maintenance, you install the latest operating system updates on your Windows 10 computer. After several days, you notice that the system locks up and reboots from time to time. You suspect that a recent update is causing the problem. How can you quickly restore the computer to its state before the updates?

Restore the system using a restore point.

You are working on a computer running Windows 10. It is part of a domain. You recently installed Windows 10 Pro. After installation, you are not able to connect to resources on the network. You check Device Manager and see the dialog shown below. What should you do?

Right-click the Broadcom NetXtreme Gigabit Controller and select Update Driver.

After completing a clean install of Windows 10, you realize your computer is unable to connect to the network. You decide to open device manager to identify the problem. Based on this screenshot of Device Manager what action should you take to resolve the issue?

Right-click the RealTek RTL8139C Fast Ethernet Controller and click Update Driver Software.

You have a computer that runs Windows 7. You want to perform a clean installation of Windows 10 and maintain as much of the application settings, user profile, and user data as possible. Which steps should you perform to complete the migration with the least amount of effort possible?

Run Scanstate in Windows 7. Perform a custom (advanced) installation of Windows 10 to the existing hard drive. Boot into Windows 10 and re-install all applications. Run loadstate.

Two devices connected to the computer are not working properly. You suspect the devices are using the same system resources, and this is creating a conflict. How can you verify whether or not devices are conflicting with each other?

Run System Information (msinfo32). In the Device Manager, open the device Properties window and click the Resources tab.

You have a stand-alone computer running both Windows 7 and Windows 10. The computer currently boots to Windows 7 by default. You need the computer to boot to Windows 10 by default instead. What should you do?

Run bcdedit.exe

You have just added a new 300 GB hard drive to a Windows Computer. You create a single volume named Data and format the volume using FAT32. The volume is assigned drive letter D:.You copy several files to the new hard disk. Which action must you take first to include the disk in restore points created on the computer?

Run convert.exe to change the drive to NTFS.

You have a computer running Windows that is connected to a domain network. After reconfiguring the static address of an internal Web server named WEB3, your computer can no longer connect to Web3. Buth other users are still able to connect to the same web server. You need to be able to connect to the website on the WEB3 server. Which of the following actions should you take?

Run ipconfig /flushdns command.

Your company has started the migration to IPv6 on your network. Your network administrator tells you that the network is using stateless auto configuration. You need to configure your computer to use the correct IPv6 address, default gateway address, and DNS server address. The computer is currently configured to get all IPv6 information automatically. What should you do?

Run netsh interface ipv6 add dnsserver.

You have a workstation running Windows 10 Home that you would like to upgrade to the Windows 10 Pro edition. How can you perform this upgrade with the least amount of effort and cost while maintaining applications, drivers, and user profile data?

Run the Windows 10 Anytime Upgrade

Your network has just transitioned from IPv4 to IPv6. IPv6 configuration is performed automatically using stateful DHCPv6. A DNS server on your network provides name resolution for IPv6. Your Windows system is having problems communicating on the network. You would like to receive new configuration information from the DHCP server as well as remove all old DNS entries in your local DNS cache. Which of the following actions should you take?

Run the ipconfig /flushdns command. Run the ipconfig /release6 and ipconfig /renew6 commands.

You have a computer that runs Windows and is connected to a domain network with a DHCP server. One day you find that your computer cannot connect to any network resources. You run the ipconfig command and find that the network connection has been assigned the address of 169.254.12.155 with a mask of 255.255.0.0. Which of the following action should you take?

Run the ipconfig /release and ipconfig /renew commands.

You have a laptop running Windows that uses DHCP for IPv4 addressing information. You need to see the IPv4 address, subnet mask, and DNS server addresses that the network connection is currently using. Which of the following action should you take?

Run the netsh command. Run the ipconfig and inconfig /all commands

You would like to configure Event Subscriptions on your Windows system to forward event to a network server. You need to configure your computer as a source computer for a collector-initiated subscription. Which of the following will be part of your configuration? (Select two.)

Run the winrm qc command. Add the collector computer to the Event Log Readers group.

You are the Windows desktop administrator for your company.. You would like to manage your computers remotely using the Windows Remote Shell. You need to enable remote management on each target computer. What should you do?

