Testout Client Pro 6.0

Home

Using a USB flash drive, you intend to install Windows 10 on several computer. To save time, you would like to automate the installation of Windows 10 for each computer. What should you do?

Create an answer file named unattend.xml. Place the file on a USB flash drive and run setup.exe

You need to install Windows 10 Enterprise edition on multiple computers.
Each computer has a single SATA hard drive, a PXE-compliant network card, a DVD drive, and several open USB ports. You will not use WDS or MDT for the installation.
When you start ea

Create an Unattend file on a USB drive. On each computer, edit the BIOS to boot from the optical drive first. Insert the Windows installation disc into the DVD drive and the USB drive into a USB port

You want to deploy Windows 10 on multiple computers using a system image
You would like to use an answer file to automate the installation process on a reference computer. What should you do first?

Run Windows System Image Manager (Windows SIM)

Creates and manages answer files

Windows SIM

Removes machine specific information

Sysrep

Command line tool that can be used to manually capture, modify, and deploy a Windows image

DISM

Creates provisioning packages

Windows Configuration Designer

A bare minimum version of Windows that can boot a system

WinPE

You want to capture your Windows installation as a system image. You need to remove any computer-specific information from the computer prior to you capturing the image.
What should you do?

Run Sysprep

Prior to capturing the system image, you need to use the sysprep utility to prepare a system image for deployment to other computers.
Which option must you use with sysprep to remove machine-specific information from the installation?

/generalize

You have installed the Microsoft Deployment Toolkit (MDT), the Assessment and Deployment Kit (ADK), and the Windows Preinstallation Environment Add-on. (WinPE files) on a management machine.
Using the Deployment Workbench on this management machine, you h

Update the deployment share

You want to caputre a system image to deploy Windows to multiple computers. You want to install Windows on the reference computer using an answer file.
Which set of steps should you follow to create the answer file?

1. On a technician computer, insert the Windows product DVD
2. Run Windows SIM and load a preloaded install image (install.wim) from the DVD.
3. Select and edit the responses to the questions presented during product installation
4. Validate the file in W

To deploy Windows 10, you want to use the Windows 10 installation on a selected computer as a system image.
After removing machine-specific information from the computer, you are ready to capture the image as a WIM file.
What should you do?

Boot to Windows PE and use MDT to capture the Windows installation onto a network share

Last month, you deployed Windows 10 Enterprise to all of the destop computers in your company using a single system image. To install this image, you created a WinPE boot CD.
You recently received new desktop computers, and one of your colleages is not ab

Install the latest hardware drivers to these new desktop computers on the WinPE image

Management has devided to purchase new notebook systems for the users in the marketing and sales departments. After confucting a needs assessment, they have determined that the new systems must meet the following requirements:
-must be joined to the organ

Upgrade the OS to Windows 10 Enterprise

You have several computers in a domain network. Your company develops software that runs on bot Windows XP and Windows 7. Programmers need to have computers that will dual boot between Windows XP and Windows 7. You need to configure each system to meet th

Install Windows 7 first, and then install Windows 10 on another partition

You have a computer that currently has Windows 7 installed on it.
You need to perform a clean installation of Windows 10, but it is very important that you are able to continue using this system with the same applications and data. You must retain the exi

Gather the application installation media and product keys
Back up the user data

You have a stand-alone dual-boot system running both Windows 7 and Windows 10.
The computer currently boots to Windows 7 by default. You need the computer to boot to Windows 10 by default instead.
What should you do?

Run bcedit.exe

You are performing an installation of Windows 10 on a desktop PC that uses a newly configured RAID 1 disk array.
You booted the system from the Windows 10 installation DVD and navigated through the first few screens of the installation wizard. You've reac

Custom: Install Windows only (advanced)

You are performing a clean installation of Windows 10 on a notebook computer. The notebook system has one SATA hard disk installed.
You want to divide the hard disk into two volumes. The C: volume should be 150 GB in size. The D: volume should consume the

Drive 0 Unallocated Space

You are installing Windows on a new computer.
Using the RAID controller on the motherboard, you configure three hard disks in a RAID 5 array. You leave the array unpartitioned and unformatted. You edit the BIOS boot order to boot from the optical drive. Y

On the screen where you select the disk to install Windows, click LOAD DRIVER

You've been asked to install Windows 10 on several computers that do not have optical drives. What should you do (Select three)

Use a USB flash drive with at least 4 GB of space
Copy the product DVD to a USB flash drive and boot from the drive
Use the BOOTSECT command to make the USB flash drive bootable

You want to prepare a USB flash drive that you can use as a Windows 10 installation source.
Which of the following tools can be used to prepare the USB flash drive? (Select three)

Windows 7 USB/DVD download tool
Media Creation tool
DiskPart

You do not use the Microsoft XPS Document Writer. Which option could you use to disable it

Turn Windows Features On or Off

You are preparing to install Windows 10 on a new computer.
You copy the installation files from a DVD to a USB flash drive and the use bootsect to make the USB drive bootable. Using the RAID controller on the motherboard, you configure three hard disks in

Modify the boot order to BOOT from the USB device first in the BIOS

You have configured a Windows server in your network to privide activation for your Windows workstations through Active Directory using the default settings.
Which of the following are true concerning activation of this network? (Select two.)

The windows client system and the windows server must all be members of the same domain
The windows client systems will remain activated as long as they stay members of the domain

You have configured a Windows server in your network to provide activation for your Windows workstations using the Key Management Service. (KMS)
Which of the following are true concerning activation in this network? (Select two.)

By default, the Windows client systems ill attempt to renew their activation status every 7 days
KMS activations are valid for 180 days

Which of the following activation processes requires one of the following thresholds to be met?
-25 or more client systems (physical or virtual) must require activation
-5 or more servers (physical or virtual) must require activation

Key Management Services (KMS)

Your company wants to activate Enterprise licenses on a one-time basis by calling Microsoft. Which of the following activation process will they need to use?

Multiple Key Activation (MKA)

Which of the following would require you to enter a product key to activate Windows 10?

Buying a refurbished device running Windows 10

Can be activated over the internet or by calling microsoft

Multiple Activation Key

Can only activate Windows Server 2012, Windows 8.1, and newer OS

Active-Directory based activation (ABDA)

Any domain controller that is a part of the forest can be used to activate a client

Active-Directory based activation (ABDA)

Systems are activated on a one-time basis

Multiple Activation Key (MAK)

/ato

activates windows

/dli

displays summary license information

/xpr

displays a license's expiration date

/dlv

displays detailed license information

/ipk

installs a new product key

You manage a Windows computer that is being used by multiple people.
One of the users installs a new Insternet Explorer add-on that interferes with the browsing functionality of other users on the system, but the add-on is necessary for business purposes.

Instruct the other users to log on and disable the add-on

Windows accessibility options can be enable to support users with physical limitations.
Which of the following items can be configured in the Settings app under Ease of access? (Select three)

Change the size and color of your cursor and mouse pointer
Change the brightness automatically or use night light
Select the primary mouse button

Which Settings app category would you use to configure options such as:
-Letting apps use your advertising ID for experience across apps
- Letting apps use your camera
-Letting Windows track app launces to improve Start and search results
-Inking and typi

Privacy

Which Settings app category would you use to configure accommodations for users with impaired vision or hearing?

Ease of Access

Which settings app category would you use to customize the appearance and behavior of the Start Menu

Personalization

You are using Cortana, and you would like to configure it to respond even when the screen on your device is locked. Which Settings app category would you use to make those changes?

Cortana

You want to change the speech voice from Microsoft David to Microsoft Zira. Under which Settings App category would you locate this option?

Time and Language

You want to show reminders and incoming VoIP calls on the lock screen. Which of the Settings app cateogires would you like to use to make this adjustment?

System

If you want to change the background, color, sounds, and mouse cursor at the same time, you might consider using which of the following Personalization options found in the Settings app?

Themes

You are using the Privacy category found in the Settings app.
If you do not want to send your browsing habits to Microsoft, which option would you turn off?

Let apps use advertising ID to make ads more interesting to you based off your app activity

On your Windows system, you want to prevent Edge from leaving a tail of your browsing session. What should you do?

Open a new InPrivate window

You need to change the web page that opens when you launch the Edge browser.
Click the tool in the Edge browser toolbar that allows you to make this change

Three dots

Desktop users access an in-house application that his hosted on your intranet web server. When users click a specific option in the application, they receive an error message that the pop-up was blocked.
How to do you configure security settings so that u

Add the URL of the website to the Local intranet zone

A user made some modifications on the Advanced tab in Internet Explorer's Internet Options, and now she is having a problem.
How so you restore the default internet properties settings with the least amount of effort?

In Internet Options on the Advanced tab, click Restore Advanced Settings

You manage a Windows system. Multiple people use the computer. Users sometimes allow Internet Explorer to remember passwords when accessing various websites.
What can you do to prevent the stored passwords from being stolen from the system?

In the AutoComplete settings, delected the Usernames and passwords on forms checkbox

Using Internet Options, you must set restrictions for downloading unsigned ActiveX controls. Click the tab you would access to set the restrictions

Security

Which Internet Explorer security feature restricts the browsing session information that can be tracked by external third-party websites and applications?

Tracking Prevention

General

Delete temporary files, cookies, browsing history, form data, and passwords

Security

Enable Protected Mode

Privacy

Configure Pop-up Blocker settings

Content

Manage certificates, trusted root cas and trusted publishers

Connections

configure proxy settings

Programs

Add, disable, or remove browser addons

Advanced

Reset Internet Explorer settings to their default values

You access the Widgetproject share on a server at your organizations headquarters over a WAN Link using the following UNC path \\FS3\WidgetProject. Click the zone this sire belongs to by default in Internet Options

Local Intranet

You manage several Windows systems that are members of a domain
Your company has an internal website that requires HTTPS. The website's certificate is self-signed. You use HTTPS to browse to the website and receive the warning message as seen in the image

Import the websites certificate to the Trusted Root CA list

You have a Windows 7 system that you would like to upgrade to Windows 10.
How can you make sure that everything in your current system is compatible with Windows 10?

Run the Windows 10 Upgrade Assistant

You have a Windows 7 Enterprise system that you are upgrading to Windows 10 Enterprise. You've already purchased and downloaded the installation ISO file and burned it to a DVD. Next, you ran the Windows 10 Upgrade Assistant. It alterted you to the fact t

Back up your data
Create a system image
Gather installation discs and product keys for applications you want to keep

You are running the WIndows 10 upgrade process and have reached the point in the process shown below. You are very concerned about keeping your personal data private.
Click on the option you should select.

Customize Settings

You have a workstation running Windows 10 Home that you would like to upgrade to the Windows 10 Pro edition.
How can you perform this upgrade with the least amount of effort and cost while maintaining applications, drivers, and user profile data?

Run an In-Place upgrade

You need to upgrade a notebook system running a 64-bit Windows 7 Home Premium edition to a 64-bit Windows 10 Enterprise.
Which of the following is true regarding an upgrade path?

Windows 7 Home Premium cannot be upgraded to Windows 10 Enterprise

You need to upgrade a laptop system currently running a 64-bit Windows 8.0 Professional edition to a 64-bit Windows 10 Enterprise.
Which of the following actions should you take?

Upgrade the system to Windows 8.1

You have two computers. ComputerA is running Windows 7. Computer B is running Windows 10
You need to migrate all user profiles and data files from Computer A to Computer B.
Which command options must you include to ensure the suer accounts on the destinat

On computerb, run LOADSTATE with the /lae and /lac options

You need to migrate specific application settings from ComputerA to Computer B using USMT.
What should you do (select two)

Edit the config.xml file
Run scanstate with the /genconfig option

You have a computer that runs Windows 7. You want to perform a clean installation of Windows 10 and maintain as much of the application settings, user profile, and user data as possible.
Which steps should you perform to complete the migration with the le

Run Scanstate in Windows 7. Perform a custom (advanced) installation of Windows 10 to the existing hard drive. Boot into Winodws 10 and re-install all applications. Run Loadstate

Allows the overwriting of existing data

/o

Specifies users to omit from migration

/ue

Specifies users to be migrated

/ui

Generates a space estimate

/p

Specifies users to be migrated

/ui

Enables user accounts

/lae

Specifies the users to omit from migration

/ue

Creates user accounts

/lac

You have two computers. Computer A is running Windows 7 Professional and Computer B is Running Windows 10 Professional. You need to transfer user profiles and data files from COmputerA to ComputerB
Which tool should you use?

PCmover Express

You have two computers, Computer A and ComputerB is running Windows 10.
You are using USMT to migrate the user profiles and the default date files from Computer A to Computer B. The user works with graphics so you must also include .jpg files
Which action

Create a custom XML file

You have a computer running Windows 8.1. You want to migrate to Windows 10 using a wipe-and-load migration to transfer files and folders. Which of the following methods could you use?

PCmover Express

You have two Computers. Computer A is running Windows 8.1, and Computer B is running Windows 10.
You need to migrate all user profiles and data files from Computer A to Computer B. In Command Promp, you have entered the following command:
LoadState f:\Use

All of UserA's information is migrated and UserA's account is disabled

If you need to customize the files gathered from the standard user profile folders to be migrated, it is recommended that you wedit which of the following files?

Config.xml

How are provisioning methods distributed?

Using a USB drive

Which service allows a device to step up to a higher version of Windows?

Windows Subscription Activation

With Azure Active Directory join, what does the user need to provide in order to be automatically joined to Azure AD and enrolled in a mobile device management solution with no additional user interaction?

Work or school user ID and password

When piloting a deployment, which actions should you consider taking? (Select two?)

You should test deployments with small groups
You should check all third-party encryption tools and switch to BitLocker if needed

Which of the following is intended for organizations that do not have an on-premises Windows Server, Active Directory infrastructure?

Azure Active Directory Join

What is the purpose of using Windows Autopilot?

To make the deployment and management of New Windows 10 services easier

When using Windows Autopilot deployment profiles to customize the Out-of-Box experience, you can create a default feployment profile of settings for a device group.
Which types of groups can you use? (Select two.)

Security group
Windows 365

Which key combination can you press during the initial boot process to get Command Propmp prior to the computer running the Out-of-Box experience?

Shift + F10

You have booted a new computer (purchased from a manufacturer) to PowerShell prior to the computer starting the Out-of-Box experience.
From PowerShell, you run the Set-ExecutionPolicy Unrestricted cmdlet.
What is the function of this cmdlet?

Allows Windows to run scripts

Windows Autopilot depends on a variety of internet-based services. Access to these services must be provided for Autopilot to function properly.
Which of the following should you ensure are applied in order to achieve proper Autopilot functionality?

Having access to all hosts via ports 80, 443, and 123
Using DNS name resolution for internet DNS names

As part of your responsibilities, you manage multiple VHD files that contain bootable Windows images.
You need to make multiple changes to the image within each of the VHD files. Each image will get the same list of updates. You want to update the images

Create an unattend file with entries in the offlineServicing section. Run DIsm to apply the file to each image

You need to deploy Windows 10 to multiple new computers using a system image.
You have created an answer file called Win10Answer.xml in the E:\Images\AnswerFiles folder.
After opening the Deployment and Imaging Tools Environment, which of the following us

dism /apply-unattend:e:\images\answerfiles\Win10Answer.xml

You need to deploy Windows to multiple new computers using a previously captured system image. Before you deploy the image, which tool can you use to see a list of all the drivers included in the image?

dism

You need to deploy Windows to multiple new computers using a system image on a network share.
You have updated the offline image with a Windows Update Standalone installer (.msu) file, but the new .msu file seems to be causing a boot failure.
What can you

Use the dism /cleanup-image and /RestoreHealth options

You need to deploy Windows to multiple computers using a system image.
Before deploying the image, you need to insert the third-party drivers from the C:\Drivers\Network and C:\Drivers\Custom directories into the system image
Which command should you ente

dism /add-driver /driver:c:\drivers /recurse
dism/add-driver /driver:c:\drivers\network /driver:c:\drivers\custom

You need to deploy Windows to multiple new computers using a system image. Before deploying the image, you need to make sure there is a specific Windows application on the image.
Which command should you enter at the command prompt? (Select two)

dism /get-appinfo
dism /get-apps

You need to deploy Windows to multiple new computers using a system image.
You mount the image and use DISM to make several changes to the image, but you devide not to keep any of the changes you have made. The image is still attached.
How can you undo th

Run /dism with the /unmount-wim and /discard options

Using audit mode to make changes to a windows image

online servicing

The process of making changes to a Windows image without loading the image into a reference machine

Offline servicing

To change or update a Windows Image

Image servicing

You have a computer that runs WIndows 10. You have created a VHD file that contains a Windows 10 Image
You need to perform offline servicing of the image in the VHD file to add a driver and enable some WIndows features
You attack the VHD file. You use DIS

Run dism /remove-driver

You have a computer that runs Windows 10. You have created a VHD file that contains a Windows 10 installation image. The VHD file is currently not attached.
You would like to perform offline servicing of the image in the VHD file to add a driver and enabl

Attach the VHD file

You have just finished installing Windows 10 on a computer that will be the reference system. An image needs to be captured from this reference system.
You will be deploying the image captured to computers that were made by several different manufacturers

System Preparation tool (Sysprep)

You have just finished installing Windows 20 on a reference system from which you need to capture an image. You've already removed device-specific information from the system and are ready to capture the image files.
Which tools can you use to do this?

