Microsoft 70-697 Practice Test

A company has 100 client computers that run Windows 10 Enterprise. A new company policy requires that all client computers have static IPv6 addresses. You need to assign static IPv6 addresses to the client computers. Which Network Shell (netsh) command should you run?
Add address
Set interface
Set global
Set address
Refer to the diagram.
 
Screenshot-3
Screenshot-3
 
If a user is logged into the computer, and an update requires a restart, the computer will:
Restart when the user signs out.
Restart within a maximum delay of 3 hours.
Restart within a maximum delay of 3 days.
Refer to the diagram
Screenshot-3
Screenshot-3
 
Windows updates will be downloaded from:
 
Windows Server Update Services only.
Microsoft Windows Update Servers only.
Windows Server Update Services and Microsoft Windows Update Servers.
You deploy several tablet PCs that run Windows 10 Enterprise. You need to minimize power usage when the user presses the sleep button. What should you do?
In Power Options, configure the sleep button setting to Sleep.
In Power Options, configure the sleep button setting to Hibernate.
Configure the active power plan to set the system cooling policy to passive.
Disable the C-State control in the computer’s BIOS.
You have a computer named Computer1 that runs Windows 10 Enterprise. Computer1 is configured to receive Windows updates from the Internet. If a user is logged on to Computer1, you need to prevent Computer1 from automatically restarting without the logged on user’s consent after the installation of the Windows updates. What should you do?
Enable the Defer upgrades setting.
Edit the Automatic App Update scheduled task.
Configure the Choose how updates are delivered setting.
Configure the Choose how updates are installed setting.
Your network contains an Active Directory domain named contoso.com. The domain contains Windows 10 Enterprise client computers. Your company has a subscription to Microsoft Office 365. Each user has a mailbox that is stored in Office 365 and a user account in the contoso.com domain. Each mailbox has two email addresses. You need to add a third email address for each user. What should you do?
From Active Directory Users and Computers, modify the E-mail attribute for each user.
From Microsoft Azure Active Directory Module for Windows PowerShell, run the SetMailbox cmdlet.
From Active Directory Domains and Trust, add a UPN suffix for each user.
From the Office 365 portal, modify the Users settings of each user.
You have a client Windows 10 Enterprise computer. The computer is joined to an Active Directory domain. The computer does not have a Trusted Platform Module (TPM) chip installed. You need to configure BitLocker Drive Encryption (BitLocker) on the operating system drive. Which Group Policy object (GPO) setting should you configure?
Allow access to BitLocker-protected fixed data drives from earlier version of Windows.
Require additional authentication at startup.
Allow network unlock at startup.
Configure use of hardware-based encryption for operating system drives.
You have an Active Directory domain named contoso.com that contains a deployment of Microsoft System Center 2012 Configuration Manager Service Pack 1 (SP1). You have a Microsoft Intune subscription that is synchronized to contoso.com by using the Microsoft Azure Active Directory Synchronization Tool (DirSync.) You need to ensure that you can use Configuration Manager to manage the devices that are registered to your Microsoft Intune subscription. Which two actions should you perform? Each correct answer presents a part of the solution.
In Microsoft Intune, create a new device enrollment manager account.
Install and configure Azure Active Directory Synchronization Services (AAD Sync.)
In Microsoft Intune, configure an Exchange Connector.
In Configuration Manager, configure the Microsoft Intune Connector role.
In Configuration Manager, create the Microsoft Intune subscription.
You support Windows 10 Enterprise computers that are members of an Active Directory domain. Recently, several domain user accounts have been configured with supermandatory user profiles. A user reports that she has lost all of her personal data after a computer restart. You need to configure the user’s computer to prevent possible user data loss in the future. What should you do?
Remove the .man extension from the user profile name.
Configure Folder Redirection by using the domain group policy.
Configure the user’s documents library to include folders from network shares.
Add the .dat extension to the user profile name.
You have a network that contains Window 10 Enterprise computers. The network configuration of one of the computers is shown in the following output.
 
Screenshot4
Screenshot4
 
The computer has obtained [answer] from a DHCP server.
Only the IPv4 configuration.
Only the IPv6 configuration.
The IPv4 and IPv6 configurations.
You have a network that contains Window 10 Enterprise computers. The network configuration of one of the computers is shown in the following output.
 