Run winrm quickconfig

Which of the following wireless network methods make it easy for clients to find and connect to the wireless network?

SSID broadcast

You need to implement a solutions for the sales reps who complain that they are unable to establish VPN connections when they travel because the hotel or airport firewalls block the necessary VPN ports. Which VPN security protocol can you use to resolve this issue?

SSTP

Which kind of cloud computing system is Microsoft Office 365 ProPlus?

SaaS

Using Internet Options, you must set restrictions for downloading unsigned ActiveX controls. Click the tab you would access to set the restrictions.

Security

You manage a Windows system with an attached printer. You share the printer using a share name of Printer1. You have completed the following steps: 1. From the Setting app, select Devices. 2. Selected Printers & scanners. 3. Selected Printer1. 4. Clicked Manage 5. Selected Printer properties. Which tab would you select next to modify the permissions for network users?

Security

Your company has started the migration to IPv6 on your network. Your network administrator tells you that the network is using stateless auto configuration. You need to reconfigure your computer to use the correct IPv6 address, default gateway address, and DNS server address. After accessing theTCP/IPv6 properties for the network adapter, what should you do?

Select Obtain an IPv6 address automatically and use the following DNS sever address.

Your windows system has a folder named D:\SalesDocs. The folder has been shared with the share name of SalesDocs. The D: drive is formatted with NTFS. The following permissions have been configured for the folder: (NTFS permissions Users group=Allow Read, Sales group=Allow-Modify) (Share permissions Users group=Allow Read, Sales group=Allow-Change.) Sally is a member of both the Users and Sales groups. she needs to be able to read and modify all files in the Sales Docs shared folder except for the StyleGuide.doc file. How can you set permissions so that Sally is able to read StyleGuide.doc, but not modify it?

Set Sally's NTFS permission for StyleGuide.doc to Deny Write.

You want to prevent users from reusing old passwords. You also want to force them to use a new password for at least five days before changing it again. What should you do in the Local Security Policy administration to to configure these account policies? (Select two. Each answer is a required part of the solution.)

Set the Enforce password history policy. Set the Minimum password age policy.

Your Windows system is used by several people. As such you want increase security by requiring each user to create passwords that are at least ten characters long. You also want to prevent a user from signing into the computer after three unsuccessful attempts. What should you do in the Local Security Policy administration tool to configure these account policies? (Select two. Each answer is part of the complete solution.)

Set the Minimum password length policy. Set the Account lockout threshold policy.

You want to configure a picture password on a Windows computer. Click the option you would use in the Settings app to do this.

Sign-in options

Which of the following includes the benefit of free upgrades when the next of Windows is release and Microsoft Desktop Optimization Pack (MDOP)?

Software Assurance

Drag each GPO category on the left to the associated policy on the right.

Software that should be installed on a specific computer - Computer Configuration policies Internet Explorer user settings - User Configuration policies Scripts that should run at logon or logoff - User Configuration policies Network communication security settings - Computer Configuration policies Password restrictions that must be met for all user accounts - Computer Configuration policies Software that should be installed for a specific user - User Configuration policies Scripts that should run at startup or shutdown - Computer Configuration policies

You are setting up Windows Defender STP with Intune. Put the following steps in order in which they must be completed.

Step 1 Connect the Intine and Defender ATP systems. Step 2 Devices in Intune are configured to communicate with Defender ATP. Step 3 Configure the security policies in Defender ATP and Intune. Step 4 Any devices that do not comply with the security policy are blocked.

Your windows system has a shared folder named Reorg. The folder contains sensitive information about planned changes in the personnel structure. You configure permissions on the folder to deny access to unauthorized users. You want to prevent users from seeing this share when they browse the computers on the network. You still need to allow access to users who are authorized to use the share. What should you do?

Stop sharing the folder. share the folder again as Reorg$ with the same permissions as before.

You are using a web browser on your windows notebook to access http://westsim.com website. Your notebook has been configured to a DNS server that has an IP address of 137.65.1.254 for name resolution. Your notebooks send a name resolution for www.westsim.com to the DNS server. However, this server isn't authoritative for this domain and doesn't have a record that can be used to resolve this domain name to an IP address. What will happen next?