Deployment Image Servicing and Management

You just created a provisioning package for Windows 10 desktops using the Windows Imaging Configuration Designer (ICD) found within the Windows ADK.
Which of the following are true? (Select two)

The provisioning package can be applied to a running WIndows 10 system
The provisioning package can be applied to a running Windows 10 image

What is the Windows Configuration Designer?

A tool used to create provisioning packages

`You have fifteen Windows 10 computers in a workgroup. Your task is to create a Local User account on each computer called BackupAdmin. The account must be part of the Backup Operators Group.
What should you do?

Use the Windows Configuration Designer to create a provisioning package. Run the package on each computer

Your company just installed new wireless access points. The access points use WPA2-Enterprise. The computers you are working with belong in the TestOut workgroup. You are at the point of the process where you need to configure 20 Windows 10 computers to c

Use Windows Configuration Designer to create a provisioning package to complete the task. Run the package on each computer.

You are configuring a provisioning package using the Windows Configuration Designer's Provision Desktop Devices option. One of the purposes of the package is to give each computer the name Testout- followed by a random four digit number.
What should you e

Testout-%RAND:4%

All your users work remotely. One of your users buys a notebook computer with Windows 10 Pro from an online store. The computer is to be used for company business. YOu need to upgrade the computer to Windows 10 Enterprise and join it to the CorpNet.xyz do

Create a provisioning package and email it to the user with instructions on how to run it

Your organization's in-house software development team has written a custom app that allows Windows 10 systems to connect to your company's sales database and update contact information for sales leads.
During the process of developing and digitally signi

Install the root certificate into each workstation's Trusted Root Certification Authorities certificate store

You need to enable sideloading on a Windows 10 system. You have opened the Settings app and have navitaged to Update and Security.
Click the option that you would use to do this.

For Developers

You need to develop and then install a sideloaded app on the Windows 10 Professional systems within your Organization.
Which of the following are true regarding this process? (Select two)

Sideloading must be enabled on the Windows 10 Professional systems using the Settings app
The app may be digitally signed using a self-signed certificate minted by Active Directory Certificate Services on the Windows Server

You need to develop and install a sideloaded app on the Windows 10 Professional systems within your organization. You plan to use a certificate purchased from Symantec to digitally sign the app prior to sideloading it on your Windows systems.
Which of the

You do not need to manually import the certificate used to digitally sign the app on each system

You recently developed a productivity app for your Windows 10 systems and now need to sideload it on the Windows 10 Professional systems in your organization.
Which Powershell cmdlet can be used to do this?

Add-AppxPackage

You have a Windows 10 device that is part of a workgroup. You want to be able to install custom apps directly to a device without going through the Windows store.
What do you do

Use sideloading to install the apps

You have downloaded a custom app from a vendor that you want to sideload. In PowerShell, you have used the import-moduleappx and add-appxpackage cmdlets, but you are getting an error.
What should you do next?

Check the root certificate and verify the digital signature for the app

You are using PowerShell cmdlets to sideload an app. Which two cmdlets must you run to complete the task?

import-module appx and add-appxpackage

`You are creating a reference Windows 10 image that will be used on 100 computers. Each of these systems needs a custom app to be sideloaded. Which tool is used to add the sideloaded app package to the image?

Deployment Image Servicing and Management (DISM)

You need an app for employees to manage their time off requests with human resources. You find an app that fits your needs perfectly from a website called freeapps4u.ru. You know you could download the app and sideload it into Windows 10 devices. What sho

Verify that the app is from a trusted source

Which of the following are networking models that can be used with the Windows Operating System? (Select two.)

Client-Server
Workgroup

You are consulting a small startup company that needs to know which kind of Windows computer network model they should implement.
The company will start small, with only twelve employees, but they plan to double or triple in size within 12 months. The com

Client-server

You are configuring a small workgroup. You open System Properties on each computer that will be in the workgroup.
Click the System Properties options you can use to configure each computer's workgroup association (Select two.)

Network ID
Change

You are a contract support specialist managing the computers in a small office. You see that all the computers are only using local user accounts.
Which of the following models could this office be using? (Select two.)

Standalone
Workgroup

You manage a group of twenty Windows workstations that are currently configured as a workgroup. You have been thinking about switching to an Active Directory configuration.
Which advantages would there be to switching to Active Directory? (Select two)

Centralized configuration control
Centralized authentication

Your user account is User1. You want to sign into the corpwest domain from a computer that you haven't used before.
You are at the sign-in screen. Just below the username and passworkd fields, you see that this computer will try to sign in to the corpsout

corpwest\User1

You have several personal mobile devices that you use on a daily basis. You want to be able to authenticate each device with the same user account so you can share your personal data and apps regardless of which mobile device you use.
Which type of user a

Online user account

You do not want any on-premises servers, and you want users to be able to sign in and access both internal and external resources. Which option would you select for user accounts?

Azure AD accounts

Which of the following statements are true regarding creating user accounts? (Select two.)

The Computer Management method allows you to restrict the user from changing their password
The Windows Settings app requires you to create three security questions

Which of the following are limitations of a standard user account? (Select three.)

Can change some settings that apply only to themselves
Cannot run applications in an elevated state
Can use applications, but cannot install them

What is the name of the service included wti the Windows Server operating system that manages a centralized database containing user account and security information?

Active Directory

Logical organization of resources

Organizational Unit

Collection of network resources

Domain

Collection of related domain trees

Forest

Network resource in the directory

Object

Group of related domains

Tree

You have several computer running Windows 10. The computers are members of a domain
For all computers, you want to remove access to administrative tools from the Start menu and hide notifications from the System Tray
What should you do?

Use Group Policy

You are managing a workstation that is not part of a Windows domain. Users on this computer should not be permitted to download applications from the Windows Store.
Which administration tool can you use to enable a policy that turns off the Store applicat

Local Group Policy Editor

You manage a large number of workstations that belong to a Windows domain. You want to prevent anyone that might try to gain access to a computer from guessing login information by trying multiple passwords.
Which GPO contains a policy you can enable to g

Default Domain Policy

A user has complained about not being able to remove a program that is no longer needed on a computer. The Programs and Features page is not available in Control Panel
You suspect that a policy is enabled that hides this page from the user. But after open

GPO's linked to organizational units that contain this user's object

Causes the policy to be enforced

Enabled

Does not change the current setting for the policy

Not configured

Prevents the policy from being enforced

Disabled

The Hide Programs and Features page setting is configured for a specific user as follows:
Local Group Policy : Enabled
Default Domain Policy GPO: Not Configured
GPO linked to the user's organizational unit: Disabled
After logging in, the user is able to s

The GPO linked to the user's organizational unit is applied last, so that this setting takes precedence

Software that should be installed on a specific computer

Computer Configuration Policies

Internet user settings

User configuration policies

Scripts that run at logon or logoff

User Configuration policies

Network communication security settings

Computer Configuration policies

Password restrictions that must be met for all user accounts

Computer configuration policies

Software that should be installed for a specific user

User Configuration Policies

Scripts that should run at startup or shutdown

Computer configuration policies

Registry-based settings that can be configured within a GPO to control the computer and the overall user experience

Administrative templates

You have a Windows 10 computer that is shared by multiple users
You want to allow non-administrative users to install devices that use third-party drivers. Users should be able to install the device without prompts for administrative credentials. Users sh

Obtain drivers that have a digital signature

You need to find out if there are any device drivers on your system that do not have a digital signature.
Which of the following tools do you use?

sigverif.exe

You create the D:\drivers folder on the computer for third party drivers and copy drivers for special devices to that folder. You want non-administrative users to be able to install devices on the computer without needing administrative privileges and wit

Add the driver folder to the DevicePath registry key

You are only a standard user on a Windows computer that you use at work (you are not an administrator of that computer).
You connect your MP3 player to the computer. The computer is not able to play files from the device. You need to get information about

In Control Panel, click Devices and Printers

You would like to update the video driver that is used on your computer.
Click the hardware category type you would expand to make this change

Display Adapters

You need to install an updated driver for a hardware device on your windows system. You need to use a driver file that has been tested by Microsoft and is from a legitimate source.
What should you do?

Install an updated driver with a digital signature

You need to see a list of third-party drivers on a Windows system.
What should you do?

Run pnputil -e in Command Prompt

You recently installed a device that you only need temporarily. After you finish using the device, you remove it from the computer. Now want to uninstall the device's driver.
What should you do? (Select two.)

In Command Prompt, run rnputil -d followed by the driver package
In Device Manager, right-click the device and click Uninstall

You have a Windows 10 system with several standard users. You want all standard users to be able to install devices and necessary drivers.
Which of the following actions gives this permission? (Select two. Each answer is a complete solution.)

Enable Allow non-administrators to install drivers for these device setup classes in Group Policy
Run the pnputil -i -a command to add the drivers to the Driver Store

Which command would you enter into the Command Prompt to list all third-party drivers on a Windows system?

pnputil -e

You are trying to listen to audio CDs on a Windows system, but no audio is coming from the speakers. After checking the speaker cables, volume level, and the mute feature, you chekc Device Manager and see the dialog shown in the image below.
What should y

Enable the SoundMAX Integrated Digital HD Audio Driver device

After you upgrade a video driver on a Windows system, the screen becomes unresponsive. You need to get the system working properly with the least amount of effort and time.
Which of the following options can you use to get your Windows system back to a st

Reboot the computer with the Windows Installation disk and select Repair Your Computer to launch the System Restore utility
Reboot the computer into Safe Mode and use Device Manager to roll back the driver

The audio card in your Windows system is working, but you learn about an updated driver that adds new features. You download and install the new driver.
After you restart and sign into Windows, you can no longer play audio files. Using minimal administrat

In Device Manager, roll back the driver

You use a Windows computer that is shared by multiple users.
The default printer on your computer is a Sharp AL-2040. When you send a print job to the default printer, nothing happens. The other users can send jobs to the same printer without any issues.

In Devices and Printers, right-click the Sharp AL 2040 icon and click Troubleshoot

You install a new internal sound card in your Windows system. After you reboot and install the driver, the device does not appear to be working. You need to view information for the device and perform troubleshooting steps.
What should you do first?

Open Device Manager and check the status of the sound card

While working in Device Manager, you notice the display shown below.
What does the icon next to USB Mass Storage Device indicate
(Yellow Exclamation Mark)

The driver for the device in unavailable

After completing a clean installation of Windows 10, you realize your computer is unable to connect to the network. You device to open Device Mnaager to see if you can identify the problem.
Based on this screenshot of Device Manager, which action should y

Right-click the RealTek RTL8139C Fast Ethernet Controller and click Update Driver Software

Two devices connected to your computer are not working properly. You suspect the devices are using the same system resources, and this is creating conflict.
How can you verify whether or not the devices are conflicting with each other? (Select two. Each a

Run system information (msinfo32)
In Device Manager, open the device's Properties window and click the Resources tab

You are working on a computer running Windows 10. It is part of a domain.
You recently installed Windows 10 Pro. After installation, you are not able to connect to resources on the network. You check Device Manager and see the dialog shown below.
What sho

Right-click the Broadcom NetXtreme Gigabit Controller and select Update Driver

You updated a driver from the manufacturer's website, and now it is making your system unstable. You have decided to restore your system to a restore point. Which two options allow you to access the restore points on your system?

Use your installation media and run a repair
Go to System Properties and then System Protection

You've just connected a new LCD monitor to your Windows system.
Your LCD monitor has a native resolution of 1440x900 at 64 Hz. The vide oadapter in your system is plugged in to a PCI Express slot and has 1 GB of video memory. It supports screen refresh ra

1440x900

You've just connected your Windows system to a large CRT monitor
The monitor supports screen refresh rates up to 75 Hz and a resolution of 1250x1024. The video adapter in your system is plugged into a PCI express slot and has 1 GB of video memory. It supp

1280x1024
75 Hz

Click on the screen saver option that can be used to increase security by requiring the user to enter a password to access the desktop after the screen saver has been activated

On resume, display login screen

You manage a computer running Windows 10. You recently upgraded the computer from Windows 7.
The employee who uses the computer has called to complain that the Windows 10 interface is very slow. For example, after you click on the Start tile, the Start me

Set the visual effects for best performance

In Windows 10, there are two options to get to Display settings. What are they?

Right-click the Windows icon and then select System>Display
On the desktop, right-click, and then select Display settings.

Which of the following are found in the Ease of Use options?

Cursor and Pointer
High contrast

You have opened the Settings app and selected System>Display. Which of the following options can you adjust?

Brightness and Color
Display orientation

If you see a screen display that is blurry and out of focus, what might be the problem?

The screen resolution is set incorrectly

You want to change the desktop background, window color, sounds and mouse cursor all at once. Which option do you use?

Personalization

From Control Panel, you have accessed the following settings:
Hardware and Sound>Power Options> Choose when to turn off the display
What setting can you configure from this dialogue?

Put the computer to sleep

Your job requires a considerable amount of travel. WHile working in your office, you use a Windows desktop system. While on the road, you use a Windows tablet device. While traveling, you frequently need to access files stored on the desktop system from y

OneDrive

When you initially installed your Windows system, you created a Microsoft online account and received the default allocation of OneDrive storage space.
You found that you are storing enough files in the OneDrive folder that you are nearly out of space. Yo

Account

With the free version of OneDrive, your files stay in the Recycle bin anywhere from 3 to 30 days as long as you don't exceed which percentage of your storage?

10%

How can you add storage space to your OneDrive account?

You can purchase more storage for a monthly fee

A OneDrive account is automatically created when you set up an online Microsoft user account. How much storage are you given to use for free?

5 GB

You want to access your OneDrive account using a web browser. Which URL would you use?

onedrive.live.com

You are using a Premium account for OneDrive. How long will your files stay in the Recycle Bin?

93 days

This signifies that a sync is in progress. This includes uploading files or when OneDrive is syncing new files from the cloud to your device.

Cloud icon with arrows forming a circle

Syncing has been paused. Your files are not currently syncing

The OneDrive icon with a gray circle containing two vertical lines

OneDrive is running without problems, and the sync is up to date

Solid white cloud

Your account needs attention. Select the icon to see the warning message displayed in the Activity Center

The OneDrive icon with a yellow triangle containing an explanation mark

Your account is blocked

The OneDrive icon with a red no entry icon

A file or folder cannot be synced

The OneDrive icon with a solid red circle containing an x

You're not signed in or OneDrive setup hasn't completed

Solid gray cloud

The file has been downloaded to your computer

A white circle with a green border and green checkmark

The file or folder has settings that prevent it from syncing

Padlock

Files that you mark as "always keep on this device

A solid green circle with a white checkmark

A file or folder cannot be synced

A solid red circle with an x

The file or folder has been shared with other people

White cloud with blue borders and a people icon

You are using an Android tablet system. You need to get access to some of the files in your OneDrive account. Which option would you use?

The OneDrive website

Your windows workstation has a binary IP address of 00001010.00000000.00000000.01000001 assigned to it.
What class of IP address does this address fall within?

Class A

Which of the following describes the role of a DHCP server?

Automates the process of assigning IP addresses, subnet masks, and default gateway addresses to network hosts
Delivers DNS server addresses and other configuration information to hosts

You are using a web browser on your Windows notebook to access the http://www.websim.com webiste. Your notebook has been configured to use a DNS server that has an IP address of 137.65.1.254 for name resolution.
Your notebook sends a name resolution reque

The DNS server sends a request to a DNS root server for the IP address of a DNS server that is authoritative for the westsim.com domain

You need to determine the binary equivalent of the address 192.168.1.1

11000000.10101000.00000001.00000001

Your Windows workstation has an IP address of 192.168.1.25 assigned to it with a subnet mask of 255.255.255.0. It also has a DNS server address of 137.65.1.10 and it has a default gateway router address of 192.168.1.254
Your workstation needs to send a fi

To the default gateway router

Consider the following IP address that uses CIDR notation: 172.17.85/22
Which subnet mask corresponds to the CIDR notation used in this address?

255.255.252.0

You have decided to use a subnet mask of 255.255.192.0 with your 172.17.0.0 network to create four separate subnets.
The network ID for one of the subnets is 172.17.0.0. You are installing the first host (a server) on this subnet, and you want to assign t

Assign the system an IP address of 172.17.0.1

You have decided to use a subnet mask of 255.255.192.0 with your 172.17.0.0 network to create four separate subnets.
The network ID for one of the subnets is 172.17.128.0. You are installing a DNS/DHCP server on this subnet and want to assign the highest

Assign the system an UP address of 172.17.191.254

Your Windows workstation has an IP address of 192.168.1.35 with a subnet mask of 255.255.255.0. It also has a DNS server address of 192.168.1.1 and a default gateway router address of 192.168.1.254. Your workstation is a member of the westsim.com domain.