Screenshot4
Screenshot4
 
The computer [answer choice] access the Internet.
Will be unable to
Will use 10.1.1.1 to
Will use fe80::224::1ff:fedf:699f
You have a network that contains Window 10 Enterprise computers. The network configuration of one of the computers is shown in the following output.
Screenshot5
Screenshot5
 
UserA is a member of both the Everyone group and the Marketing group. UserA must access C:\Marketing from across the network. You need to identify the effective permissions of UserA to the C:\Marketing folder. What permission should you identify?
Full Control
Read and Execute
Read
Modify
You manage Microsoft Intune for a company named Contoso. Intune client computers run Windows 10 Enterprise. You notice that there are 25 mandatory updates listed in the Intune administration console. You need to prevent users from receiving prompts to restart Windows following the installation of mandatory updates. Which policy template should you use?
Microsoft Intune Agent Settings
Windows Configuration Policy
Microsoft Intune Center Settings
Windows Custom Policy (Windows 10 and Windows 10 Mobile)
You have a Windows 10 Enterprise computer named Computer1 that has the Hyper-V feature installed. Computer1 hosts a virtual machine named VM1. VM1 runs Windows 10 Enterprise. VM1 connects to a private virtual network switch. From Computer1, you need to remotely execute Windows PowerShell cmdlets on VM1. What should you do?
Run the winrm.exe command and specify the –s parameter.
Run the Powershell.exe command and specify the –Command parameter.
Run the Receive-PSSession cmdlet and specify the –Name parameter.
Run the Invoke-Command cmdlet and specify the –VMName parameter.
Employees are permitted to bring personally owned portable Windows 10 Enterprise computers to the office. They are permitted to install corporate applications by using the management infrastructure agent and access corporate email by using the Mail app. An employee’s personally owned portable computer is stolen. You need to protect the corporate applications and email messages on the computer. Which two actions should you perform? Each correct answer presents part of the solution.
Prevent the computer from connecting to the corporate wireless network.
Change the user’s password.
Disconnect the computer from the management infrastructure.
Initiate a remote wipe.
A company has Windows 10 Enterprise client computers. The client computers are connected to a corporate private network. Users are currently unable to connect from their home computers to their work computers by using Remote Desktop. You need to ensure that users can remotely connect to their office computers by using Remote Desktop. Users must not be able to access any other corporate network resource by using the local Windows installation from their home computers. Which setting should you configure on the home computers?
Virtual Private Network connection
Remote Desktop local resources
Direct Access connection
Remote Desktop Gateway IP address
You administer Windows 10 Enterprise desktop computers that are members of an Active Directory domain. You want to create an archived copy of user profiles that are stored on the desktops. You create a standard domain user account to run a backup task. You need to grant the backup task user account access to the user profiles. What should you do?
Add the backup task account to the Remote Management Users group on a domain controller.
Add the backup task account to the Backup Operators group on every computer.
Add the backup task account to the Backup Operators group on a domain controller.
Set the backup task account as NTFS owner on all the profiles.
You have a computer named Computer1 that runs Windows 10 Enterprise. Computer1 is a member of an Active Directory domain named contoso.com. You have a line-of-business universal app named App1. App1 is developed internally. You need to ensure that you can run App1 on Computer1. The solution must meet the following requirements: ✑ Minimize costs to deploy the app. ✑ Minimize the attack surface on Computer1. What should you do?
Have App1 certified by the Windows Store.
Sign App1 with a certificate issued by a third-party certificate authority.
From the Update & Security setting on Computer1, enable the Sideload apps setting.
Run the Add-AppxProvisionedPackage cmdlet.
You are an IT consultant for small and mid-sized business. One of your clients wants to start using Virtual Smart Cards on its Windows 10 Enterprise laptops and tablets. Before implementing any changes, the client wants to ensure that the laptops and tablets support Virtual Smart Cards. You need to verify that the client laptops and tablets support Virtual Smart Cards. What should you do?
Ensure that each laptop and tablet has a Trusted Platform Module (TPM) chip of version 1.2 or greater.
Ensure that BitLocker Drive Encryption is enabled on a system drive of the laptops and tablets.
Ensure that each laptop and tablet can read a physical smart card.
Ensure that the laptops and tablets are running Windows 10 Enterprise edition.
You support Windows 10 Enterprise computers. Your company has started testing Application Virtualization (App-V) applications on several laptops. You discover that the App-V applications are available to users even when the laptops are offline. You need to ensure that the App-V applications are available to users only when they are connected to the company network. What should you do?
Change user permissions to the App-V applications.
Disable the Disconnected operation mode.
Configure mandatory profiles for laptop users.