The DNS server sends a request to a DNS root server for the IP address of a DNS that is authoritative for the westsim.com domain.

The Hide Programs and Features page setting is configured for a specific user as follows: Local GP - Enabled Default Domain Policy GPO - Not configured GPO linked to the user's organizational unit - Disabled After logging in, the user is able to see Programs and Features. Why does this happen?

The GPO linked to the user's organizational unit is applied last, so that this setting takes precedence.

A domain user has had multiple failed login attempts, but the account is not being locked out. You have set up and configured the Group Policy. Which of the following are possible reason the account is not being locked out? (Select two.)

The Group Policy was not applied to the user group. The Account lockout threshold policy is set to 0.

You have configured a Windows server in your network to provide activation for your Windows workstations through Active Directory using the default settings. Which of the following are true concerning activation in this network? (Select two.)

The Windows client systems and the Windows server must all be members of the same domain. The Windows client systems will remain activated as long as they stay members of the domain.

The hardware in a user's Windows 10 Professional system is configured as follows: 100 Mbps network card Sound board SATA adapter 1 TB SSD storage DVD drive You recently made the following changes to the system hardware: New 1000 Mbps network card Blu-ray optical drive SATA connector 2 TB hard disk SATA connector Which of the following are true concerning the activation status of the copy of Windows 10 installed on this system? (Select two.)

The activation status of Windows has not changed. The system's hardware ID (HWID) has changed.

The hardware in a user's Windows 10 Professional system is configured as follows: 1000 Mbps network card Sound board SATA adapter 1 TB SSD storage DVD drive You recently made the following changes to the system hardware: New network card 2 TB hard disk SATA connector Which of the following are true concerning the activation status of the copy of Windows 10 installed on this system? (Select two.)

The activation status of Windows has not changed. The system's hardware ID (HWID) has changed.

You have been given a USB drive that has been encrypted with BitLocker To Go. Which of the following options is required before you can access the data from this drive on a Windows 10 computer? (Select two.)

The correct password A smart card

While working in Device Manager, you notice the display shown below. What does the icon next to the USB Mass Storage Device indicate?

The driver for the device is unavailable.

Which of the following are true regarding Remote Assistance? (Select two.)

The helper cannot copy files from a user's computer. Invitations are require a password and have an expiration date.

Which of the following is one of the prerequisites for creating a Microsoft Store for Business?

The organization must have a Microsoft Azure Directory domain configured.

Match the term with its definition. Each term can only be used once.

The process of authenticating to the computer by supplying a username and password - Signing In The ability to perform an action on a computer - Right Identifies a specific user - Account Access to files, folder, and printers - Permissions

The hardware in a user's Windows 10 Professional system is configured as follows: 1000 Mbps network card Sound board SATA adapter 1 TB hard disk DVD drive Recently, several capacitors on the systems motherboard began leaking, so you replace it with a newer motherboard with a faster CPU. Which of the following are true concerning the activation status of the copy of Windows 10 installed on this system? (Select two.)

The systems's hardware (HWID) has changed. Windows must be reactivated.

Your organization uses 802.11b wireless network. Recently, other tenants installed the following equipment in your building: A wireless television system running 2.4 GHz A wireless phone system running 5.8 GHz A wireless phone system running 900 MHz An 802.11a wireless network running in the 5.725-5.850 GHz frequency range An 802.11j wireless network running in the 4.9-5.0 GHz frequency range Since this equipment was installed, your wireless network has been experiencing significant interference. Which system is most likely to blame?

The wireless TV system

You are helping a user who has been running Windows 10 for over a year. You notice that some features do not look the same as they do on your Windows 10 system. For example, the title bars on windows are plain white, and the Start menu is not as polished. You wonder if this user's computer has received the latest update. The user is sure that updates have been happening, but you're not sure. You open the Settings app and click System. On the About tab, you see the information below. How do you know this computer has not been receiving updates? (Select two)

There is no entry for a Windows 10 Version number. There is no entry for an OS Build number.

Drag each PowerShell feature or function on the left with the appropriate description on the right.

These let you access data stores, such as the registry and certificate store, in a way similar to accessing the file system. - Providers This is text-based and uses a simple command syntax.- Command line interface You can use this to redirect the output of one PowerShell cmdlet to the input of another - Piping These contain one or more PowerShell cmdlets - Script files These are executed at a PowerShell propmt to perform system management tasks. - Cmdlets

Which of the following are security risks associated with usernames and passwords? (Select two.)