Directly to the web server

Which of the following are valid IPv6 addresses?

bab3:b834:45a3:0000:0000:762e:0270:5554
35BC:FA77:4898:DAFC:200C:FBBC:A007:8973

Your company has started the transition back to IPv6. You need to configure the records on the DNS server so that clients can submit a hostname query and receive back an IPv6 address for the specified host.
What should you do?

Create AAAA records

You manage a small office network with a single subnet. The network is connected to the internet
All client computers run Windows. A single server runs Windows Server 2016. The client computers are not joined to a domain. All hosts use IPv6 addresses on t

Make sure that LLMNR is enabled on all computers

Your company has started to transition to IPv6. You need to configure records on the DNS server so that clients can submit an IPv6 address and receive the hostname for that computer.
What should you do?

Create PTR records

Addresses that are valid on only the current subnet are known as

Link-local

Which of the following can be used to verify that the TCP/IP protocol stack has been properly installed on the host?

Loopback

You manage a Windows network environment. As part of your IPv6 migration strategy, you have implemented ISATAP on your network. You would like to test the communication of a client computer using ISATAP.
What should you do?

Ping the address beginning with :FE80:

You manage a Windows work environment. As part of your IPv6 migration strategy, you have implemented Teredo on your network. You would like to test the communication of a client computer using Teredo.
What should you do

Ping the address beginning with 2001:

Your company has asked you to look at strategies for migrating from IPv4 to IPv6. Instead of using only IPv6, you decided you want to allow hosts to use both IPv4 and IPv6 addresses.
Which of the following technologies should you implement to allow hosts

Dual stack

You have an IPv4 network that has two IPv6-only hosts that need to be able to communicate with eachother. You want to implement a solution that only requires you to configure the two IPv6 hosts. You also want it to work through NAT
Which tunneling method

Teredo Tunneling

You have just received a new laptop that you will use on your company network and at home.
The company network uses dynamic addressing, and your home network uses static addressing. When you connect the laptop to the company network, everything works fine

Configure an alternate TCP/IP configuration

An employee in your organization has started to work from home two days a week. The employee uses the same company laptop at the office and at home. The latop automatically connects to the wireless network in the office, but does not automatically connect

Configure an alternate TCP/IP configuration on the laptop's wireless adapter to use static IP address that is compatible with the home network.

You manage a small network with Windows clients, multiple subnets, and servers. You want your computer to be able to resoleve a hostname for a server on your network to its IPv4 address.
Which should you do? (Select two.)

Edit the hosts file on the computer
Add an A record on the DNS server

Which block of addresses is defined for use with APIPA?

169.254.0.0/16

You recently set u a DHCP server, and you need to configure your computer to start using it.
Click the IPv4 Properties option that you would select to use the DHCP server to receive IP configuration information

Obtain an IP address automatically

Your company has started the migration to IPv6 on your network. Your network administrator tells you that the network is using stateless autoconfiguration. You need to reconfigure your computer to use the correct IPv6 address, default gateway address and

Select 'Obtain an IPv6 address automatically' and 'Use the following DNS server addresses'

Your company has started the migration to IPv6 on your network. Your network administrator tells you that the network is using stateless autoconfiguration. You need to configure your computer to use the correct IPv6 address, default gateway address, and D

Run netsh interface ipv6 add dnsserver

You have installed a test network with one server and two Windows workstations. All are running IPv6. You have disabled IPv4 and now want to test to make sure that IPv6 is used to communicate between hosts. You want to pink the link-local address of the h

ping FE80::AB13:7845:410C:9956%12

You use a Windows client system on your desktop. Your company has started the migration to IPv6 on the network. You need to configure your computer with a static IPv6 address.
WHich command should you use to configure a static IPv6 address?

netsh

Your network has just transitioned from using IPv4 to IPv6. IPv6 configuration is performed automatically using information received by network routers. The network dfoes not use a DHCPv6 server.
Your Windows system is unable to communicate with a server

Run netsh with the add dnsserver option

You manage a Windows system connected to a business network that uses switches and multiple subnets.
One day you find that the computer is unable to connect to the internet, but it can communicated with a few other computers on the local subnet. You enter

Verify that the DHCP server is up and functional

You manage a Windows system connected to a business network that uses switches and multiple subnets.
You connect a workstation to the 192.168.1.0/24 subnet. The workstation can communicate with some hosts on the private network, but it cannot communicate

Edit the IPv4 properties and changed the default gateway

You have a Windows laptop that uses DHCP for IPv4 addressing information. You need to see the IPv4 address, subnet mask, and DNS server addresses that the network connection is currently using.
Which of the following actions should you take? (Select two.

Run the ipconfig and ipconfig /all commands
Run the netsh command

You have a computer that runs Windows and is connected to a domain network with a DHCP server. One day you find that your computer cannot connect to any network resources. You run the ipconfig command and find that the network connection has been assigned

Run the ipconfig /release and ipconfig /renew commands

You have a computer running Windows that is connected to a domain network.
After reconfiguring the static address of an internal web server named WEB3, your computer can no longer connect to WEB3. But other users are still able to connect to the same web

Run the ipconfig /flushdns command

Your network has just transitioned from IPv4 to IPv6. IPv6 configuration is performed automatically using stateful DHCPv6. A DNS server on your network provides name resolution for IPv6.
Your Windows system is having problems communicating on the network.

Run the ipconfig /release6 and ipconfig /renew6 commands
Run the ipconfig /flushdns command

-a

displays all connections and listening ports

-n

Displays addresses and port numbers in numerical form

-e

Displays ethernet statistics

-o

Displays the owning process ID associated with the connection

-r

displays the routing table

-p

shows connections for a specific protocol

-s

displays the per-protocol statistics

tests connectivity between two devices and displays the path between them

tracert

displays all current tcp/ip network configuration values and refreshes the dhcp and dns settings

ipconfig

shows the network status and graphical representation of network connections

Network and Sharing Center

logs significant events on a computer such as when a process encounters and error

Event Viewer

resolves the IP address of a hostname

nslookup

verifies IP connectivity between two nodes in a network by sending ICMP packets and measuring response time in millisections

ping

attempts to diagnose connection problems and present possible solutions

Windows Network Diagnostics

displays TCP/IP information for both IPv4 and IPv6 addresses

netsh

Which of the following tools logs significant events on a computer, such as when a process encounters and error

Event Viewer

When troubleshooting network issues, use the following steps:
Try to identify the scope of the problem. For example, find out if the problem is isolated to a single workstation or if it is impacting the entire network.
Determine and verify that your netwo

It displays your computer, the domain and the internet

You use a Windows notebook system that is a member of the domain on your network at work.
You need to configure the wireless network card in the system to connect to the wireless network at work. The connection should require a username and password for a

WPA2-Enterprise

Which data transmission rate is defined by the IEEE 802.11b wireless standard?

11 Mbps

You are designing a wireless network for a client. Your client needs the network to support a data rate of at least 54 Mbps. In addition, the client already has a wireless telephone system installed that operates at 2.4 GHz.
Which 802.11 standards can be

802.11a and 802.11n

You want to implement 802.1x authentication on your wireless network. Which of the following will be required?

RADIUS

Which of the following offers the weakest form of encryption for an 802.11 wireless network

WEP

Which of the following wireless network methods make it easy for clients to find and connect to a wireless network

SSID broadcast

Which of the following wireless measures will make your wireless network invisible to the casual attacker?

Disable SSID broadcast

You want to connect a laptop computer running WIndows to a wireless network. The wireless network uses multiple access points and is configured to use WPA2-Personal security. SSID broadcast has been disabled.
Which type of authentication method and encryp

A pre-shared key and AES encryption

You want to connect your client computer to a WAP connection to your wired network at work. The network administrator tells you that the access point is configured to use WPA2-Personal with the strongest encryption method possible. SSID broadcast is turne

SSID
Pre-Shared key
AES

You need to add security for your wireless network. You would like to use the most secure method.
Which method should you implement?

WPA2

You have a notebook computer running Windows that you use both at home and in the office.
The laptop has both an Ethernet connection and a wireless network connection. At home, you have created a simple Ethernet network that connects your home computers t

Configure the wireless connection to use WPA2-Personal
On your laptop, configure a network bridge. Set u an ad hoc wireless conneection between his computer and yours

You have received a new laptop for use at work. It is running Windows. You've configured the wireless adapter to connect to the network at work. You also have a wireless network at home, and you have configured a second profile for your home network.
For

In the wireless network profile, select 'Connect even if the network is not broadcasting its name (SSID)'

You have a new Windows notebook system with both wired and wireless network adapters.
You want to configure a small wireless network at home. You install an access point/router device that connects your network to the internet. You have turned off SSID br

Manually create a network profile
Use WPA-2 Personal security

You've just connected a USB wireless network adapter to a Windows desktop system in your home office. You want to use the Windows Connect Now (WCN) push-button connect feature to connect your desktop to your wireless network.
Which technology must be impl

Wi-Fi Protected Setup (WPS)

Your organization's security policy dictates that users are not allowed to load Windows Connect Now (WCN) settings from a USB drive to connect to a wireless network.
Which Group Policy contains settings that can be enabled to block this functionality?

Configuration of wireless settings using Windows Connect Now

You have a small wireless network with 10 client computers configured in a Workgroup.
You need to secure the wireless network using the most security and least amount of effort. You also want to do this without replacing any of the existing wireless infra

Configure each client with the same key
Implement WPA-2 Personal

Your organization uses an 802.11b wireless network. Recently, other tenants installed the following equipment in your building:
A wireless television distribution system running at 2.4 GHz
A wireless phone system running at 5.8 GHz
A wireless phone system

The wireless TV system

Your notebook computer is configured to connect to the wireless network at work using a wireless profile named Company1. The profile is configured to connect using 802.11b.
During a recent upgrade, your company added an 802.11n wireless access point. The

Move the 802.11n profile up in the list of preferred networks

You have a notebook system running Windows. The laptop has built-in wired and wireless network cards.
Recently, the wireless card stopped working, so you connected an external USB wireless adapter to the system. After you install the wireless adapter, it

In Device Manager, right-click the wireless device and click Properties. Examine the device configuration

You are using your Windows 10 notebook computer at a coffee shop. You notice that your notebook has automatically connected to a wireless network that you do not trust.
In the Settings app under Network & Internet, which link should you access for the opt

Wi-Fi

Your windows system has an application installed on it that you no longer need.
What should you do?

Using the Setting app > Apps and Features, locate the application and click Uninstall

Several weeks ago, you installed a desktop application on your Windows system using the default parameters suggested by the application installer. After using the application for a time, you realize that you need an optional application feature that wasn'

Click MODIFY

Several weeks ago, you installed a desktop application on your Windows system. Yesterday, you installed another desktop application on your system that was developed in-house. After doing so, you notice that the first application behaves erratically and f

Click Repair

Installed desktop applications on a Windows system that are displayed in Programs and Features typically have associated entries in which registry key?

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall

You are about to install a new desktop application that you downloaded from a website.
What should you do before you start the installation? (Select two.)

Create a restore point
Scan the installer for malware

You have an app installed on your Windows system that has not been pinned to your Start menu.
How can you locate the app? (Select two. Each answer is a complete solution.)

Click the Start tile, and then scroll through the list of apps
Search for the app by typing its name in the search field on the taskbar

You frequently use an app from the Windows Store.
How can you configure the app so you can access it without having to open the Start menu? (Select two. Each answers is a complete solutions.)

From the start menu, click and drag the apps tile to the taskbar
From the start menu, right click the apps tile and select More > Pin to Taskbar

What are the most common types of files used to install Windows desktop applications?

.msi
.exe

On the C: drive, what is the difference between the Program Files folder and the Program Files x 86 folder

Program files keeps 64-bit files, while Program Files x86 keeps 32-bit files

When working from within the Settings app, some applications include an Advanced Options link. Selecting this link allows you to view more details about the application as well as giving you the ability to perform which of the following tasks? (Select two

Setting the default app
Uninstalling the app

How do you configure your Windwos system to prompt for additional credentials whenever a sensitive action is taken?

Edit User Account Control (UAC) settings

Prior to installing some software on your WIndows system, you turn off User Account Control (UAC), reboot the computer, and install the software. You turn UAC back on but it does not prompt you before performing sensitive actions.
How do you make UAC prot

Reboot the computer

You try to install internally developed accounting software on several new computers. You discover that the software will not run because User Account Control (UAC) causes it to fail. Because the accounting software will not be upgraded anytime soon, you

Alter the program settings to Run this program as an Administrator

Enter the name of the tool that generates an alert when a task or operation requires administrative privileges

User Account Control

Standard user accounts have the rights and privileges requires to perform which of the following tasks?

Modify advanced display settings
Troubleshoot network connectivity

You manage 20 Windows systems in a domain network.
You want to prevent the sales team members from making system changes. Whenever a change is initiated, you want to allow only those who can enter administrator credentials to be able to make the change. Y

Prompt for credentials

You have been asked to troubleshoot a Windows system that is a member of a workgroup.
The director who uses the machine said he is able to install anything he wants and change system settings on demand. He has asked you to figure out why User Account Cont

In Group Policy, enable the Run all administrators in Admin Approval Mode policy

You want to modify the default settings for User Account Control (UAC) on your Windows system to meet the following criteria:
Prompts should be shown when programs make changes to your computer and when you make changes to Windows settings.
The desktop sh

Disable the Switch To The Secure Desktop When Prompting for Elevation setting in Group Policy

In the User Account Control policy settings for Behavior of the elevation prompt for standard users, which options can be configured? (Select two.)

Prompt for credentials on the secure desktop
Automatically deny elevation requests

What is the benefit of using User Account Control?

Elevate privileges to complete specific tasts without loggin in as admin

You have been using a Windows Store app and need to exit out of it.
What should you do?

Click the close button in the app window

You need to configure content-based restrictions for apps available to child users in the Windows Store.
Which Accounts option do you use to set these restrictions?

Family and Other Users

Which steps must you take to uninstall an app you installed from the Windows Store?

Right-click the app and click Uninstall

Your organization's security policy prohibits end users from downloading and installing applications on their workstations.
To comply with these policies, you need to completely disable access to the Windows Store for the Windows systems you manage.
Click

Store

The applications below are only available through the Microsoft Store, and you must be signed into your Microsoft account to download them. Which type of applications are they?

Microsoft Store apps

Who can access a line-of-business app?

Only the employees of the business who wrote the app

What are some of the reasons that make Microsoft Store for Business so appealing? (Select two)

Legal
Financial

Which tool allows a business to create a private store and load it with just the apps needed for their business?
What is the tool called?

Microsoft Store for Business

Which of the following are prerequisites to set up a Microsoft Store for Business?

Each employee must have their own Azure AD account
All employees must be running Windows 10
The organization must have a Microsoft Azure Directory domain configured

Which of the following is one of the prerequisites for creating a Microsoft Store for Business?

The organization must have a Microsoft Azure Directory domain configured

You are using the Office 365 Admin center to deploy Microsoft Office 365 to your end users. You need to assign each user a license to use Microsoft Office.
Click on the options in the Office 365 Admin center that you should use to do this. (Select two)

Dashboard
Users

You are using Office 365 Admin center to deploy Microsoft Office 365 to your end users. You purchased the Office 365 Business plan, which includes the following versions of Office:
Office 2016
Office 2013
Office 2011
You want to limit users to just the Of

Service Settings

Which kind of cloud computing system is Microsoft 365 ProPlus

SaaS

What is the cloud computing system that provides services such as Access, Excel, and Outlook called?

Microsoft Office 365 ProPlus

You want to set up Office 365 for all employees in your company. You know that you must find out if your devices are compatible with Offcie 365 ProPlus before deploying it to your end users.
Which tool should you use to determine this?

Readiness Toolkit

A user is allowed to install Office from the cloud on up to how many devices

5

Administrators can control which Office 365 ProPlus users are allowed to download. Once an administrator is logged into their global admin account, what should they do next?

From the home page select Office software, and then select Software Download Settings

Microsoft Office 365 ProPlus lets you determine where user data is stored. For example, it could be stored on your workstation.
Which of the following are your other storage options? (Select two.)

On a network
On the cloud

Office 365 ProPlus can be deployed to your enterprise. When doing so, which tool enables you to choose the language, hardware architecture, and the version of Office you want to install?

Office Deployment Tool

Office Deployment is managed from the Office 365 Admin center. What can be done from the Dashboard on the Admin center? (Select two)

Perform administrative tasks like managing users
Configure Office 365 services through Service Settings

What is the name of the process of submitting and checking credentials to validate or prove user identity?

authentication

You want to increase security as users sign in to computers in the domain you administer.
How can you implement the strongest form of multi-factor authentication?