Reset the App-V client FileSystem cache.
You are a system administrator for a department that has Windows 10 Enterprise computers in a domain configuration. You deploy an application to all computers in the domain. You need to use group policy to restrict certain groups from running the application. What should you do?
Set up DirectAccess.
Configure AppLocker.
Disable BitLocker.
Run the User State Management Tool.
You have a Microsoft Intune subscription. You have three security groups named Security1, Security2 and Security3. Security1 is the parent group of Security2. Security2 has 100 users. You need to change the parent group of Security2 to be Security3. What should you do first?
Edit the properties of Security1.
Edit the properties of Security2.
Delete security2.
Remove all users from Security2.
You have a computer named Computer1 that runs Windows 10 Enterprise. You add a 1 TB hard drive and create a new volume that has the drive letter D. You need to limit the amount of space that each user can consume on D: to 200 GB. Members of the Administrators group should have no limit. Which three actions should you perform? Each correct answer presents part of the solution.
Run fsutil quota violations D:.
Enable the Deny disk space to users exceeding quota limit setting.
Enable the Enable Quota Management setting.
Set a default quota limit.
Run convert D: /FS:NTFS.
Add a quota entry.
You administer a Windows 10 Enterprise computer. The computer has File History turned on, and system protection turned on for drive C. You accidentally delete a folder named Libraries\Customers by using the Shift+Delete keyboard shortcut. You need to restore the most recent version of the folder to its original location. Which approach should you use to restore the folder?
Recycle Bin
The latest restore point
File History
A manually selected restore point
You administer a Windows 10 Enterprise computer that runs Hyper-V. The computer hosts a virtual machine with multiple snapshots. The virtual machine uses one virtual CPU and 512 MB of RAM. You discover that the virtual machine pauses automatically and displays the state as paused-critical. You need to identify the component that is causing the error. Which component should you identify?
No virtual switch defined
Insufficient memory
Insufficient hard disk space
Insufficient number of virtual processors
You have a computer named Computer1 that runs Windows 10 Enterprise. You plan to install the most recent updates to Computer1. You need to ensure that you can revert to the current state of Computer1 in the event that the computer becomes unresponsive after the update. What should you include in your solution?
The Reset this PC option from the Recovery section of the Settings app
The Sync your settings options from the Accounts section of the Settings app
The Backup and Restore (Windows 7) control panel item
The Refresh your PC option from the PC Settings
You purchase a new Windows 10 Enterprise desktop computer. You have four external USB hard drives. You want to create a single volume by using the four USB drives. You want the volume to be expandable, portable and resilient in the event of failure of an individual USB hard drive. You need to create the required volume. What should you do?
From Control Panel, create a new Storage Space across 4 USB hard drives. Set resiliency type to Three-way mirror.
From Control Panel, create a new Storage Space across 4 USB hard drives. Set resiliency type to Parity.
From Disk Management, create a new spanned volume.
From Disk Management, create a new striped volume.
Your Windows 10 Enterprise work computer is a member of an Active Directory domain. You use your domain account to log on to the computer. You use your Microsoft account to log on to a home laptop. You want to access Windows 10 Enterprise apps from your work computer by using your Microsoft account. You need to ensure that you are able to access the Windows 10 Enterprise apps on your work computer by logging on only once. What should you do?
Add the Microsoft account as a user on your work computer.
Enable Remote Assistance on your home laptop.
Connect your Microsoft account to your domain account on your work computer.
Install SkyDrive for Windows on both your home laptop and your work computer.
You support Windows 10 Enterprise computers that are members of an Active Directory domain. Your company policy defines the list of approved Windows Store apps that are allowed for download and installation. You have created a new AppLocker Packaged Apps policy to help enforce the company policy. You need to test the new AppLocker Packaged Apps policy before you implement it for the entire company. What should you do?
From Group Policy, enforce the new AppLocker policy in Audit Only mode.
From Group Policy, run the Group Policy Results Wizard.
From Group Policy, run the Group Policy Modeling Wizard.
From PowerShell, run the Get-AppLockerPolicy –Effective command to retrieve the AppLocker effective policy.
Your network contains an Active Directory domain named contoso.com. Contoso.com is synchronized to a Microsoft Azure Active Directory. You have a Microsoft Intune subscription. Your company plans to implement a Bring Your Own Device (BYOD) policy. You will provide users with access to corporate data from their personal iOS devices. You need to ensure that you can manage the personal iOS devices. What should you do first?
Install the Company Portal app from the Apple App Store.
Create a device enrollment manager account.
Set a DNS alias for the enrollment server address.
Configure the Intune Service to Service Connector for Hosted Exchange.