They can be reused. They can be hacked.

Your Windows workstation has an IP address of 192.168.1.25 assigned with a subnet mask of 255.255.255.0. It also has a DNS server address of 137.65.1.10 and it has a default gateway router address of 192.168.1.254. Your workstation needs to send a file to a server that has an IP address of 192.168.2.1 and s subnet mask of 255.255.255.0. Where will the packets be sent first?

To the default gateway router.

Which internet Explorer security feature restricts the browsing session information that can be tracked by external third-part websites and applications?

Tracking Protection

You are preparing to share a project folder with your team. You are all on the same network domain. Which sharing options must you select to make sure the team can see the project folder? (Select two)

Turn off network discovery Turn on file and printer sharing

You have a folder on your Windows desktop system that you would like to share with members of your development team. Your team needs to be able to view and edit any file in the shared folder. You share the folder and give each member of your team the Full Control permission to the shared folder. Your team reports, however, that they cannot see the shared folder on the network. Which of the following must be done in order for your team members to see the shared folder on the network? (Select three.)

Turn on File and printer sharing in the Domain network profile on your computer. Turn on Network discovery in the Domain profile on your team member's computers. Turn on Network discovery in the Domain network profile on your computer.

When working from within the Settings app, some applications include an Advanced options link. Selecting this link allows you to view more details about the application as well as giving you the ability to perform which of the following tasks? (Select two.)

Uninstalling the app Setting the default app

You manage desktop systems for a small organization. Currently, all of your systems have the following hardware installed: CPU: AMD Sempron 2.8 GHz Memory: 2 GB Hard disk: 500 GB Windows 10 Home Edition pre-installed on all the systems, and they are currently configured to run in a workgroup environment. Your organization recently decided to implement Windows Server 2016 system with Active Directory installed. Management has asked you to join your Windows 10 client systems to the new domain. What should you do?

Upgrade the desktop systems to Windows 10 Professional.

Management has decided to purchase new notebook systems for the users in the marketing and sales departments. After conducting a needs assessment, they have determined that the new systems must meet the following requirements: The systems must be joined ti the organization's existing Active Directory domain. Applications restrictions must be implemented with AppLocker. Whole disk encryption must be implemented with BitLocker. The notebooks must support remote connections to your organization's DirectAccess server, as a sales reps travel frequently. A sales rep from a computer manufacturer recently offered you a very competitive price on notebook systems with the following specifications: CPU: 64-bit 3.6 GHz quad-core RAM: 8GB Hard disk: 2TB Operating System: Windows 10 Pro What should you do?

Upgrade the operating system to Windows 10 Enterprise.

You need to upgrade a laptop system currently running a 64-bit Windows 8.0 Professional edition to a 64-bit Windows 10 Enterprise. Which of the following actions should you take?

Upgrade the system to Window 8.1.

You run a regular file backup on your Windows 10 computer every Friday night, which also includes a system image backup. System Protection has be enabled for all drives on the system. On Wednesday, you receive a new version of graphic editing application that you use regularly. You install the new application, but you find that the application does not work properly. When you try to run the original application, you find that the upgrade has deleted it from your system. You also find that some of the graphics files you had been working on yesterday have been deleted. What can you do to get things back to normal as quickly as possible? (Select two.)

Use File History to restore the missing files. Use System Restore to revert to a restore point before you installed the application.

You have several computer running Windows 10. The computers are members of a domain. For all computers, you want to remove access to administrative tools from the Start menu and hide notifications from the System Tray. What should you do?

Use Group Policy

You use an application on your Windows system that compresses videos used in your online business. You want to make sure that the application continues to run in the background even if you open other applications. How do you adjust the amount of attention given to that application?

Use Task Manager to modify the process priority.

You attempt to execute a program in the C:\Program Files\AccWiz directory on your Windows system, but you receive a prompt to elevate your privileges. How can you execute the program without receiving a prompt for elevated privileges while also preventing harmful applications from making unwanted changes to the system?

Use runas to execute the program in the C:\Program Files\AccWiz directory.