Require a password, a biometric scan, and a token device

Your Windows system has devices that are Personal Identity Verification (PIV) compliant.
What can you do to implement a form of authentication that takes advantage of PIV?

Use smart card authentication

Inputting a username and password falls under which of the following? (Select two)

Authentication
Identification

A user connect to their bank's website. When the user logs in, the bank accepts the user credentials, and the user's web browser verifies the site's security certificates
Which security process is being used?

Mutual authentication

Which of the following are examples of the something you do authentication method? (Select two)

Handwriting sample
Take a typing test

What is used to provide security groups access to system resources?

ACL (Access Control Lists)

What are the two types of groups Microsoft systems provide?

Security
Distribution

Which of the following is included in an access token?

Security group SIDs
User's SID

Your office computer (from which you perform your day-to-day tasks) is a Windows system. You are currently signing into this computer using the account named Mary. However, this computer is also a member of the company's domain.
Using the least amount of

From the Credential Manager, click Add a Windows Credential
From User Accounts, click Manage your Credentials

Which of the following terms is a collection of a user's personal settings and data files?

User profile

You manage a Windows system that is shared by several users.
The system is currently configured to require password changes every 42 days. But you are concerned that users are reusing their favorite passwords over and over, which violates your organizatio

Enforce password history
Minimum password age

During the initial installation of your Windows system, you elected to use a local user account for authentication because you had not set up an online Microsoft account.
You now realize that you want to synchronize your desktop theme, browser settings, p

Open the Settings app and click Accounts > Sign-in with a Microsoft Account instead
Access http://www.live.com and create a new Microsoft user account

As an IT admin, you have 6 employees that all need the same level of access to the same resources.
Using the least amount of effort which of the following can be used to accomplish this?

Group

You are creating a new standard user on a Windows 10 system.
By default, to which of the following groups will that user be automatically added?

Users

Your Windows system is used by several people. As such, you want to increase security by requiring each user to create passwords that are at least ten characters long. You also want to prevent a user from signing into the computer after three unsuccessful

Set the Minimum password length policy
Set the Account lockout threshold policy

You want to prevent users from reusing old passwords. You also want to force them to use a new password for at least five days before changing it again.
What should you do in the Local Security Policy administration tool to configure these account policie

Set the Enforce password history policy
Set the minimum password age policy

You are using Credential Manager to store usernames and passwords
Which of the following protected areas is used to store this information?

Vault

A domain users has had multiple failed login attempts, but the account is not being locked out. You have set up and configured the Group Policy.
Which of the following are possible reasons the account is not being locked out? (Select two.)

The Group Policy was not applied to the user group
The Account lockout threshold policy is set to 0

To increase security for your Windows notebook system while traveling, you decide to require a smart card in order to sign on. You also want users to be signed out automatically when the smart card is removed.
What should you do?

Edit settings in Local Security Policy

Your company management is deeply concerned about a potential data breach because of sensitive patient data and Health Insurance Portability and Accountability Act (HIPAA) compliance. Currently, the system is configured to require password changes every 9

Minimum password length
Password must meet complexity requirements

You need to reconfigure a Windows 10 system to give the user RJensen user rights to do the following:
Ability to connect to shared resources on the computer (such as shared folders and printers)
Access to the system's desktop using the Remote Desktop clie

Access this computer from the network
Allow log on through Remote Desktop Services

Which of the following are true concerning the Passwork must meet complexity requirements policy? (Select three)

Dictionary words are not allowed in passwords
Users must create a password that uses a minimum of three types of special characters
Passwords must be at least 6 characters long

Sales team members use standard user accounts to log on to a shared network computer. You want to allow users to change the system time and time zone.
How do you grant users this ability while limiting their ability to perform other administrative tasks?

Configure user rights for the Sales group in Local Security Policy

The first account created on a Windows system during installation is given what level privileges?

Administrator

You have opened the Local Group Policy Editor and under Computer Configuration, you have navigated to:
Computer Configuration>Windows Settings>Security Settings>Local Policies>User Rights Agreement
Which of the following policies needs to be configured to

Allow log on locally

Which of the following can be user to manage policies and user rights for machines joined to a domain?

Local Group Policy Editor
Group Policy Management

The process of authenticating to the computer by supplying a username and password

Signing in

The ability to perform an action on a computer

Right

Identifies a specific user

Account

Access to files, folders, and printers

Permissions

You have a computer running Windows 10 Enterprise. The computer is a member of a domain. A file server on the network named Server1 runs Windows Server 2012 R2. You log onto the computer using an account named Fred.
With the least amount of effort possibl

From Credential Manager, select Add a Windows credential

You have used the runas command with the /savecred option to start an application on your Windows system. For security reasons, you have changed you mind and don't want to keep the password in Windows Vault.
How can you delete the stored password?

From Credential Manager, remove the credential from the Vault.

Grants users access to local and domain resources

Kerberos tickets

Stores user authentication information

Local Security Authority

Tags running processes as belonging to a virtual machine

Virtual Secure Mode

Provides virtualization functionality on a Windows system

Hyper-V

You need to enable Credential Guard on a Windows 10 Enterprise system.
Which Windows features need to be enabled to accomplish this? (Select two.)

Isolated User Mode
Hyper-V Hypervisor

You attempt to execute a program in the C:\Program Files\AccWiz directory on your Windows system, but you receive a prompt to elevate your privileges.
How can you execute the program without receiving a prompt for elevated privileges while also preventing

Use the runas command to execute the program in the C:\Program Files\AccWiz directory

You need to run the zip.exe executable on your Windows system as the Admin (which is a member of the Administrators group) on your system.
To accomplish this, which option should you use with the runas command?

/user:Admin

You attempt to run a program but don't have full access to all features.
Which options let you run the program with needed permissions using the least amount of effort (select two.)

Enable secondary logon and run as a privileged user
Right-click the program shortcut and select Run as Administrator

Where are user's Kerberos tickets and other security-related information stored

Local Security Authority

Which of the following are minimum requirements to implement Credential Guard? (Select three)

Windows Secure Boot
CPU virutalization extentions
TMP chip on motherboard

You need to enable Secondary Logon on your system. Where do you go to do this?

Services

Which of the following authentication methods does Windows Hello support?

Fingerprint scanning
PIN
Facial recognition

Which of the following sign-in options must be set up before you can use Windows Hello to configure facial recognition or fingerprint authentication

PIN

You want to set up a Windows device with a 4-digit PIN for authentication.
Which should you do? (Select two.)

Open the Settings app and click Accounts>Sign-in Options
Click Create a PIN

You want to configure a password on a Windows computer.
Click the option you would use in the Settings app to do this

Sign-In Options

Which special feature does your webcam need to support facial recognition?

Infrared

Which versions of Windows must you have if you want to implement Group Policy Settings for PIN complexity?

Windows 10 Enterprise
Windows 10 Education

Which of the following Windows Hello options most likely requires a device to be purchased?

Security key

Which of the following are security risks associated with usernames and passwords?

They can be reused
They can be cracked

How many lines must be drawn for a picture password

3

A user has connected their phone to a computer using bluetooth. The computer automatically locks when a user walks away with the phone.
Which sign-in setting is being implemented?

Dynamic Lock

The D: drive in your computer has been formatted with the New Technology File System (NTFS).
The Sales group on your computer has been given Allow Modify permissions to the D:\Sales folder. The Mary user account is a member of the Sales group. You want to

Edit the properties for the file and assign Mary the Deny Full control permission

You have a Windows system that is shared by multiple users. Sally wants to access a file in the Reports folder. A group named Sales has been granted the Allow Full control permission to the Reports folder and all its subfolders and files.
You add Sally as

Remove Sally from any other groups that have been explicity denied access to the Reports folder

Your Windows system has two hard drives named C: and D:.
For the D:\Reports\Finances.xls file, you explicitly grant the Mary user account the Allow Modify NTFS permission. You need to move the file from the existing folder to the C:\Reports2 folder. You w

Use the robocoopy command to copy the file to the C:\Reports2 folder

For the D:\Reports\Finances.xls file on your Windows system, you explicitly grant the Mary user account the Allow Modify NTFS permission.
You need to move the file from the existing folder to the D:\Confidential folder. You want to keep the existing NTFS

move the file to the new folder

An employee was just fired. Before he returned his Windows notebook, he assigned the Deny Full control permission to the group named Everyone. This affected all the files and folders on the system. All users, including you, are now blocked from accessing

Take ownership of the files and change the permissions

You share a single Windows system with Judith and Dalton.
You are the owner of the D:\Reports folder. Judith needs to be able to see the files and subfolders in the D:\Reports folder. Dalton needs these abilities as well as the ability to delete folders.

Grant the Read and Execute permision to Judith and the Modify permission to Dalton

You manage a Windows system and need to control access to the D:\Reports folder as follows:
Members of the Accounting group should be able to open, view, edit, and add files. They should not be able to delete or rename them.
Mary needs to be able to open

Assign Allow to the Read and Execute, List folder contents, Read, and Write permissions for the Accounting group. For the Mary user account, assign Deny to Write permission

Can open files and run programs in the folder

Read and execute

Can open files, but not change anything

Read

Can see files and folders, but not open any

List folder contents

Can do anything with folder and subfolders including changing permissions and ownership

Full control

Can do anything with folder and subfolders excepts change permissions or ownership

Modify

Can create new files and folders and change existing files

Write

You have created a new folder and added the Authenticated Users group. Which basic persmissions will be applied by default?

Read and Execute
Read
List Folder Contents

Which special permission specifies whether a user can make changes to the end of the file but not change, delete, or overwrite existing data

create folders / append data

You manage a notebook system running Windows
Which task can you perform to log all packets that are dropped by the firewall on your computer

In the Local Security Policy, configure object access policied for the Windows Filtering Platform (WFP). View audit entries in the Security log in Event Viewer

You are configuring security settings that will identify when people attempt to log onto a Windows desktop system with an incorrect passworkd . You need the computer to record the failts attempts in its own Audit log.
Which Local Security Policy setting c

Enable the Audit account logon events setting

You manage several Windows systems that are members of a domain.
You are configuring security settings that will be distributed to all computers on your network. You want to identify denied attempts to change a user's group membership in a computer's loca

Audit account management

You work on a Windows desktop system that is shared by three other users. You notice that some of your documents have been modified. You decide to use auditing to track any changes to your documents.
In the Audit Policy in the Local Security Policy, you e

Edit the Advanced Security properties of the folder containing your documents

You previously configured the following audit settings on your Windows desktop system:
You enabled the Audit Object Access policy to log failed events.
You configured auditing on several files, folders, and registry settings for a specific group for faile

In the Local Security Policy, stop auditing for the Audit Object Access Policy. Enable the Audit Registry advanced Audit Policy

You would like to configure your Windows desktop system so that an event is recorded any time a user successfully or unsuccessfully logs on.
How can you configure settings so you do not also record logoff events?

Configure advanced Audit Policies in the Local Security Policy

What can happen if you leave auditing enabled for long periods of time?

Security log gets large

Where do you go to view audit logs

Event Viewer

Tracks changes to user objects

Account Management

Tracks when a user utilizaes an assigned privilege

Privilege Use

Records logon and log-off events on the local workstation only

Logon Events

Tracks actions taken by applications

Process Tracking

Tracks who accessed a file, folder, or printer

Object Access

Tracks system shutdowns, starts, restards, or events that affect security or security log

System Events

Tracks when user accounts authenticate to the system

Account Logon Events

Tracks user rights assignments, trust relationships, and audit policies

Policy Changes

Which of the following are commonly used advanced auditing categories (Select three)

Certification Services
Removable Storage
Account Lockout

A user has access to a file server from his laptop only when the laptop's GPS is showing its location to be in the office building or the user's home.
What Dynamic Access Control (DAC) implementation component is being used?

Device claims

A Windows server has a shared folder named HR. This folder contains a file named PerformanceReviews.docx. A user named DMiller has the following permission assignments to this file:
NTFS: Modify, Read & execute, Read, and Write
DAC: Read
What is DMiller's

Read

Users must use a USB security token that contains their user information and access levels to gain access to the file server.
What type of Dynamic Access Control implementation component is being used?

User Claims

Dynamic Access Control (DAC) can dynamically change the level of access a user has to file server data based on which of the following? (Select two.)

Device being used
Content in the data

Which Dynamic Access Control component is used to tag scanned files

Resource Properties

Where do you go on Windows Server to configure Dynamic Access Control?

Active Directory Administrative Center

What is it called when files and folders get their permissions from the parent folder?

Inheritance

You have configured a folder so that only users that have the Manager property listed in Active Directory can access it.
What component of Dynamic Access Control is being implemented?

Central Access Rules

Which Windows Server feature must be installed before Dynamic Access Control can be implemented?

File Server Resource Manager

When working with Dynamic Access Control, a piece of information about a user or device is known as what?

Claim Type

Rodney, a user in the research department, uses a Windows 10 notebook system with a single NTFS volume. Rodney shares the notebook system with his manager, Kate.
Rodney stores private company documents in the C:\Data folder on his notebook. Both Rodney an

Instruct Rodney to log on to his computer, edit the properties of C:\Data folder, and enable encryption. Add Kate's user account Full Control to the C:\Data Folder

Rodney, a user in the research department, uses a Windows 10 notebook system with a single NTFS volume.
Rodney recently left the company on short notice. Rodney's manager, Kate, wants access to all of Rodney's files. You make Kate's account an administrat

Log on to the laptop using an account with DRA privileges. Clear the Encrypt attribute on the file

You have a Windows 10 notebook system that is shared by three users. The computer is not a member of a domain.
Each user has been using the Encryption File System (EFS) to encrypt their personal files on the laptop. You would like to add your user account

Run cypher /r

You use a Windows 10 notebook system that is shared by three users. The computer is a member of a domain.
Each user has been using the Encryption File System (EFS) to encrypt their personal files on the system. You would like to add your user account as a

Have each user run cipher /u

You have been encrypting files on your Windows 10 notebook system using the Encryption File System (EFS) and a self-signed certificate. You now want to protect your encrypted files using a certificate on a smart card.
You install a smart card reader and o

Run rekeywiz

You have two Windows 10 systems named Comp1 and Comp2. Both computers are members of a HomeGroup; neither computer is a domain member.
On Comp1, you share the C:\Files folder with the HomeGroup. The C:\Files\data.doc file is encrypted. From Comp2, you can

Copy your private key from Comp1 to Comp2

You have two Windows systems named Comp1 and Comp2. Both computers are members of a domain.
You have a domain user account named EFS-Recovery. You use this user account to recover some files on Comp1. You need to recover some files on Comp2, but are unsuc

Export the recovery agent keys from Comp1 and improt them to Comp 2

After copying EFS-encrypted files from Comp1 to Comp2, no one can open the files and access the data on Comp2.
What can you do to give users access to files on Comp2?

Use Cipher.exe to transfer the encyption certificates

Where should the network administrator go to manage certificates for all users on the system?

Certificate Manager Console

Which security issues should you keep in mind when working with Encryption File System (EFS)?

Each EFS certificate is tied to an individual user account
Having your files decrypted without your knowledge or permission

You connect your Windows laptop to the network at work to allow an associate to copy files from your computer. Other computers on the network are not able to discover your computer. You open the Network and Sharing Center and see the information shown in

Change the network type to Private

You have a folder on your Windows desktop system that you would like to share with members of your development team. Users need to be able to view and edit any file in the shared folder.
You share the folder and give the Everyone Full Control permission t

Modify the NTFS permissions on the folder

You have a small network set up at home. Each member of the family has their own computer. You would like to share files on your computer, such as pictures, videos, and music, with other members of your family.
Your mother should be able to modify any of

Enable file and printer sharing in the Network and Sharing Center. Share specific folders and configure the necessary permissions

You share the D:\Reports folder on your Windows system using a share name of Reports. You need to configure permissions on the shared folder as follows:
Members of the Accounting group should be able to view files, but not modify them.
Phil, a member of t

Add the Accounting group and assign the Read permission. Add the Phil user account and assign the Read/Write permission

You share the D:\Apps folder on your Windows system using a share name of Apps. You need to configure permissions to the share as follows:
Members of the Appusers group should be able to open and view files in the shared folder.
User JohnS should not have

Assign the Allow Read permission to Appusers, and assign Deny Read permission to JohnS

Your Windows system has a folder named D:\SalesDept. The D: drive is formatted with FAT32. You need to allow network access to the folder as follows:
Members of the Sales group should have read-only access to the content in the folder.
Members of the Sale

Grant the Read permission to the Sales group and the Change permission to the SalesAdmin group. Remove the Everyone group from the access control list.