Enroll for an Apple Push Notification (APN) certificate.
You use a Windows 8.1 tablet. The tablet receives Windows Update updates automatically from the Internet. The tablet has Wi-Fi and is connected to a 3G mobile broadband Wi-Fi hot spot. You need to minimize data usage while connected to this hot spot. What should you do?
Turn on Airplane Mode.
Disable File and Print Sharing for mobile broadband connections.
Configure the interface metric of IP settings for Wi-Fi connection as 1.
Edit the Inbound Rule of Windows Firewall, and then disable Internet Control Message Protocol (ICMP) traffic.
Configure the broadband connection as a metered network.
You have a computer named Computer1 that runs Windows 10 Enterprise. You need to identify the locations that you can select as a File History drive. What are two possible locations? Each correct answer presents a complete solution?
The operating system volume
An unformatted partition
A non-system volume
A network share
You are the desktop administrator for a small company. Your workgroup environment consists of Windows 10 Enterprise computers. You want to prevent 10 help desk computers from sleeping. However, you want the screens to shut off after a certain period of time if the computers are not being used. You need to configure and apply a standard power configuration scheme for the 10 help desk computers on your network. Which two actions should you perform? Each correct answer presents part of the solution.
Import the power scheme by using POWERCFG /IMPORT on each of the remaining help desk computers. Set the power scheme to Active by using POWERCFG /S.
Use POWERCFG /X on one help desk computer to modify the power scheme to meet the requirements. Export the power scheme by using POWERCFG /EXPORT.
Use POWERCFG /S on one help desk computer to modify the power scheme to meet the requirements. Export the power scheme by using POWERCFG /EXPORT.
Import the power scheme by using POWERCFG /IMPORT on each of the remaining help desk computers. Set the power scheme to Active by using POWERCFG /X.
You support desktop computers and tablets that run Windows 8 Enterprise. All of the computers are able to connect to your company network from the Internet by using DirectAccess. Your company wants to deploy a new application to the tablets. The deployment solution must meet the following requirements: ✑ The application is able to access files stored on an internal solid-state drive (SSD) on the tablets. ✑ The application is isolated from other applications. ✑ The application uses the least amount of disk space on the tablet. You need to deploy the new application to the tablets. What should you do?
Deploy the application as an Application Virtualization (App-V) package. Install the App- V 4.6 client on the tablets.
Deploy the application as a published application on the Remote Desktop server. Create a Remote Desktop connection on the tablets.
Install the application on a local drive on the tablets.
Install the application in a Windows To Go workspace.
Install Hyper-V on tablets. Install the application on a virtual machine.
Publish the application to Windows Store.
Install the application within a separate Windows 8 installation in a virtual hard disk (VHD) file. Configure the tablets with dual boot.
Install the application within a separate Windows 8 installation in a VHDX file. Configure tablets with dual boot.
You manage a network that includes Windows 10 Enterprise computers. All of the computers on the network are members of an Active Directory domain. The company recently proposed a new security policy that prevents users from synchronizing applications settings, browsing history, favorites, and passwords from the computers with their Microsoft accounts. You need to enforce these security policy requirements on the computers. What should you do?
On the Group Policy Object, configure the Accounts: Block Microsoft accounts Group Policy setting to Users can’t add Microsoft accounts.
On the Group Policy Object, configure the Accounts: Block Microsoft accounts Group Policy setting to Users can’t add or log on with Microsoft accounts.
From each computer, navigate to Change Sync Settings and set the Sync Your Settings options for Apps, Browser, and Passwords to Off.
From each computer, navigate to Change Sync Settings and set the Sync Your Settings option to Off.
You have a Windows 10 Enterprise computer named Computer1. Computer1 has File History enabled. You create a folder named Folder1 in the root of the C: drive. You need to ensure that Folder1 is protected by File History. What are two possible ways to achieve the goal? Each correct answer presents a complete solution.
From File Explorer, include Folder1 in an existing library.
Modify the Advanced settings from the File History Control Panel item.
From the Settings app, modify the Backup options.
From File Explorer, modify the system attribute of Folder1.
A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 10 Enterprise. Some computers have a Trusted Platform Module (TPM) chip. You need to configure a single Group Policy object (GPO) that will allow Windows BitLocker Drive Encryption on all client computers. Which two actions should you perform? Each correct answer presents part of the solution.
Enable the Require additional authentication at startup policy setting.
Enable the Enforce drive encryption type on operating system drives policy setting.
Enable the option to allow BitLocker without a compatible TPM.
Configure the TPM validation profile to enable Platform Configuration Register indices (PCRs) 0, 2, 4, and 11.