Your Windows system has devices that are Personal Identity Verification (PIV) complaint. What can you do to implement a form of authentication that takes advantage of PIV?

Use smart card authentication.

To protect the data on your Windows 10 computer from loss or corruptions, you enable system protection on all the drives in your computer. You also schedule regular backups of the system drive and all other drive using the Backup and Restore (Windows 7) console. After working with a file, you noticed that you accidentally deleted most of the data. How can you restore the file to the state it was before you modified it? (Select two.)

Use the Backup and Restore (Windows 7) console to locate and restore the file. Use the file's properties to restore a previous version of the file.

You have a Windows 10 computer configured with volumes C: and D:. You want to schedule backup jobs of the C: volume to include all user files on the C: volume as well as creating a system image of the C: volume. How do you configure the backup job and the schedule with a minimal amount of effort?

Use the Backup and Restore (Windows 7) console.

Your Windows 10 computer has the following drives: C: (System drive with user profiles) E: (Data files) F: (External USB hard drive) You enable system protection on the C: drive. You also schedule regular backups with the following settings: Back up all user libraries Back up the C: and E: drives Include a system image Save the backup to the F: drive Last night the E: drive crashed. How can you restore the data files in the E: drive?

Use the Backup and Restore console to restore data from a backup.

You support a Windows 10 computer that has the following volumes: The C: drive is the system drive with user profiles and individual user files. The D: drive holds data files common to all users. The user has taken the following actions: Scheduled a regular backups to back up all user libraries. The scheduled backup includes the entire D: drive as well as a system image. Used System Restore to take a snapshot. After working with a file on the D: drive, the user has accidentally deleted most of the data in the file. The user needs your help to recover the file as it existed before making the changes. You check the System Protection settings and find that System Protection is not enabled for the D: drive. How can you restore the data in the file with the least amount of effort?

Use the Previous Versions tab of the file properties to restore the file.

Your Windows system has two hard drives: C: and D: For the D:\Reports\Finances.xls file, you explicitly grant the Mary user account the Allow Modify NTFS permission.You need to move the file from the existing folder to the C:\Reports2 folder. You want to keep the existing NTFS permissions on the file. How can you accomplish this with the least amount of effort?

Use the robocopy command to copy the file to the C:\Reports2 folder.

You have just read about a new security patch that has been made available for your Windows system. You install the patch as a Windows update. After you reboot and sign in, your computer appears to be unstable. Which action should you take? (Select two.)

User the Setting app to uninstall the update. Use Programs and Features to remove the update.

Which of the following is included in an access token? (Select two.)

User's SID Security groups SIDs.

Your Windows system has an application installed that you no longer need. What should you do?

Using the Setting app > Apps and features, locate the application and click Uninstall.

You are using Credential Manager to store username and passwords. Which of the following protected areas is used to store this information?

Vault

You manage a Windows system connected to a business network that uses switches and multiple subnets. One day you find that the computer is unable to connect to the Internet, but it can communicate with a few other computers on the local subnet. You enter ipconfig /all at the command prompt and see the following output: Ethernet adapter Local Area Connection Connection-specific DNS Suffix...: my domain.local Description..............................................: Broadcom network adapter Physical Address...................................: 00-AA-BB-CC-74-EF DHCP Enabled.......................................: Yes Autoconfiguration Enabled.............: Yes IPv4 Address...........................................: 169.254.155.1 Subnet Mask............................................: 255.255.0.0 Default Gateway DNS Server What should you do?

Verify that the DHCP server is up and functional.

You are using your Windows 10 notebook computer at a coffee shop. You notice that your notebook has automatically connected to a wireless network that you do not trust. In the Settings app under Network & Internet, which tab should you access for the option to disconnect from this wireless network and reconnect to a network you trust?

Wi-Fi

You've just connected a USB wireless network adapter to a Windows desktop system in your home office.You want to use the Windows Connect Now (WCN) push-button connect feature to connect your desktop to your wireless network. Which technology must be implemented on both the wireless access point and the wireless network interface to enable this feature?

Wi-Fi Protected Setup (WPS)

Windows Update for Business (WUFB) lets you keep devices current with the latest security upgrades and features. Which operating system releases does WUFB support?