Your Windows system has a folder named D:\SalesDocs. The folder has been shared with the share name of SalesDocs. The D: drive is formatted with NTFS.
The following permissions have been configured for the folder:
NTFS permissions
Share permissions
Users

Set Sally's NTFS permission for StyleGuide.doc to Deny Write

Your Windows system has a shared folder named Reorg. The folder contains sensitive information about planned changes in the personnel structure.
You configure permissions on the folder to deny access to unauthorized users. You want to prevent users from s

Stop sharing the folder. Share the folder again as Reorg$ with the same permissions as before

You have a Windows system that you use at home on a small network shared by members of your family.
You want to share the contents of a folder with other users over your network. Most users should have read-only access, but you want to explicitly deny acc

Right-click the folder and click Properties. On the Sharing tab, configure Advanced Sharing

On your Windows computer, you share the D:\Promo folder using a share name of Promo.
The share has been assigned the following permissions:
User/Group
Permission
Telesales group
Allow Read
Training group
Deny Full Control
Managers group
Allow Change
Mary

Remove the Mary user account from the Training group
Change the Training group permission to allow Read

What setting allows the computer hosting the share to be located by a remote system?

Network discovery

You need to make sure the Users group only has the List folder contents and Read permissions on the TestOut folder. Click on the tab that allows you to verify the permissions the Users group has to this folder.

Security tab

You are preparing to share a project folder with your team. You are all on the same network domain.
Which sharing options must you select to make sure the team can see the project folder? (Select two. Both are required for a complete solution.)

Turn on network discovery
Turn on file and printer sharing

While working from home, you prepared to share a project folder with your team at work. When you arrived at the office, you told your team about the folder, but they couldn't find it on the network. You're sure you remember correctly configuring your shar

Domain

You have a folder on your Windows desktop system that you would like to share with members of your product management team. Your team needs to be able to view and edit any file in the shared folder. To accomplish this, you configure advanced sharing and g

Grant Everyone the Full Control share permission, but configure the NTFS permission to be more restrictive

You have a folder on your Windows desktop system that you would like to share with members of your development team. Your team needs to be able to view and edit any file in the shared folder.
You share the folder and give each member of your team the Full

Turn on Network discovering in the Domain network profile on your computer
Turn on File and Printer sharing in the Domain network profile on your computer
Turn on Network discovery in the Domain network profile on your team member's computers

You have a folder on your Windows system that you would like members of your development team to access. You want to restrict network and local access to only specific users. All other users must not be able to view or modify the files in the folder.
What

Place the files on an NTFS partition
Configure both share and NTFS permissions

What does File and printer sharing setting do

It allows other computers to access the shares created on the host computer

What are the profile choices when sharing folders? (Select three.)

Private
Domain
Guest or Public

NTFS permissions include which of the following? (Select three.)

Full control
Special Permissions
Read and Execute

Once you have opened Printer Management, you can right-click on a printer. From there, which of the following tasks can you perform? (Select two.)

Open Printer Queue
Set Printing Defaults

Which PowerShell cmdlet would you use to find how a specified printer has been set up on a computer?

Get-PrintConfiguration

Your company has several office locations that you travel to frequently. You want to configure your Windows 10 laptop to easily switch the default printer as you move from one location to another.
Which printer configuration setting will allow your laptop

Enable the 'Let Windows Manage My Default Printer' option

You manage a Windows system with a printer that is used by the Sales department. The sales manager has asked you to restrict access to the printer as follows:
Sally needs to connect to a printer, print documents, and have the ability to pause and resume h

Assign Damien the Manage Documents permission
Assign Sally the Print permission

You manage a Windows system with an attached printer. You share the printer using a share name of Printer1.
You assign the Print permission for the printer to the Sales group. Then you discover that users who are not members of this group can print to the

Remove the Everyone group from the printers access control list

You manage a Windows system with an attached printer. You share the printer using a share name of Printer1. You have completed the following steps:
From the Settings app, select Devices.
Selected Printers & scanners.
Selected Printer1.
Clicked Manage.
Sel

Security

You manage a Windows system with an attached printer. You share the printer using a share name of Printer1.
You want to allow the user named Chad to pause, restart, and delete print jobs on the printer. Chad should not be allowed to delete the printer or

Assign Chat the Manage Documents permission to the printer

Your Windows system hosts the shared printer displayed in the example image. This printer is heavily used by workgroup users in your department.
Click the tab you would use in the Printer Properties dialog to enable client-side rendering and reduce the lo

Sharing

A color printing sub-system that provides support for inkjet printers that use more than the standard four color ink cartridges

Windows Color System

When enabled in Windows 10, this will be automatically set to the last printer a print job was sent to

Default Printer

Defines the content and appearance of ducuments and creates every time a print job is sent from applications running on Windows

XML Paper Specification

Forces print jobs to be spooled on the client machine in order to reduce print processing times

Client-Side Rendering

The Windows 10 Pro and Enterprise editions let you manage your printers using the Printer Management app.
Which of the following are tasks that can be managed from the Print Management console? (Select three.)

View and manage printer queues
Deploy printers using Group Policy
View all printers and print servers

As a system administrator, you manage hundreds of Windows 10 devices using Configuration Manager. Now you would like to co-manage these devices with cloud-based Azure tools.
What should you do to achieve co-management?

Set up hybrid Azure Active Directory and then enroll the Windows 10 devices into InTune

You need to set up and pre-configure new Windows 10 devices to get them ready for use and distribution to users. Which Microsoft cloud-based tool would you use to accomplish this?

Microsoft Autopilot

You have Windows 10 devices in Azure AD, and they are enrolled in Intune. What must you do in order to also co-manage the devices using Configuration Manager?

Install the Configuration Manager client on each device

Which cloud-based Microsoft tool would you use to reset, repurpose, and recover devices?

Windows Autopilot

Install the Intune client

Only using Config Manager

Balance and migrate workloads

Using Config Manager with Intune

Use Intune for management

Not using Config Manager

Which Microsoft tool would you download to help you migrate your group policies to MDM policies?

MMAT (MDM Migration Analysis Tool)

Which of the following statements best describes Configuration Manager? (Select two.)

Configuration Manager is also known as System Center Configuration Manager (SCCM)
Configuration Manager has been around for many years and is a powerful, on-premises, traditional management tool

Why are so many organization implementing co-management today?

Windows 10 devices are cloud-managed while previous versions are managed using Configuration Manager

Which cloud-based Microsoft modern managent tool would you use to remotely restart a mobile device?

Intune

How is conditional access a benefit of implementing co-management?

Conditional access allows you to control which devices and apps can connect to your organization

Windows Intune Deployment Tasks:

1: Sign up for an Intune account
2: Create Intune user accounts
3: Define Intune policies
4: Enroll mobile devices

You would like to utilize a device enrollment manager (DEM) Azure AD account to enroll your devices into Intune. What is the maximum number of devices a DEM account can enroll?

1000

You are setting up a cloud-based Intune deployment. You have created accounts for your users, and you have defined the policies you need to manage your organization's mobile device. You are ready to enroll mobile devices.
Which task must you perform befor

Set Intune as your mobile device management authority

As an administrator, you would like your users to initiate the enrollment of their Windows 10 devices into Intune.
Which of the following can users choose to accomplish this task? (Select four.)

Use Windows Autopilot
Add a work or school account
Enroll in MDM only
Perform an Azure AD join during OOBE (Out of Box Experience)

You are an administrator with 200 Windows 10 devices that are both personal and corporate-owned. You have implemented mobile device management (MDM) as well as mobile application management (MAM) via Intune. While configuring auto-enrollment, you configur

For personal devices, MAM user scope takes prescedence over the MDM user scope. The device is not enrolled in Intune
For corporate-owned devices, MDM user scope always take prescedence over MAM user scope. The device is enrolled into Intune

Platform

iOS, Windows, or Android

Management Requirements

Resets, affinity, and locking

Ownership

Personal or Corporate

Android

Download the Company Portal app from the Play Store on each device

Windows 10

Use direct enrollment if available

Windows 8.1

Install the Intune Company Portal app on each device

iOS and MacOS

iOS devices with iOS 7 or later and Mac computer with OS X Mavericks 10.9 or later

You are an administrator with 550 devices to enroll into Intune. You choose to bulk enroll them.
Which other software will you need to build the package necessary to bulk enroll the devices via USB or network location

Windows Configuration Designer (WCD)

You would like to utilize a Device Enrollment Manager (DEM) Azure AD account to enroll your devices into Intune.
What is the maximum number of devices a DEM can enroll?

1000

Which Android enrollment options would you choose in order to keep work data and personal data separate on your Android Devices

Android Enterprise work profile

A user calls and complains that she cannot access important company files from her personal device. You confirm that Intune policies are properly set up and assigned to her.
What could be the issue that is blocking her from accessing the files?

The users device is rooted or jailbroken

A user contacts you to let your know their Intune-enrolled device has been remotely locked. What could have caused this?

The users device is non-compliant and was remotely locked

You have created several Intune MDM policies. You would like to assign them to manage your mobile devices and users. You can assign the MDM policies to either user groups or device groups.
If you select user groups, what will happen?

The MDM policies will apply to every device the user uses.

How are Enterprise State Roaming (ESR) profiles different from other traditional user profiles? (Select two.)

ESR syncs user and app settings on their Windows 10 devices to the cloud
ESR keeps corporate and personal data separate. In this manner, corporate data is always protected

Roaming Profile

Stored out on the network; user can change settings

Compulsory aka Super-Mandatory

Locked-down profile. User is requires to use it and cannot make changes. If the profile is unavailable, user will not be able to log on

Temporary Profile

The profile the user will get if their local, roaming, or mandatory profile is unavailable

Local Profile

Stored on just one device; user can change settings

Mandatory profile

Can be stored locally or on the network; user cannot make setting changes

As an administrator, you are configuring a compliance policy in Intune. Place the following in the correct order to properly configure this policy.

Give the policy a unique name
Identify an OS platform: iOS, Android, or Windows
Configure one or more settings to enforce
Assign the policy to one or more user groups or device groups

You've enabled Enterprise State Roaming (ESR) in Azure AD. However, some of your Windows 10 users are calling support because some of their app and user settings are not syncing properly between their Windows 10 devices. You check all your ESR settings, a

The device has not been restarted since enabling ESR
ESR requires Windows 10 version 1511 or better

Mobile device management (MDM) policies using Intune are powerful and have been created to accomplish two main objectives. (Select two.)

Empower users to be productive wherever and whenever they want
Protect the organization's valuable data and assets

As an added security measure, you'd like to implement network fencing using Intune for your mobile device management (MDM).
Select option that best describes network fencing.

Admins can keep devices outside their corporate network from accessing enterprise resources

You are creating a new device profile. You want it to apply to all users except the domain administrators. How would you accomplish this?

Assign the profile to the AllUsers group and exclude the DomainAdmins group

You have been put in charge of providing a VPN solution for employees who work remotely. WHen these employees change locations, they lose their VPN connection. You want them to automatically reconnect if the VPN connection is lost or disconnected.
Which V

IKEv2

You need to implement a solution for the sales reps who complain that they are unable to establish VPN connections when they travel because the hotel or airport firewalls block the necessary VPN ports.
Which VPN security porocol can you use to resolve thi

SSTP

You need to configure your Windows 10 laptop to use a VPN connection to the company VPN server.
Click the link you would use to configure the VPN connection.

Set up a connection or network

The sales reps in your organization use a VPN connection on their Windows notebook systems to access the corporate network while traveling.
You are concerned that a sales rep has configured his VPN connection to automatically remember his credentials for

Options

You are a new system administrator, and your company has just mandated that users need to work from home and connect to files and folders on the network.
Which option will allow users to connect to the corporate network remotely and securely?

Set up a VPN on the server side and install the client on each remote user's laptop

You use a VPN connection on your Windows desktop system to access resources on a corporate intranet. In addition to accessing the intranet resources, you need to access the internet while the VPN connection is active.
How can you prevent internet traffic

Configure the Advanced TCP/IP settings of the VPN connection

Your remote users run a Universal Windows Platform (UWP) application that requires access to certain files on a network share each time it runs. What would you implement in order for your remote users to make sure that network resources are always availab

Application Trigger

You have a user remotely connecting to the corporate network from a client location. They can connect to the corporate network file server. But they cannot access files and folders they need on the client LAN in order to work on their project.
What would

Enable split tunneling

You have all Windows 10 devices in your cloud-based Intune environment. You want to set up Always On VPN on each device to utilize the built-in VPN client in Windows 10.
What is the fastest way for you to configure all your devices?

Create an Always On VPN configuration profile in Intune and assign it to the AllUsers group

Set up the app trigger

Add-VpnConnectionTriggerApplication -Name %Name of VPN% -ApplicationID %Path to Application%

Enable split tunneling

Set-VpnConnection -Name %Name of VPN% -SplitTunneling $True

Set the idle disconnect time

Set-VpnConnection -Name $vpn -IdleDisconnectSeconds 5

Remove auto trigger

Remove-VpnConnectionTriggerApplication -Name $vpn -ApplicationID $app

Confirm auto-trigger settings

Get-VpnConnectionTrigger -Name $vpn

You want to protect all the files on the hard drive of your Windows notebook system to prevent unauthorized access. You want to prevent access to any encrypted file on the hard drive, even if the hard drive is moved to another computer.
Which feature shou

BitLocker

You are getting ready to install Windows 10 on a new laptop. You would like to configure the laptop to use BitLocker.
How can you configure the laptop to start without requiring a PIN or a USB device? (Select two. Each answer is part of the complete solut

Enable the TPM
Create two partitions on the disk. Put boot files on the first partition and operating system files and data on the second partition

You have previously installed Windows 10 on two new computers and configured both computers with BitLocker. Both computers have a TPM installed.
Because of a hardware failure, one of the computers will not boot. You replace the failed hardware, but now Bi

Recovery Key

You want to use BitLocker on a laptop that belongs to a domain. Your implementation should meet the following requirements:
The laptop should start up without requiring a PIN or a USB device.
To meet security requirements, USB support must be disabled on

Implement BitLocker with a TPM
Configure Group Policy to store recovery keys in Active Directory

You have just installed Windows 10 a new notebook. The notebook does not have a Trusted Platform Module (TPM) chip.
You want to configure the computer to use BitLocker to protect the volume used for the operating system and all user data.
What should you

Configure BitLocker to use a startup key from the USB drive
Configure BitLocker to require a PIN for startup

You need to use command line tools to prepare the default drive on a Windows system for use by BitLocker. The new system partition should be 500 MB in size and should not be assigned a drive letter.
Which command should you use?

bdehdcfg -target default -size 500

Which of the following BitLocker modes is the recommended option and provides the highest level of security?

TPM with PIN and startup key

The only option for systems without a TPM chip

startup key

provides access to encrypted volumes if there are problems related to BitLocker as the computer boots

Recovery key

A user account that can recover encrypted data from BitLocker-protected drives when the password or keys are lost

Data Recovery Agent

A copy of this is saved to the TPM

PIN

Must be present on a USB flash device suring system startup

Startup key

Without this, the system can only boot to recovery mode, and the data on the disk cannot be accessed

Recovery key

How do you configure your Windows 10 system to require all removable data drives to mount as read-only unless the device is protected with BitLocker To Go?

Configure local group policy

You have been given a USB drive that has been encrypted with BitLocker To Go.
Which of the following options is required before you can access the data from this drive on a Windows 10 computer? (Select two. Each answer is a complete solutions.)

Correct password
Smart card

The users in your organization bring their own mobile devices to the office and want to be able to access the network with them. You want to protect your network from malware threats that might be on these devices.
You want to make sure these devices meet

Device Health Attestation

Enterprise Mobility Management

The comination of MDM and MAM solutions in one package, like Intune

Mobile Application Management

Focuses on managing the applications on a mobile device, not the device itself

Mobile Device Management

Manages the user's device, including remotely wiping the device

BYOD Policy

All software must be kept up to date
Backup and device encryption solutions
Never connect to a public Wi-Fi network
A PIN or other strong device unlock method must be used
A method to easily report lost or stolen devices immediately

You are setting up Windows Defender ATP with Intune. Put the following steps in the order in which they must be completed.

1: Connect the Intune and Defender ATP systems
2: Devices in Intune are configured to communicate with Defender ATP
3: Configure the security policies in Defender ATP and Intune
4: Any devices that do not comply with the security policy are blocked

You are reviewing configuration scores from all your devices in the categories of Application, Network, Accounts, Security Controls, and OS.
Which component of Microsoft Defender ATP are you using?

Threat and Vulnerability Management

As an administrator, you are very concerned with network, application, device, user, and data security. You want to minimize the number of places where an attacker could compromise your devices or networks.
Which Defender ATP component would you implement

Attack Surface Reduction

You would like to leverage services like machine learning together with cloud-based technology to provide more security for your organization. Which Defender ATP component would you implement?

Next Generation Protection

As an administrator, you feel like you are in over your head with some attacks you are experiencing on your devices and network. You feel like you need some help.
Which Defender ATP component would you use?