You plan to deploy a Microsoft Azure RemoteApp collection by using a custom template image. The image will contain Microsoft Office 365 ProPlus apps. You need to ensure that multiple users can run Office 365 ProPlus from the custom template image simultaneously.

 

What should you include in the configuration file?

Screenshot
Screenshot
A.
B.
C.
D.
You administer Windows 10 Enterprise client computers in your company network. You change settings on a reference computer by using the Windows Firewall with AdvancedSecurity tool. You want to apply the same settings to other computers. You need to save the windows Firewall with Advanced Security configuration settings from the reference computer. You also need to be able to import the configuration settings into a Group Policy object later. What should you do?
Open Local Group Policy Editor, select the Windows Firewall with Advanced Security node, and theselect the Export Policy action.
 Run the netsh advfirewall export c:\settings.wfw command.
 Run the netsh firewall export c:\settings.xml command.
 Run the netsh advfirewall export c:\settings.xml command.
A company has Windows 10 Enterprise computers in an Active Directory Domain Services (ADDS) domain. A computer named COMPUTER1 has a shared printer named PRINTER1 installed and has Remote Desktop enabled. A user named Intern is a member of a security group named Sales. The Sales group is a member of the Remote Desktop Users group on COMPUTER1. Only the Sales group has access to PRINTER1. You need to configure COMPUTER1 to meet the following requirements: - Allow only Intern to establish Remote Desktop connections to COMPUTER1. - Allow Intern to print to PRINTER1. What should you do?
Assign Intern the Deny log on user right by using the Remote Desktop Services user right.
  Assign Intern the Deny access to this computer from the network user right. Assign the Sales group the Allow log on locally user right.
  Remove Intern from the sales group.
  Remove the Sales group from the Remote Desktop Users group and add Intern to the RemoteDesktop Users group.
You have an application named app1 installed on computer named Computer1. Computer1 runs Windows 10. App1 saves data to %UserProfile% \App1\Dat You need to ensure that you can recover the App1 data if Computer1 fails. What should you configure?
share permissions
 application control policies
 Encrypting File System (EFS) settings
  NTFS permissions
HomeGroup settings
  Microsoft OneDrive
Software restriction policies
Account policies
You are the network administrator for Contoso, Ltd. Many users have Windows 10 Enterprise laptops, and your IT department configures all of them to use BitLocker on all fixed drives. Many users carry sensitive corporate data on their USB drives. You need to enable BitLocker for these USB drives. Which key protector option should you use? 
 a smartcard
  a startup key
TPM+PIN
TPM+Password
You administer Windows 10 Enterprise client computers in your company network. A user reports that her Internet connection is slower than usual. You need to identify the Process Identifiers (PIDs) of applications that are making connections to the Internet. Which command should you run? 
netstat –an
  ipconfig /showclassid
  netstat –o
  netsh set audit-logging
  netsh show netdlls
Your network contains an Active Directory domain. The domain contains 100 computers that run Windows 10. You plan to develop a line-of-business application and to deploy the application by using Windows Store for Business. You need to ensure that users can see the private store of your company when they sign in to the Windows Store for Business. What should you do first?
Provision a Windows Dev Center dev account for each user.
  Assign the Windows Store Purchaser role to each user.
 Assign the Windows Store Admin role to each user.
 Provision a Microsoft Azure Active Directory (Azure AD) account for each user.
  Provision a Microsoft account for each user.
You have a standalone computer that runs Windows 10 Enterprise. The computer is
configured to automatically back up files by using File History. The user of the computer
uses the OneDrive desktop app to sync files. The Previous Versions settings from the local
group policy of the computer are shown in the following graphic.
 
Screenshot-29
Screenshot-29
 
If a user deletes a file from OneDrive using File Explorer, the file [answer choice]
Cannot be restored
Can be restored from onedrive.com
Can be restored by using the Previous Versions tab
You have a standalone computer that runs Windows 10 Enterprise. The computer is
configured to automatically back up files by using File History. The user of the computer
uses the OneDrive desktop app to sync files. The Previous Versions settings from the local
group policy of the computer are shown in the following graphic.
 
Screenshot-29
Screenshot-29
 
If a user deletes a local file by using File Explorer, the file [answer choice]
 
Cannot be restored
Can be restored from onedrive.com
Can be restored by using the Previous Versions tab

 A company has 10 portable client computers that run Windows 10 Enterprise. The portable client computers have the network connections described in the following table.

 
Screenshot-3
Screenshot-3
 

None of the computers can discover other computers or devices, regardless of which connection they use. You need to configure the connections so that the computers can discover other computers or devices only while connected to the CorpWired or CorpWifi connections. What should you do on the client computers?

 For the CorpWifi connection, select Yes, turn on sharing and connect to devices.
 Turn on network discovery for the Public profile.
Change the CorpWired connection to public. Turn on network discovery for the Public profile.For the HotSpot connection, select No, don't turn on sharing or connect to devices.
 For the CorpWired connection, select Yes, turn on sharing and connect to devices.
 Turn on network discovery for the Private profile.