Windows 10

Which versions of Windows must you have if you want to implement Group Policy settings for PIN complexity? (Select two.)

Windows 10 Enterprise Windows 10 Education

You need to upgrade a notebook system running 64-bit Windows 7 Home Premium edition to 64-bit Windows 10 Enterprise. Which of the following is true regarding this upgrade path?

Windows 7 Home Premium cannot be upgraded to Windows 10 Enterprise

Match each in-place upgrade on the left with its associated versions of Windows on the right.

Windows 7 Professional Can be upgraded to Windows 10 Home or Pro Windows 7 Ultimate Can be upgraded to Windows 10 Home, Pro or Enterprise Windows 8.1 Basic Can be upgraded to Windows 10 Home or Pro Windows 8.1 Enterprise Can only be upgraded to Windows 10 Enterprise Windows 7 Home Premium Can be upgraded to Windows 10 Home or Pro Windows 7 Home Basic Can be upgraded to Windows 10 Home or Pro Windows 8.1 Professional Can be upgraded to Windows 10 Home, Pro or Enterprise Windows 7 Enterprise Can only be upgraded to Windows 10 Enterprise

What is the tool that queues messages, check several security and maintenance-related items, and consolidates messages and status updates for several other tools called?

Windows Action Center

What tools or services rely on Security Center to be active and running to functions well? (Select two.)

Windows Action Center Network Access Protection

Which of the following are true about Windows Updates for Business? (Select three.)

Windows Update for Business can be configured with Group Policy, Mobile Device Management, or System Center Configuration Manager. Windows Update for Business can be used with all versions of Windows 10 except Windows 10 Home. Windows Update for Business provides the latest features for your Windows 10 devices, including security upgrades.

You have a small network with three subnets, as shown in the diagram below. IP addresses for each router interface are also indicated. You need to connect Wrk1 to subnet A and Wrk5 to subnet C. Each workstation needs a static IP address that will allow it to communicate on the connected subnet.

Wkr1 - 192.168.111.62 Wrk5 - 10.155.64.97

Understanding Windows 10 power options is important as you roll out new devices in your IT enterprise and users become more mobile. Rank the six standard ACPI states in order from highest to lowest power consumption.

Working State Modern Standby Sleep Hibernate Soft off Mechanical off

You have a 64-bit computer that runs Windows 7 Professional. You would like to upgrade the computer to Windows 10 Pro. Your computer has the following specifications: 1 GHz Processor 2 GB RAM 20 GB free hard disk space DirectX 9 graphics card with WDDM 1.0 driver DVD drive 800 x 600 display resolution You ran an update, so you have the latest version of Windows 7 Professional. Next, you will run the Windows 10 Upgrade Assistant Can you expect your system to meet the system requirements for the upgrade to Windows 10 Pro?

Yes. This system meets the system requirements for upgrading to Windows 10 Pro

Match each printer management feature on the left with the appropriate description on the right.

hen enableA color printing sub-system that provides support for inkjet printers that user more than the standard four color ink cartridges. Windows Color System When enabled in Windows 10, this will automatically set the last printer a print job was sent to. Default Printer Defines the content and appearance of documents and creates a document every time a print job is sent from applications running on Windows. XML Paper Specification Forces print jobs to be spooled on the client machine in order to reduce print processing times. Client-Side Rendering

What are some of the resources you can look at first when troubleshooting startup issues with your PC? (Select two.)

msconfig Task Manager

You use a Windows client system on your desktop. Your company has started the migration to IPv6 on the network. You need to configure your computer with a static IPv6 address. Which command should you use to configure a static IPv6 address?

netsh

You need to interactively access the command prompt on a remote Windows system named WS1 from your windows workstation. Which command should you use to do this?

psexec \\WS1 cmd


Related study sets

Exam 1: Mobility Practice 30 Questions

View Set

AP English Language and Composition Rhetorical Devices Review

View Set

Chapter 12: Insurance, Licenses, and Permits

View Set

Westward Expansion/Slavery/Causes of Civil War

View Set

INFS2608 Lecture 5 - Relational Model and Relational Algebra

View Set

Economics Chap 14, EC 112- Final Exam

View Set

Mortar Firing Direction Procedures

View Set