Microsoft Threat Experts

Microsoft Defender ATP can be combined with Intune to form a robust and powerful security system for all mobile devices on the network. The organization must meet which of the following three requirements? (Select three.)

1: Licensed for Enterprise Mobility and Security
2: Have an Intune account with Azure Active Directory
3: Have Microsoft Defender ATP and access to the Security Portal

Your systems have been hacked! As you try to discover the extent of the breach, you realize that you need help assessing the depth of the attack and amount of damage.
Which Defender ATP component would you utilize?

Automated Investigation and Remediation

You need to configure the following power options on your Windows notebook system when running on battery power:
Put the computer to sleep after 15 minutes of idle time.
Have the wireless adapter enter a strict power saving mode.
Shut down the computer if

Configure the advanced settings of any power plan

Which power plan enables your Windows notebook system to save as much battery power as possible?

Power saver power plan

You keep your Windows laptop plugged in most of the time, and you would like to use the full CPU power for a video project you are working on.
Click the power plan you would use to provide full CPU power.

High performance

You want to be able to stop working on your Windows notebook system, save battery power, and resume work as quickly as possible. You also want to protect yourself from data loss if your battery fails.
What should you do?

Enable Hibernate

You are on an airplane. You are instructed to turn off your Windows notebook system completely and immediately. You have several open windows with critical data that you cannot lose.
What should you do?

Put the notebook into hibernation

You would like your Windows laptop to sleep when the battery level becomes critically low.
Click the category you would expand to configure this setting.

Battery

You want to set the power scheme using the command line. Which command would you use?

powercfg

You want to set the power scheme using the command line for power management. What command would you issue in Command Prompt?

powercfg /s guid

Understanding Windows 10 power options is important as you roll out new devices in your IT enterprise and users become more mobile.
Rank the six standard ACPI states in order from highest to lowest power consumption.

Working State
Modern Standby
Sleep
Hibernate
Soft off
Mechanical Off

You are researching the hardware components to assist in power management in your users' Windows 10 laptops.
Choose the three most common components.

CPUs
Lower-power hard drives
Mobile graphics cards

You are about to give a presentation. You have connected your laptop to a multimedia projector. You are concerned about interruptions to your presentation, such as notification balloons and the screen turning black.
What should you do?

In the Windows Action Center, enable the Presentation Settings option.

You have a laptop running Windows. You are about to give a presentation, and you would like to minimize interruptions to your presentation.
Click the option you would use to do this.

Turn on - Presentation Settings

You are using your Windows 10 notebook system as you travel to client sites. You are about to board an airplane and decide to switch your notebook to Airplane mode prior to boarding.
How do you switch a notebook to Airplane mode? (Select two. Each answer

Select Airplane mode to turn wireless communications off.
Open the Settings app and click Network & Internet.

You manage Windows notebook systems that are members of a domain. You have ten regional salespeople who travel extensively and use these notebooks to access company resources.
The users have complained that although they can take copies of important files

Configure the Offline Files feature for the folder that contains these files.

You need to manually synchronize the offline files on your Windows system with the versions of the same files stored on a network share.
What should you do?

Open the Sync Center

`You work in a branch office and use a desktop system named Comp1. A Windows server named Srv1 is located in the main office.
On Srv1, you share a folder named Data using the default caching settings. You use Offline Files in the branch office to make the

Open the Sync Center in Control Panel

You have a Windows laptop that has Offline Files enabled. You regularly access a file named Info.txt in a share called Data on the company server where manual caching is configured.
Click the menu option you would use to make a local copy of Info.txt file

Always Available Offline

You have ten regional salespeople who travel extensively and use Windows notebook systems to access a shared folder named Data on Server1, which is located in the main office.
You want the files in the Data share to be cached automatically when opened by

All files and programs that user open from the shared folder are automatically available offline
Optomize for performance

You use a Windows notebook system named M400. It is a member of a domain, and it is located in a branch office. A Windows server named Server1 contains a shared folder named Data. The server is located in the main office.
You need to configure M400 to cac

On M400, make the Data share available offline and enable encryption of offline files.

You work in a branch office and use a desktop system named Comp1. A Windows server named Srv1 is located in the main office.
Srv1 stores several shared folders that you use, including the Data share. You use the Offline Files feature in the branch office

On Srv1, edit the properties for the Data folder

You need to implement a wireless solution to allow Windows notebook systems to send audio and video streams to projectors so employees can give presentations.
Which mobile wireless technologies can you use to do this? (Select two. Each answer is part of t

Miracast
Wi-Fi Direct

You are evaluating Wi-Fi Direct for establishing wireless connections between Windows notebooks and mobile devices such as phones and tablets.
Which of the following statements are true regarding Wi-Fi Direct? (Select two.)

It requires WPA2 security
It uses the 802.11n standard

You are trying to establish a Wi-Fi Direct connection between a Windows desktop system and a Windows tablet device.
You have installed an 802.11n wireless adapter in the desktop system. However, you are unable to see the tablet device.
Which action must y

Update the wireless network adapter driver on the desktop system to one that is compatible with Wi-Fi Direct.

You need to implement a wireless solution to connect Windows notebook systems with mobile devices such as tablets and phones. You need to do this without investing in additional technology.
Which mobile wireless technology can leverage the existing 802.11

Wi-Fi Direct

Global System for Mobile Communication (GSM)

Most used standard across the world and uses a SIM card

Code Division Multiple Access (CDMA)

Mainly used in the United states and Russia; it does not have a SIM card

Long-Term Evolution (LTE)

Faster, newer technology that only supports cellular data transmission

Once a user is connected to a Wi-Fi network, Windows 10 saves all the information to a Wi-Fi profile.
Which of the following settings are saved? (Select three.)

SSID
Security Settings
Password

Shows a list of wireless profiles

Shows the list of wireless profiles.

Retrieves the stored key (password) or a wireless network

netsh wlan show profiles name=[profile name] key=clear

Deletes a wireless profile

netsh wlan delete profile name=[profile name]

Shows all supported capabilities of the wireless adapter

netsh wlan show wirelesscapabilities

Which two pieces of hardware are required to make a connection to a mobile network? (Select two.)

SIM card
Modem

You have a Windows 10 user that calls from home and alerts you that they cannot connect to Wi-Fi and therefore cannot start the VPN to access company resources and print a document. When they take their laptop to the coffee shop, it connects just fine. Wh

There is a duplicate SSID in their vicinity

What happens when you plug a SIM card into your Windows 10 machine? Put the following in order of occurrence.

IMSI is read
ICCID is read
The service providers ID and name are read
The modem and apps download and install
The modem initializes and connects to the network

There is an app available in the Windows Store that users need to complete their day-to-day tasks. You want to deep link this app in Microsoft Intune to automatically install it on managed devices using the Intune agent.
How should you configure the softw

External link
Required Install

You are publishing an app in Microsoft Intune that you want to be automatically deployed on managed devices using the Intune agent.
Which type of deployment action should you configure using Intune policies?

Required Install

You are publishing an app in Microsoft Intune that you want deployed to the Intune Company Portal. You want to allow users to decide whether they want to install it on their managed devices or not.
Which type of deployment action should you configure usin

Available for enrolled device install

You are publishing a line of business desktop app in Microsoft Intune that you want deployed to the Intune Company Portal. You want to allow users to install it if they need it. The app is intended to be installed on Windows 10 desktop and notebook manage

Software installer.msi

Many of your users have iPhones and iPads that they use to complete their day-to-day tasks. You have enrolled these devices with Microsoft Intune. You now need to publish an app from the Apple App Store to these devices.
How would you deploy this iOS app

Store-app type, then search the App store

There is an app available in the Windows Store that users need to complete their day-to-day tasks. You want to deep link this app in Microsoft Intune to make it available on your Company Portal.
How should you configure the app to be made available to the

External link
Available install

You are interested in publishing an application in Intune. Arrange the steps on the left in the pane on the right in the order required to publish an application in Intune.

Add a new app to Intune
Launch the Intune Software Publisher
Choose which user or device groups to deploy to
Choose "Available Install" or "Required Install"
Deploy app to enrolled devices

Before you can manage apps using Intune, which three prerequisites must be met? (Select three.)

The users' devices must be enrolled in Intune
THe users must be assigned to groups in Azure Active Directory
The users must have an account in Azure Active Directory

You are following the life cycle of an application in INtine. YOu want to implement confitional access policies to limit unauthorized exposure to email and company resources.
Which phase are you implementing?

Protect phase

You are creating an app protection policy. You must choose a Windows Information Protection (WIP) mode. You would like to allow users to relocate data away from protected apps and log when this is done.
Which mode should you use?

Silent

Put the app life cycle phases in order.

Add
Deploy
Configure
Protect
Retire

There are four things users must do or have to implement MAM app protection policies in your environment.
Drag the four requirements for MAM to the right.

Have an Azure AD account
Have an Intune license
Belong to a group with policies assigned
Signed into the app with an Azure AD account

You would like to set up an app deployment method in Intune that shows users from each department the apps they have rights to so that they can be downloaded.
Which deployment method would you use?

App catalog

You are looking for a cloud-based solution that helps you classify and protect your company's documents and emails by applying labels and rules to detect sensitive information. You want to track and control how they are used.
What Azure-based technology w

Azure Information Protection policies

You are implementing Windows Information Policies (WIP) and would like to prompt users when they are moving sensitive company data on their devices.
What WIP mode should you deploy?

Allow Overrides

You are very concerned that employees or their applications will download sensitive data from your company's SharePoint site, network shares, and intranets using their mobile devices.
Which cloud-based technology would you implement in order to encrypt th

Windows Information Protection (WIP)

You have a corporate application that employees must use that includes sensitive company information, including the phone numbers and contact information of employees and clients. You want to secure the app on mobile devices so users must enter a PIN when

App protection policy

You want to block all Samsung Android devices from accessing corporate resources in your IT environment.
Which of the following would you implement?

App protection policy

You have some apps that you would like to manage and secure that are not being managed by Intune. At this point in time, they are being managed by another vendor that provides enterprise mobility management (EMM).
Which mobile application management (MAM)

MAM-WE, or MAM without enrollment

You need to customize which utilities and programs load on your Windows system at startup.
What should you do?

Run System Configuration

After running the Backup and Restore console on your Windows computer, you notice that backups are not created for open files.
To troubleshoot the issue, you want to confirm that the Volume Shadow Copy Service (VSS) is running and configured to start auto

Services

You are using the System Information utility, and you want to see the size of the disks installed and how much free space you have. Which option would you expand?

Components

Which of the following utilities allows you to change the startup type of a service to Automatic (Delayed)?

services.msc

Windows comes with a special tool called the Microsoft Management Console (MMC). What does this tool do?

Provide a consistent interface for all management tools

You are using the Services app. You have double-clicked on a service. Which tab will allow you to see the system drivers that the service uses?

Dependencies

You have opened the System Information app, which is now displaying the System Summary.
Which information can be seen from this view?

Name of the OS, the OS manufacturer, and system model number

You have opened the System Information app (msconfig.exe) and selected the tab named Boot. In the Boot options section, you have checked Boot log.
What will selecting this option do?

Gather information about a service or device that is running when the system starts up

What is the main purpose of the dxdiag utility?

Test the system's multimedia capabilities

You have a utility on your computer that needs to run regularly on a set time and day each week. What tool would you use to accomplish this task?

Task Scheduler

You are troubleshooting a problem that keeps occurring on your Windows system. When the problem happens, there are several Warning and Error events logged to the Application log in Event Viewer.
You create a Custom View that shows only Warning and Error e

Save the filter to a custom view

You are troubleshooting a problem that keeps occurring on your Windows system. When the problem happens, Event Viewer shows several Error events in the Application and System logs.
From a single view, you would like to see only Error events from both the

On the Application log, filter the log to show only the Error events. Save the filter to a Custom View and then add the System event log as an additional filter

Using Event Viewer, you have created a Custom View to track Warning and Error events from both the Application and System logs.
After a few days, there are several events in the Custom View. You would like to clear the messages from the view so that you o

Edit the Custom View properties and create a custom range for the logged events, starting with todays date

As part of the regular system maintenance on your Windows system, you are checking Performance Monitor statistics and Event Log events.
You notice that there are several Error events listed with the same ID number. They also contain a description that sou

Attach a task to the event

On your Windows system, you run a custom application that was developed in-house.
The application generates Event Viewer events and logs those events to the default Application and the Security logs in Event Viewer.
As you monitor the application, you wou

Create a Custom View

You have two Windows systems named Computer 1 and Computer 2.
Over the next few days, you want to be able to monitor Computer 1 from Computer 2. To do this, you want to automatically save and send Computer 1's Application and System logs to Computer 2.
Ho

On both computers, enable and configure Event Subscriptions. Configure Computer 1 as a source and Computer 2 as a collector.

You manage three Windows systems that are part of a Workgroup. You would like to configure Event Subscriptions so that you can view all events from those computers on your Windows notebook.
You need to configure the three source computers and one collecto

On the collector computer, configure the subscription.
On all four computers, run the winrm qc-q command. On the collector computer, run the wecutil qc /q command.

You manage two Windows systems named Computer 1 and Computer 2.
You have configured Event Subscriptions with the default settings to forward events from these two computers to a third Windows system named Computer 3.
How do you view the events from these

In Event Viewer, open the Forwarded Events log.

You would like to configure Event Subscriptions on your Windows system to forward events to a network server. You need to configure your computer as a source computer for a collector-initiated subscription.
Which of the following will be part of your conf

Add the collector computer to the Event Log Readers group.
Run the winrm qc command.

You would like to configure Event Subscriptions on your Windows system to forward events to a network server. You need to configure your computer as a source computer for a source-initiated subscription.
Which of the following will be part of your configu

Run the winrm qc -q command.
Configure the Local Security Policy to identify the FQDN of the collector computer

You use a custom application that was developed in-house.
On a periodic basis, the application writes or modifies several registry entries. You want to monitor these registry keys so that you can create a report that shows their corresponding settings ove

Configure a configuration data collector in Performance Monitor

You share your Windows system with several other users. You are concerned about the amount of disk space use on the computer.
What can you do to be notified by email when the used disk space exceeds 85%?

Configure a performance counter alert

You would like to generate a report that shows the status of hardware resources, processes, and configuration information on your Windows system.
How can you generate a report that includes suggestions for ways to improve the performance of your system? (

From Performance Monitor, under Data Collector Sets, run System Diagnostics
From Command Prompt, run perfmon /report

You manage a Windows system.
You would like to generate a report that runs several basic tests of the operating system, Security Center, hard disk, services, and hardware devices and drivers.
How can you generate a report that includes suggestions for how

In Performance Monitor, run the System Diagnostics Data Collector Set

You need to monitor the processor utilization on your Windows system. You want to get an email notification every time the processor utilization exceeds 90%, so you create a new Data Collector Set in Performance Monitor.
Which type of Data Collector shoul

Performance counter alert

You have just installed a custom application on your Windows system. The application generates Event Viewer events and logs those events to the default Application and the Security logs in Event Viewer.
You are concerned about system performance while run

Create a Data Collector Set in Performance Monitor

After running the System Diagnostics found in the Data Collector Sets, you want to view the results of the diagnostics and review any suggestions for improving system performance.
Click the folder that contains the diagnostics results.

System Diagnostics

Captures system performance statistics over a period of time

Data Collector Set (DCS)

Used to view the collected data from data collector set counters

Performance Monitor Reports

Displays real-time visual graphs of a computer's overall performance

Performance Monitor

Used to start and stop and existing collection

logman.exe

Which of the following is an accurate description of the function of the Windows Performance Analyzer (WPA)?

Presents trace content in the form of interactive graphs and summary tables

The Windows Performance Toolkit (WPT) is not included with the Windows operating system.
Which steps do you need to follow to install and run the WPT? (Select two. Each answer is part of the complete solution.)

Download the Windows Assessment and Deployment kit (ADK)
Install the Microsoft .NET Framework 4.5

You use an application on your Windows system that compresses videos used in your online business. You want to make sure that the application continues to run in the background even if you open other applications.
How do you adjust the amount of attention

Use Task Manager to modify the process priority

You need to enable Remote Registry on your Windows desktop system.
Click the Task Manager option you would use to do this.

Services

A user calls to complain that her Windows system is running slowly. You launch Task Manager on her system and select the Processes tab. The output is shown in the image below.
What should you do? (Select two. Each answer is a part of the complete solution

Install more RAM in the system
Install a faster CPU into the system

When should you start monitoring system performance?

Immediately after the system is set up

There's a tool designed to collect data. It allows you to specify which counters you want to collect data for by clicking on the plus sign and adding the counters you want. What's the name of this tool?

Performance Monitor

You are analyzing the CPU utilization on you system. Why would you use Resource Monitor rather than Task Manager?

Resource Monitor provides much more granular information than Task Manager

Which action can you take to see disk activity performance for an application running on your Windows system?