Your company upgrades a research and development department workstation to a Windows 10 Enterprise computer. Two of the workstation's folders need to be encrypted. The folders are named \ProtectedFiles and \Backups.You attempt to encrypt the folders. The output is shown in the following exhibit.

 
Screenshot-4
Screenshot-4
 
The attempt to encrypt the ProtectedFiles folder and files [answer choice]
Succeeded for all files and folders
Succeeded for the files but not the folder
Will not finish until you run the command to clean up the disk

Your company upgrades a research and development department workstation to a Windows 10 Enterprise computer. Two of the workstation's folders need to be encrypted. The folders are named \ProtectedFiles and \Backups.You attempt to encrypt the folders. The output is shown in the following exhibit.

 
Screenshot-4
Screenshot-4
 
The attempt to encrypt the Backups folder and files [answer choice]
Failed to encrypt the files and folders
Encrypted the folder but not the files
Failed to encrypt one of the files, but encrypted the folder and the other file

You have a computer that runs Windows 10 Enterprise that contains the following folders:

 
Screenshot-6
Screenshot-6
 

You have a local user named User1. User1 has read and execute permission to Folder1.You need to ensure that User1 can perform the following tasks.

- Create new files in Folder2.

- Edit all files in Folder3.

- Change the permissions of files in Folder5.

 

The solution must use the principle of least privilege. Which permissions should you assign to User1 on each folder? To answer, drag the appropriate permissions to the correct folders. Each permission may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.

 
Folder 2:
Full Control
List Folder Contents
Modify
Read
Read & Execute
Write

You have a computer that runs Windows 10 Enterprise that contains the following folders:

 
Screenshot-6
Screenshot-6
 

You have a local user named User1. User1 has read and execute permission to Folder1.You need to ensure that User1 can perform the following tasks.

- Create new files in Folder2.

- Edit all files in Folder3.

- Change the permissions of files in Folder5.

 

The solution must use the principle of least privilege. Which permissions should you assign to User1 on each folder? To answer, drag the appropriate permissions to the correct folders. Each permission may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.

 
Folder 3:
Full Control
List Folder Contents
Modify
Read
Read & Execute
Write

You have a computer that runs Windows 10 Enterprise that contains the following folders:

 
Screenshot-6
Screenshot-6
 

You have a local user named User1. User1 has read and execute permission to Folder1.You need to ensure that User1 can perform the following tasks.

- Create new files in Folder2.

- Edit all files in Folder3.

- Change the permissions of files in Folder5.

 

The solution must use the principle of least privilege. Which permissions should you assign to User1 on each folder? To answer, drag the appropriate permissions to the correct folders. Each permission may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.

 
Folder 5:
Full Control
List Folder Contents
Modify
Read
Read & Execute
Write

You are setting up a Windows 10 Enterprise computer.

 

The computer’s network connections are shown in the Network connections exhibit. (Click the Exhibit button.)

 
Screenshot-19-1
Screenshot-19-1
 

The computer’s network settings are shown in the Network Settings exhibit. (Click the Exhibit button.)

 
Screenshot-19-2
Screenshot-19-2
 

Advanced TCP/IP settings are shown in the Advanced TCP/IP Settings exhibit. (Click the Exhibit button.)

 
Screenshot-19-3
Screenshot-19-3
 

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

 

The computer is a Microsoft Hyper-V host:

Yes
No

You are setting up a Windows 10 Enterprise computer.

 

The computer’s network connections are shown in the Network connections exhibit. (Click the Exhibit button.)

 
Screenshot-19-1
Screenshot-19-1
 
 

The computer’s network settings are shown in the Network Settings exhibit. (Click the Exhibit button.)

 
Screenshot-19-2
Screenshot-19-2
 
 

Advanced TCP/IP settings are shown in the Advanced TCP/IP Settings exhibit. (Click the Exhibit button.)

 
Screenshot-19-3
Screenshot-19-3
 
 

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

 

The computer has a static IP address:

 
Yes
No

You are setting up a Windows 10 Enterprise computer.

 

The computer’s network connections are shown in the Network connections exhibit. (Click the Exhibit button.)

 
Screenshot-19-1
Screenshot-19-1
 
 

The computer’s network settings are shown in the Network Settings exhibit. (Click the Exhibit button.)

 
Screenshot-19-2
Screenshot-19-2
 
 

Advanced TCP/IP settings are shown in the Advanced TCP/IP Settings exhibit. (Click the Exhibit button.)

 
Screenshot-19-3
Screenshot-19-3
 
 

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

 

The computer is a Microsoft Hyper-V virtual machine:

Yes
No

You manage 50 computers that run Windows 10 Enterprise. You have a Windows To Go workspace installed on a USB drive named USB1.You need to configure USB1 to meet the following requirements:

- When you run Windows To Go from USB1, you can see the contents of the computer’s internal drives from File Explorer.

- When you connect USB1 to a computer that runs Windows 10, you can automatically view the content of USB1 from File Explorer.

 

In the table below, select the action that must be performed to achieve each requirement.

 
Screenshot-24
Screenshot-24
 
When you run Windows To Go from USB1, you can see the contents of the computer's internal drives from File Explorer: 
From DiskPart, configure the san policy option
From DiskPart, configure the attributes volume option
From DiskPart, configure the attributes disk option
From fsutil, configure the volume option
From fsutil, configure the behavior option

You manage 50 computers that run Windows 10 Enterprise. You have a Windows To Go workspace installed on a USB drive named USB1.You need to configure USB1 to meet the following requirements:

- When you run Windows To Go from USB1, you can see the contents of the computer’s internal drives from File Explorer.

- When you connect USB1 to a computer that runs Windows 10, you can automatically view the content of USB1 from File Explorer.

 

In the table below, select the action that must be performed to achieve each requirement.

 
Screenshot-24
Screenshot-24
 
When you connect USB1 to a computer that runs Windows 10, you can automatically view the content of USB1 from File Explorer: 
From DiskPart, configure the san policy option
From DiskPart, configure the attributes volume option
From DiskPart, configure the attributes disk option
From fsutil, configure the volume option
From fsutil, configure the behavior option

You administer Windows 10 Enterprise computers in your company network, including a computer named Wst1. Wst1 is configured with multiple shared printerqueues.Wst1 indicates hardware errors. You decide to migrate the printer queues from Wst1 to a new computer named Client1.You export the printers on Wst1 to a file. You need to import printers from the file to Client1.From the Print Management console, which Print Management node should you select? To answer, select the appropriate node in the answer area.

 

Screenshot-28

Screenshot-28

Print Management
All Printers (8)
All Drivers (7)
Printers Not Ready
Printers With Jobs
Client1 (local)
Drivers
Forms
Ports
Printers

You have a Windows 10 Enterprise computer. The computer has a shared folder named \Marketing. The shared folder is on an NTFS volume. The current NTFS and share permissions are configured as follows.

 
Screenshot-31
Screenshot-31
 

UserA is a member of both the Everyone group and the Marketing group. UserA must access \Marketing from across the network. You need to identify the effective permissions of UserA to the \Marketing folder.

 

What permission should you identify?

 
Full Control
Read and Execute
Read
Modify

You have a desktop computer and a tablet that both run Windows 10 Enterprise. The desktop computer is located at your workplace and is a member of an Active Directory domain. The network contains an Application Virtualization (App-V) infrastructure. Several App-V applications are deployed to all desktop computers.

 

The tablet is located at your home and is a member of a workgroup. Both locations have Internet connectivity. You need to be able to access all applications that run on the desktop computer from you tablet. Which actions should you perform on each computer? 

Screenshot-32
Screenshot-32
 
Desktop computer:
 
 
Enable Remote Assistance
Install Client Hyper-V
Install the Application Virtualization (App-V) Client
Deploy Application Virtualization (App-V) packages
Run the Remote Desktop Client
Enable Remote Desktop

You have a desktop computer and a tablet that both run Windows 10 Enterprise. The desktop computer is located at your workplace and is a member of an Active Directory domain. The network contains an Application Virtualization (App-V) infrastructure. Several App-V applications are deployed to all desktop computers.

 

The tablet is located at your home and is a member of a workgroup. Both locations have Internet connectivity. You need to be able to access all applications that run on the desktop computer from you tablet. Which actions should you perform on each computer? 

Screenshot-32
Screenshot-32
 
Tablet:
Enable Remote Assistance
Install Client Hyper-V
Install the Application Virtualization (App-V) Client
Deploy Application Virtualization (App-V) packages
Run the Remote Desktop Client
Enable Remote Desktop

You manage 50 computers that run Windows 10 Enterprise. You have a Microsoft Azure RemoteApp deployment. The deployment consists of a hybrid collection named Collection1. All computers have the Hyper-V feature installed and have a virtual machine that runs Windows 7. You plan to install applications named App1 and App2 and make them available to all users. App1 is a 32-bit application. App2 is a 64-bit application. You need to identify the installation method for each application. The solution needs to minimize the number of installations. Which deployment method should you identify for each application? To answer, drag the appropriate deployment methods to the correct applications. Each deployment method may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.