Filter by the application in Resource Monitor

You want to see memory statistics for a specific process running on your Windows system.
What do you need to do to view the working set, shareable, and private memory for the process?

Filter by the process in Resource Monitor

While working with a new application on your Windows system, the application stops responding.
How can you analyze the application and its associated processes to identify which processes the application is waiting on?

In Resource Monitor, analyze the wait chain for the process

You suspect that a process on your Windows computer is causing a large amount of network activity. You would like to view the network activity on your computer filtered by specific processes.
Which of the following tools will display the most detailed inf

Resource Monitor

You started using a new Windows server three months ago. Since that time, you have found that the system slows down and crashes from time to time.
You want to look at a report that shows important events for the server since it was installed. You'd like t

Open Reliability Monitor

You are viewing the reliability and problem history chart in Reliability Monitor on a Windows system. Some sections of the graph are displayed with a dotted line.
What does the dotted line indicate?

There is not enough data to calculate the stability index

What data on a Windows system is monitored to create the reliability and problem history chart in Reliability Monitor? (Select two.)

System memory failures
Software installs/uninstalls

Consider the Reliability Monitor output shown below. Which status does the yellow triangle icon with an exclamation point represent?

Warning

In the Windows Action Center, notifications are provided for which of the following? (Select two.)

Windows Defender
Network firewall

Consider the Reliability Monitor output shown below. What does the red circle with the letter x represent?

Critical Event

What tools or services rely on Security Center to be active and running to function well? (Select two.)

Windows Action Center
Network Access Protection

What is the tool that queues messages, checks several security and maintenance-related items, and consolidates messages and status updates for several other tools called?

Windows Action Center

What is Windows Action Center?

A central location for managing system messages and resolving issues within your system

How do you manage the items in the Windows Action Center?

From the desktop, right-click and select Windows Action Center

How do you increase the size of the paging file on your Windows system?

Modify the Advanced system settings

While managing the available memory for applications on your Windows system, you discover that the paging file is set below the recommended size.
Which answer is a common recommendation for setting the size of the paging file?

Configure the paging file to one and a half to two times the amount of physical RAM

For several months, your Windows computer acted like a server in the workgroup. It was optimized to share files and folders to the other computers. You no longer need the computer to act like a server. Now, you want the computer to focus on applications.

Edit the Processor Scheduling settings

You have been having trouble with your Windows notebook system crashing. The support technician wants you to send him a memory dump that occurred when the computer crashed. You find that the computer did not create the memory dump file.
How can you config

Place the paging file on the system drive

You want to enable Data Execution Protection (DEP) for all programs and services on your Windows system.
Click the option you would use in System Properties to configure this function.

Settings under Performance

Why does virtual memory play an important role in the Windows OS?

It allows you to run more applications on the system than you have physical memory to support

What is it called when the hard drive light on your PC is staying on constantly, and the applications have slowed down significantly?

Disk thrashing

What are the benefits of the Indexing Service on a Windows system? (Select two.)

It searches specified locations on the system's hard drisk drive and catalogs all the files and programs it finds
It makes the search process much faster

When using the Indexing Service on your Windows system, how many directories should you typically catalog?

Only those containing data that is used often

You have opened the Indexing Options dialog and navigated to Advanced > File Types tab. From this page, you can specify how the file should be indexed.
Which of the following options are available? (Select two.)

Index Properties and File Contents
Index Properties Only

You manage two Windows systems named Computer1 and Computer2. Both computers are members of a domain. Windows Remote Management (WinRM) is enabled on both computers.
Which steps do you need to perform so you can use Computer2 to create an additional disk

On Computer 2, run winrs and then run diskpart

You manage two Windows systems named Computer1 and Computer2. Both computers are members of a domain.
Which steps do you need to perform so you can remotely execute commands on Computer2 from Computer1?

On Computer 2, run winrm qc

You manage two Windows systems named Computer1 and Computer2. You need to use the command line to remotely manage Computer1 from Computer2.
What should you do? (Select two. Each answer is part of the complete solution.)

Authenticate Computer 2 to Computer 1
On Computer1, run winrm qc

You are the Windows desktop administrator for your company. You would like to manage your computers remotely using the Windows Remote Shell. You need to enable remote management on each target computer.
What should you do?

Run winrm quickconfig

You have a Windows system that you would like to manage remotely. The computer connects to the network behind a firewall that blocks all but the most common ports.
Which remote management solution does not require additional firewall ports opened?

Windows Remote Shell (WinRS)

You need to interactively access Command Prompt on a remote Windows system named WS1 from your Windows workstation.
Which command should you use to do this?

psexec \\WS1 cmd

You need to be able to remotely execute commands on a Windows workstation named WS1.
Which commands can be used to enable remote management on this system? (Select two. Each answer is a complete solution.)

winrm quickconfig
Enable-PSRemoting

Which of the following syntax examples is used by a PowerShell cmdlet?

Verb - noun

What are two ways you can run PowerShell cmdlets remotely? (Select two.)

Use invoke-command followed by the name of the remote computer and then the PowerShell cmdlet within brackets
Directly from the command, use the computername parameter

Which tool can you use to remotely manage a system using a graphical user interface?

Graphical Microsoft Management Console

You have a Windows system that you would like to manage remotely. You enable Remote Desktop on the computer. While working from home, you find that your home firewall is blocking Remote Desktop.
Using the port numbers assigned by default, how can you conf

Open port 3389 in the network firewall

You are the desktop administrator for your company. You would like to manage the computers remotely using a tool with a graphical user interface (GUI).
Which action should you take? (Select two. Each answer is a possible solution.)

Open Computer Management and connect to each remote computer
Establish a Remote Desktop connection to each computer

You need to connect to a remote Windows system using Remote Desktop.
How can you copy files from your local hard drives to the remote computer with the least amount of effort?

In the Remote Desktop Connection options, edit the local devices and resources options

You have a computer running Windows 10. You have just enabled Remote Desktop on the computer so you can connect to it using a low-speed broadband connection from home and run a few reports. You need to optimize the performance of your Remote Desktop sessi

Persistent bitmap caching

You are using a Windows desktop system to connect to a remote system using Remote Desktop.
How do you prevent the desktop background on the remote computer from displaying on the local computer?

On the Experience tab of the Remote Desktop Connection, clear the Desktop background checkbox

You manage a Windows system that is a member of a Workgroup. The computer is shared by three users. Each user has a standard user account.
Mary is one of the three users of this computer. She wants to access the computer using a Remote Desktop connection.

Make Mary's user account a member of the Remote Desktop Users group

You manage several Windows systems that are members of a domain. Your company uses Remote Assistance to help diagnose user desktop issues. All computers are configured to allow Remote Assistance. One day, you receive a Remote Assistance request from someo

Require a password on invitation files
Decrease the timeout for invitation files

Which of the following are true regarding Remote Assistance? (Select two.)

Invitations require a password and have an expiration date
The helper cannot copy files from a user's computer

You need to configure Remote Assistance on your Windows system so that invitations can only be used from computers running Windows Vista or later.
Click the System Properties option you would use to do this.

Advanced

You were having trouble with your Windows system, and you initiated a Remote Assistance session with a Help Desk technician.
The technician has taken control of your system to perform several checks. She has now asked you to take back control of the syste

Click stop sharing
Press Esc

What are some of the resources you can look at first when troubleshooting startup issues with your PC? (Select two.)

Task Manager
msconfig

What tool can be used to automatically fix common startup problems?

Startup Repair

These let you access data stores, such as the registry and certificate store, in a way similar to accessing the file system

Providers

This is a text-based and uses a simple command syntax

Command Line Interface

You can use this to redirect the output of one PowerShell cmdlet to the input of another

Piping

These contain one or more Powershell cmdlets

Script files

These are executed at a PowerShell prompt to perform system management tasks

Cmdlets

The PowerShell command line interface (CLI) uses simple command construction.
What is the typical form of a PowerShell command?

verb-noun-adverb

What are some security measures Microsoft has implemented to protect your system against users trying to use PorwerShell for malicious purposes?

File extension, script's full path, and execution policies

How should cmdlets in a PowerShell script be organized?

In the order that they should run

When do you need to use the full path to a script in order to run it in PowerShell?

Always

What are some of the execution policies that Windows has in place to protect PowerShell against malicious users? (Select two.)

Restricted and Unrestricted
AllSigned and RemoteSigned

Why is command history so useful in PowerShell?

Because it allows you to use the up arrow key to select a previously used command instead of retyping it

What happens when you double-click a PowerShell script file?

It opens as a Notepad file

You have just read about a new security patch that has been made available for your Windows system. You install the patch as a Windows update. After you reboot and sign in, your computer appears to be unstable.
Which action should you take? (Select two. E

Use the Setting app to uninstall the update
Use Programs and Features to remove the update

A feature update includes new capabilities and improvements. What is the maximum number of days you can defer feature updates?

365

Which application would you use to include device updates with Windows Update?

Control Panel

You have 400 Windows 10 workstations and a Windows Server Update Service (WSUS) in your office. Which option would you use to stop the workstations in your organization from using Microsoft's servers for system updates?

Allow downloads from other PC's

Ideal for pilot deployment and lab testing of Windows updates

Semi-Annual channel

For highly sensitive systems that can't tolerate any down time

Long-Term Servicing channel

Give system administrators a chance to give feedback to Microsoft on any bugs before Microsoft releases the update

Windows Insider Program (WIP)

New updates are typically released every 2-3 years

Long-Term Servicing channel

Feature updates are automatically installed as soon as they are released unless deferred

Semi-Annual channel

Provices very early pre-released Windows builds or feature updates

Windows Insider Program

Released semi-annually in the spring and fall

Feature updates

Include security fixes and software updates

quality updates

Deployed monthy (usually second tuesday of the month)

Quality updates

New version of Windows operating system

Feature updates

Cumulative in nature, adds any missed updates

quality updates

Where can you find the Windows Update settings in Windows 10?

Settings > Update and Security > Windows Update

Which of the following are types of operating system updates for Windows 10 provided by Microsoft? (Select two.)

Feature updates
Quality updates

Which path would you use to uninstall an update that was automatically installed by Windows Update?

Settings > Update and Security > View Update History > Uninstall updates

Which of the following channels are provided by Microsoft to manage deployment of updates to your Windows 10 system? (Select three.)

Semi-Annual
Long-Term Servicing Channel
Windows Insider Program

Which of the following are true about Windows Update for Business? (Select three.)

Windows Update for Business can be configured with Group Policy, Mobile Device Management, or Systems Center Configuration Manager
Windows Update for Business can be used with all versions of Windows 10 except Windows 10 Home
Windows Update for Business p

Which of the following tools can be used to troubleshoot and validate Windows updates? (Select three.)

Windows Update Troubleshooter
Windows Server Update Service (WSUS)
Powershell

While deploying Windows updates, when would you use the critical update ring?

When deploying updates to machines (only after the update has been vetted)

What is WindowsUpdate.log?

A log file that can be created and saved and can be used to locate errors or problems

Which of the following is true about Windows Update? (Select two.)

By default, each client contacts the Microsoft website for updates
Windows 10 allows the user to turn security updates off using the Settings app or Control Panel

You have a Windows 10 system. You have used the Settings app to access Windows update.
From this location, how long can you pause updates?

7 days

Using the Settings app, you have accessed Windows Update > Delivery Optimization.
What function does this option provide?

Delivery Optimization provides you with Windows and Store app updates and other Microsoft products

Windows Update for Business (WUfB) lets you keep devices current with the latest security upgrades and features.
Which operating system releases does WUfB support?

Windows 10

Your Windows system is a member of a domain. Windows Update settings are being controlled through Group Policy.
How can you determine whether a specific security update from Windows Update is installed on the computer?

Go to Programs and Features in Control Panel

Which Group Policy setting, when disabled, forces users to update their system before the system is shut down?

Do not display INstall Updates and Shut DOwn option in Shut DOwn Windows dialog box

You install a new graphics application on your Windows machine. During installation, the computer reboots, but hangs during startup. Pressing F8 has no effect.
To fix your computer so it will start, what should you try first?

Boot from the installation disc and restore to a restore point

You have recently made some changes to your Windows system. Things seemed to run fine for several days. Today, however, your computer has started to be unstable. Shortly after you log on on, the system crashes and hangs.
Which of the following will most l

Book into Safe Mode and restore to a restore point

Your Windows computer has two hard drives, both formatted with NTFS. You have enabled system protection on both disks.
How do you delete all restore points while keeping system protection enable on both drives?

Edit the System Protection configuration in System Properties, and delete the restore points

Your Windows 10 computer has two hard drives formatted with NTFS. You have enabled System Restore on both disks.
How can you delete all restore points except for the last restore point?

Run Disk Cleanup

You have just added a new 300 GB hard drive to a Windows computer.
You create a single volume named Data and format the volume using FAT32. The volume is assigned drive letter D:. You copy several files to the new hard disk.
Which action must you take fir

Run convert.exe to change the drive to NTFS

As part of your regular system maintenance, you install the latest operating system updates on your Windows 10 computer.
After several days, you notice that the system locks up and reboots from time to time. You suspect that a recent update is causing the

Restore the system using a restore point

You run a regular file backup on your Windows 10 computer every Friday night, which also includes a system image backup. System Protection has been enabled for all drives on the system.
On Wednesday, you receive a new version of a graphic editing applicat

Use System Restore to revert to a restore point before you installed the application
Use File History to restore the missing files

You use a Windows desktop system to edit and produce audio files. Your system has two hard disks installed. Your applications are installed on the C: volume on the first hard disk. Because of the size of the audio files you produce, you keep them on a sep

Increase the amount of disk space reserved for restore points on C:

Your Windows computer has system protection enabled on the system drive. By default, restore points are only created when a Windows update occurs. In the last week, since the last Windows update, you have installed a video editing application that you use

Create a manual restore point just before installing the sound card

Which of the following are true about File History backups or restore points? (Select three.)

File History backups use Volume Shadow Copy (VSS) to take snapshots of files and folders
File History only works on NTFS partitions
File History can be used to recover on offline OneDrive files

One of the users you support, VKumar, has just turned on File History and selected the internal D: drive as the location to which his files will be copied.
By default, which directory does File History copy files from to save on the D: drive?

C:\Users\VKumar

You manage a Windows 10 system, on which File History has been turned on. You want to keep all versions of your files until space on the hard drive is needed. You have used Control Panel to access File History as shown in the image.
Click on the option wh

Advanced Settings

Which of the following describes a system image backup? (Select two.)

A system image contains everything on the system volume, including an OS, installed programs, drivers, and user data files
A system image backup consists of an entire colume backed up into .vhd files

You use a Windows 10 system with File History enabled.
You've been working on the index.html file in the HTML Files folder in your Temp\HTML library. You realized this evening that you've made many erroneous changes during the day that will require a grea

green refresh button

You use a Windows 10 system with File History running.
Currently, File History is configured to save copies of files every hour. However, you've been assigned to work on a high-profile project, and you would like File History to save copies of files every

In Control Panel, click System and Security>File History
Click Advanced Settings and then set Save copies of files to Every 15 minutes

Your Windows system has two volumes defined. The C: volume contains the Windows system and is formatted with NTFS. The D: volume is formatted with FAT32.
Which action must you take to create a system image backup with the D: volume as the destination?

Convert the D: drive to NTFS

You have a Windows 10 computer configured with volumes C: and D:. You want to schedule backup jobs of the C: volume to include all user files on the C: volume as well as creating a system image of the C: volume.
How do you configure the backup job and the

Use the Backup and Restore (Windows 7) console

You have a computer running Windows 10. The C: drive holds all system files and is the boot volume. The D: volume holds only user data files.
You want to schedule a backup that includes everything on the C: and D: drives so you could restore your entire c

In the Windows Task Scheduler, create a task to run wbadmin

You have configured scheduled backups in the Backup and Restore console to take a backup each week. You save the backups to a network location.
You find that backups are not being completed because the destination computer is asleep when the schedule time

Edit the backup task in the Task Scheduler

You are configuring file backups using Backup and Restore (Windows 7) in Control Panel on a Windows system.
Which information can be included in the backup? (Select two.)

Files in user Documents libraries
Files on user desktops

To provide additional storage space, you have added a second internal hard drive to your Windows 10 system.
For the past several weeks, you have created and changed many files stored on the new hard drive. One of the files on the new drive has become corr

Enable System Protection on the new hard drive

You are supporting a Windows 10 computer that has two volumes:
The C: drive is the system drive with user profiles and individual user files.
The D: drive holds data files common to all users.
System Protection has been configured as follows:
A system ima

Enable System Protection for the D: drive
Modify the backup settings in Backup and Restore to include the D: drive

Your Windows 10 computer has the following drives:
C: (System drive with user profiles)
E: (Data files)
F: (External USB hard drive)
You enable system protection on the C: drive. You also schedule regular backups with the following settings:
Back up all u

Use the Backup and Restore console to restore data from a backup

To protect the data on your Windows 10 computer from loss or corruption, you enable system protection on all the drives in your computer. You also schedule regular backups of the system drive and all other drives using the Backup and Restore (Windows 7) c

Use the Backup and Restore (Windows 7) console to locate and restore the file
Use the file's properties to restore a previous version of the file

To protect the data on your Windows 10 computer from loss or corruption, you enable system protection on all drives in your computer. You also schedule regular backups with the following settings:
Back up all user libraries
Back up all drives
Include a sy

Use the Backup and Restore console to restore the user profile from backup

You are supporting a Windows 10 computer that has the following volumes:
The C: drive is the system drive with user profiles and individual user files.
The D: drive holds data files common to all users.
System Protection has been configured as follows:
A

Restore the file from the system image

You support a Windows 10 computer that has the following volumes:
The C: drive is the system drive with user profiles and individual user files.
The D: drive holds data files common to all users.
The user has taken the following actions:
Scheduled regular

Use the Previous Versions tab of the file properties to restore the file

You are supporting a Windows 10 computer that is used by three different users. The computer has the following volumes with default System Protection settings:
C: (System drive with user profiles and individual user files)
E: (Data files common to all use

Enable system protection for the E: volume

To protect your system and the data on your Windows 10 computer, you use the Backup and Restore console to create a system image backup.
While working with a file, you accidentally delete some of the data. You need to restore the older version of the file

Attach the .vhd file created from the Backup and Restore console
Use Windows Explorer to browse and then copy the file

Your Windows 10 computer has two hard drives. The C: drive is the system drive, and the D: drive holds data files.
You perform a system image backup that includes both drives using the Backup and Restore console. Your computer takes regular restore point

Mount the .vhd file in the backup and then copy the folder to the drive

One day while trying to start your Windows 10 system, you see the following error displayed:
Could not read from the selected boot disk. Check boot path and disk hardware.
Which of the following will most likely fix the problem?

Boot into the recovery environment and run the bootrec /rebuildbcd command

You are using a Windows 10 system to work on the schedule for a very important project. You saved your files in the Documents library of your user account.
Unfortunately, malware from a malicious website has infected your system. You were able to remove t

Boot the system from a recovery drive
Click Troubleshoot > Reset the PC > Keep my files

The vendor of your accounting software recently released an update that you downloaded and installed on your Windows system. Unfortunately, now your accounting software crashes when launched.
Which action can you take to get your system running properly a

Boot the system from a recovery drive and click Troubleshoot > Advanced Options > System Restore
In Control Panel, go to System and Security > System > System Protection > System Restore

You need to create a recovery drive for your Windows system. To do this, you've procured a USB flash drive with the following characteristics:
USB version: 2.0
Capacity: 4 GB
Can you create a recovery drive using this device?

No. The device must be 8 GB (or larger) in size

You want to use an optical disc as a system recovery drive.
In the System and Security category, click the Control Panel item you must use to create a system repair disc.

Backup and Restore (Windows 7)

You want to use a USB flash drive as a system recovery drive.
Which of the following steps can you use to launch the utility you must use to perform this task?

In the taskbar search field, type Create a recovery drive. Then selecte the Create a recovery drive entry in the search results

You have just set up a new Windows 10 system. You want to be able to recover this system if a major failure occurs.
With some system failures you can still boot the system and log on and then perform tasks to recover the system using a backup.
Click the o

Set Up Backup

When you initially set up your Windows 10 system, you configured it to create regular backups. You have also kept an up-to-date system image.
Recently, your system has been experiencing serious issues. At first, the system would boot and let you log on, b

Click Repair on your computer. CLick Troubleshoot. Run the System Image Recovery option

One day while trying to start your Windows 10 system, you see the error Operating system not found displayed.
Which of the following options will most likely fix the problem?

Boot into the recovery environment and run the bootrec /fixmbr command on the boot volume

You install the drivers to connect your new music player to your Windows 10 computer. Immediately following the device installation, you get a bluescreen error. You reboot the computer, but it displays the same bluescreen and stops the boot process.
What

Reboot and Repair your computer, and then choose Startup Repair

Your Windows system has been infected with malware that has replaced the standard boot loader on the hard disk with its own malicious software.
Which type of exploit is being used in this scenario?

Rootkit

Which of the following is a characteristic of a virus?

Must be attached to a file or program to run

Which of the following types of malware are designed to scam money from the victim? (Select two.)

Ransomware
Scareware

Which malware type is designed to facilitate identity theft?

Crimeware

You have noticed malware on your network that is spreading from computer to computer and deleting files. Which type of malware are you most likely dealing with?

Worm

You manage a Windows computer that is shared by multiple users.
Recently, a user downloaded and installed two malware programs on the computer. The applications had a .msi extension.
What is the first line of defense in protecting your system against appl

Use anti-malware software that provides real-time protection

Once a piece of malware is detected and reverse-engineered, its unique characteristics are identified. Anti-malware programs use these characteristics to identify malware.
What do anti-malware programs call these unique characteristics of malware?

Signature

A user keeps attempting to open a text file. All that happens is a Command Prompt window flashes on screen and then disappears.
Which of the following actions will help you determine the cause of this issue?

Show full file extensions

Which command can be used to attempt to repair infected files?

sfc

Put the steps for the suggested procedure for remediation of an infected system in the order they should be performed in.

1. Identify Symptoms
2. Quarantine Infected System
3. Disable System Restore
4. Update anti-malware definitions
5. Scan for and remove malware
6. Schedule future anti-malware scans
7. Re-enable System Restore
8. Educate the end user

Which of the following indicates that somethings may need your attention in Windows Security?

Yellow exclamation triangle

Which virus protection feature should be enabled to protect files, folders, and memory areas from unauthorized changes by unfriendly applications?

Controlled folder access

What should you do before you install a third-party anti-malware program?

Disable Windows Security

What is the component of Windows 10 that provides protection against malware and other threats called?

Windows Security

Which Windows Security feature helps protects a device against potentially dangerous apps, files, sites, and downloads?

SmartScreen

Checks all files and running programs on the hard drive

Full Scan

Restarts the computer and uses up-to-date definitions to find and remove threats

Offline Scan

Checks folders where threats are commonly found

Quick Scan

Lets you choose which files and folders to scan

Custom scan

Which of the following is true of the Family Options Windows Security feature?

Is availalble for Microsoft account

Which Windows Security feature alerts you if there are storage capacity issues?

Device performance and health

By default, when does Windows Security check for new updates?

Every time a system scan takes place

If a program has been quarantined, what must you do to run it again?

Restore the program

What type of security ticket is used to establish the session with servers in an AD DS network?

Kerberos

Which of the following are minimum requirements to implement Credential Guard? (Select three.)

TPM chip on motherboard
CPU virtualization extensions
Windows Secure Boot

Which technology does Credential Guard use to block access to the tickets stored within the LSA?

VBS

You are trying to implement Credential Guard on a Windows 10 Pro machine, but you can't find the Credential Guard option.

Credential guard is not available on Windows 10 Pro

Where do you go to enable Windows Defender Credential Guard?

Group Policy

Which of the following options under Credential Guard Configuration would you select if you need to be able to disable Credential Guard remotely?

Enabled without lock

You have enabled Credential Guard in Group Policy, and you need it to take effect immediately.
Which of the following actions will make this happen? (Select two.)

Run gpupdate /force from an elevated Command Prompt
Log the user out and back in

Which of the following can tag processes running on the local system as belonging to a VM running within Hyper-V?

VSM

What is the purpose of Credential Guard?

To prevent attackers from stealing credentials

Where are Kerberos tickets stored on the local system?

LSA

What are the vectors that an attacker can use to enter or extract data from an environment called?

Attack surface

What does Exploit protection use to help mitigate exploit techniques?

Antivirus software

Which Exploit protection mitigation needs to be enabled if you want to prevent executable code from being run from data-only memory pages?

Data Execution Prevention (DEP)

Which PowerShell cmdlet can be used to enable and configure controlled folder access?

Set-MpPreference

Which version of Windows 10 is the minimum requirement to implement the Network Protection feature of Exploit Guard?

Windows 10 Enterprise E3

You want to set up Exploit Protection. Which of the following steps should you take? (Select two. Each answer is a part of the process.)

Define your Exploit protection settings and export to an XML file
Enable the Group Policy setting and enter path to the exported file

Which component of Exploit Guard helps prevent access to internet domains that may host phishing scams, exploits, and other malicious content?

Network protection

Which PowerShell cmdlet can be used to configured exploit protection?

Set-ProcessMitigation

Prevents suspicious or malicious software from making changes to protected folders

Block

Prevents untrusted apps from writing disk to sectors

Block disk modification only

Stops the Controlled Folder Access feature

Disable

Tracks untrused apps that write to disk sectors

Audit disk modification only

Tracks rather than prevents changes to protected folders

Audit mode

Which component of Exploit Guard protects your system ransomware and malware by preventing changes in protected files and folders?

Controlled folder access

Which of the following meets the minimum licensing requirement to use Microsoft Defender Advanced Threat Protection?

Windows 10 Enterprise E5

You are trying to set up and configure Microsoft Defender Advanced Threat Protection on your network. One of the client machines is not reporting properly. You need to verify that the diagnostic data service is enabled.
Which command can you run to check

sc qc diagtrack

Which capability of Windows Defender Advanced Threat Protection provides the first line of defense in the stack by ensuring that configuration settings are properly set and exploit mitigation techniques are applied?

Attack Surface Reduction

Which driver must be enabled for Windows Defender Advanced Threat Protection (ATP) to run?

ELAM

Which of the following web browsers can be used to access Windows Defender Advanced Threat Protection (ATP)? (Select two.)

Edge
Chrome

You are logged into the Windows Defender Security portal. You notice that a machine has a malware program on it. You know what this program is, and you want to leave a comment so others can identify the malware.
Under which setting can you leave comments?

Manage Alerts

Which capability of Windows Defender Advanced Threat Protection (ATP) is put in place to detect, investigate, and respond to advanced threats that may have made it past the first two security pillars?

Endpoint Detection and Response

Which of the following Microsoft solutions does Windows Defender Advanced Threat Protection (ATP) directly integrate with?

Intune

Further reinforces the security perimeter of your network

Net Generation Protection

Provides proactive hunting, prioritization, and additional contect and insights

Microsoft Threat Experts

Uses a game-changing risk-based approach to the discovery, prioritization, and remediation of endpoint vulnerabilities and misconfigurations.

Threat and Vulnerability Management

Shows the collective security configuration state of your machines across application, operating system, network, accounts, and security controls.

Configuration Score

Lets you integrate Microsoft Defender Advanced Threat Protection into your existing workflows

Centralizaed Configuration and Administration

Windows Defender Advanced Threat Protection shows the collective state of your devices in the following categories: application, operating system, network, accounts, and security controls. Which capability provides this information?

Configuration Score

What does Application Control use to lock down systems by allowing only certain things to run?

Code Integrity Policies

Which of the following versions of Windows meets the minimum requirements to create WDAC policies?

Windows 10 Pro Build 1903

Group Policy can be used to deploy WDAC policies to which of the following versions of Windows 10?

Windows 10 Enterprise

Which of the following is a prerequisite for Windows Defender Application Control?

UEFI Firmware

How many Windows Defender Application Control (WDAC) policies can a computer system have defined for it?

1

On which of the following computers should a Windows Defender Application Control default policy be created?

A reference computer

Which of the following determines the reputation of an app by which WDAC rules can be defined?

Intelligent Security Graph

Which of the following tools must be used on the reference machine to generate the code integrity policy?

PowerShell

Which PowerShell cmdlet is used to generate the code integrity policy XML file?

New-CIPolicy

After creating your code integrity policy XML file, you have gone into Group Policy and enabled the Deploy Windows Defender Application Control option. You specified the path to the code integrity policy file.
When that policy file is downloaded to the cl

SIPolicy.p7b

Which Application Guard settings need to be configured so that any non-corporate approved resources can be accessed using Application Guard?

Network Isolation

Which of the following web browsers does Application Guard support? (Select two.)

Edge
Internet Explorer

Which Application Guard mode allows users to manage their own device settings?

Standalone

Where would you go on the computer system to enable Application Guard in Standalone mode?

Control Panel

Which of the following PowerShell commands enable Application Guard in Standalone mode?

Enable-WindowsOptionalFeature -online -FeatureName Windows-Defender-ApplicationGuard

Which tool can be use to enable Application Guard in Enterprise Mode?

Group Policy

Using Group Policy, you have accessed Windows Defender Application Guard's Network Isolation policy.
Which of the following settings associated with this policy turns off Network Isolation's automatic discovery of private network hosts in the domain-corpo

Subnet definitions are authoritative

You have enabled and configured Application Guard in Enterprise mode and are now configuring the Network Isolation settings. You have chosen to enable the Enterprise resource domains hosted in the cloud option and added .testout.com to the list.
What will

The site opens normally in Edge

Which type of settings needs to be configured for you to manage the implementation of Application Guard?

Application-Specific

You are trying to enable Application Guard on a system that has a 64-bit operating system and a CPU with four cores. You have received a message that your system doesn't meet the minimum hardware requirements.
Which of the following is the most likely rea

4 GB RAM

You use a Windows desktop system. You need to configure Windows Firewall to allow traffic for a newly installed application that dynamically opens multiple ports on an as-needed basis.
What should you do?

Add an exception for the application

You have a Windows system that has both wired and wireless network connections. The wired connection is on the internal private network, but the wireless connection is used for public connections.
You need to allow help desk users to use Remote Assistance

Enable the Remote Assistance exception only on the private profile

You need to change how Windows provides notifications when the firewall blocks a new program.
Click the links that you would choose to make this change. (Select two.)

Change notification settings
Turn Windows Defender Firewall on or off

Allows you to create rules based on ports

Windows Defender Firewall with Advanced Security

Lets you add, change, or remove ports that are allowed through the firewall

Allowed apps

Allows you to turn a firewall on or off for specific people on the network

Firewall and Network protection

Allows you to create rules based on authentication

Windows Defender Firewall with Advanced Security

The main interface and starting point for the other two interfaces

Firewall and Network Protection

You have installed a new Windows 10 system, and you have not changed the default configuration of the Windows Firewall.
How will the Windows Firewall handle inbound traffic that was initiated from an external server that a hacker is using to spread a worm

All such traffic is blocked by default

You have installed a new Windows system, and you have not changed the default configuration of the Windows Firewall.
How will the Windows Firewall handle inbound responses to requests sent from the local system?

All such traffic is blocked by default

Which of the following predefined exceptions in Windows Firewall allows users to view and control remote desktops?

Remote Assistance

Which statements are true regarding firewalls? (Select two.)

Host-based firewalls are implemented using software and reside on the individual hosts within the network
Network firewalls are typically implemented using hardware and positioned at the network's perimeter

With a Windows firewall, which option best describes the role of the access control list?

Permits or denies network traffic through a firewall

When should you disable the Windows firewall?

Only when the computer is protected by a different firewall program

Your corporate security policy states that a specific connection-oriented application must be blocked from accessing the internet. You must use Windows Firewall with Advanced Security to complete the task.
What should you do?

Create an outbound rule blocking the corresponding TCP port on each machine.

You have a notebook system that is used both on public networks and on your private company network.
The private network contains FTP servers that hold sensitive data. To protect the data, you need to ensure that the computer can connect to FTP servers on

In Windows Firewall with Advanced Security, create a new rule

You use a Windows system that is a member of a domain. The computer is used by several different users belonging to different groups.
You have a custom application on the computer, and you want to configure the firewall as follows:
Allow a specific port u

Add an outbound rule. Require only secure connections for the rule, and add the Sales group to the list of authorized groups.

You manage several Windows systems that are connected to the network as shown. Both Comp1 and Comp2 are configured to use static IP addresses.
To test the connection between the computers, you enter ping 192.168.23.38 on Comp1's Command Prompt; however, t

Permit ICMPv4 traffic through the firewalls of both computers.

Permit ICMPv4 traffic through the firewalls of both computers.

In Windows Firewall with Advanced Security, configure logging for the public profile.

Which of the following best describes IPsec?

Is used to secure IP communication between network hosts.

When setting up a connection security rule, which authentication method requires both computers to be in the same Active Directory forest?

Kerberos

You need to create an exception in a Windows 10 workstation's firewall that will allow externally initiated Remote Desktop sessions through. You want to do this from within a PowerShell session.
Which command should you use?

New-NetFirewallRule -DisplayName "Allow Remote Desktop" -Direction Inbound -LocalPort 3389 -Protocol TCP -Action Allow

You want to display a list of all disabled firewall rules in PowerShell.
Which command should you use?

get-netfirewallrule -Enabled False

You want to disable all outbound firewall rules using a PowerShell cmdlet.
Which command should you use?

disable-netfirewallrule -Direction Outbound