Screenshot-34
Screenshot-34
 
App 1 Deployment method: 
Azure RemoteApp
Client Hyper-V
Local installation

You manage 50 computers that run Windows 10 Enterprise. You have a Microsoft Azure RemoteApp deployment. The deployment consists of a hybrid collection named Collection1. All computers have the Hyper-V feature installed and have a virtual machine that runs Windows 7. You plan to install applications named App1 and App2 and make them available to all users. App1 is a 32-bit application. App2 is a 64-bit application. You need to identify the installation method for each application. The solution needs to minimize the number of installations. Which deployment method should you identify for each application? To answer, drag the appropriate deployment methods to the correct applications. Each deployment method may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.

Screenshot-34
Screenshot-34
 
App 1 Deployment method: 
Azure RemoteApp
Client Hyper-V
Local installation

You have a server that runs Windows Server 2012 R2 server named Server1. Server1 has Remote Desktop Services (RDS) installed. You create a sessioncollection named Session1 and publish a RemoteApp in Session1.Server1 has an application named App1. The executable for App1 is \Apps\App1.exe.You need to ensure that App1 is available as a RemoteApp in Session1.What command should you run?

Screenshot-36

Screenshot-36

[First paramater]:

 

Get-RDRemoteApp
New-RDRemoteApp
Set-RDRemoteApp
Set-RDSessionCollectionConfiguration

You have a server that runs Windows Server 2012 R2 server named Server1. Server1 has Remote Desktop Services (RDS) installed. You create a sessioncollection named Session1 and publish a RemoteApp in Session1.Server1 has an application named App1. The executable for App1 is \Apps\App1.exe.You need to ensure that App1 is available as a RemoteApp in Session1.What command should you run?

Screenshot-36

Screenshot-36

NewRDRemoteApp [second paramater]:

 

-CollectionName
-InformationVariable
-UserGroup

You have a server that runs Windows Server 2012 R2 server named Server1. Server1 has Remote Desktop Services (RDS) installed. You create a sessioncollection named Session1 and publish a RemoteApp in Session1.Server1 has an application named App1. The executable for App1 is \Apps\App1.exe.You need to ensure that App1 is available as a RemoteApp in Session1.What command should you run?

Screenshot-36

Screenshot-36

NewRDRemoteApp -CollectionName "Session1" -DisplayName "App1" [third paramater] "C:\Apps\App1.exe"

 

-FilePath
-FileVirtualPath
-RequiredCommandLine
-ShowInWebAccess

You plan to use a Group Policy to configure the power settings of several laptops. You need to ensure that the laptops meet the following requirements:

- Enter hibernation mode when the lid is closed.

 

Which two Power Management Group Policy settings should you modify? To answer, select the appropriate settings

Screenshot-40
Screenshot-40
Button Settings
Hard Disk Settings
Notification Settings
Sleep Settings
Video and Display Settings

You plan to use a Group Policy to configure the power settings of several laptops. You need to ensure that the laptops meet the following requirements:

- Enter sleep mode when the battery level is critical.

 

Which two Power Management Group Policy settings should you modify? To answer, select the appropriate settings

Screenshot-40
Screenshot-40
Button Settings
Hard Disk Settings
Notification Settings
Sleep Settings
Video and Display Settings

You have an image of Windows 10 Enterprise named Image1. Image1 has version number 1.0.0.0 of a custom, line-of-business universal app named App1.You deploy Image1 to Computer1 for a user named User1. You need to update App1 to version 1.0.0.1 on Computer1 for User1 only. What command should you run?

 
Screenshot-47
Screenshot-47
 
[paramater 1] 
Add-AppxPackage
Add-AppxProvisionedPackage
Set-AppxProvisionedDataFile

You have an image of Windows 10 Enterprise named Image1. Image1 has version number 1.0.0.0 of a custom, line-of-business universal app named App1.You deploy Image1 to Computer1 for a user named User1. You need to update App1 to version 1.0.0.1 on Computer1 for User1 only. What command should you run?

 
Screenshot-47
Screenshot-47
 
Add-AppxPackage [paramater2] 
-dependancypath
-MainPackage
-path

You manage a Microsoft Azure RemoteApp deployment. The deployment consists of a cloud collection named CloudCollection1 and a hybrid collection named HybridCollection1. Both collections reside in a subscription named Subscription1. Subscription1 contains two Active Directory instances named AzureAD1 and AzureAD2. AzureAD1 is the associated directory ofSubcsription1. AzureAD1 is synchronized to an on-premises Active Directory forest named constoso.com. Passwords are synchronized between AzureAD1 and the on-premises Active Directory. You have the following user accounts:

 
Screenshot-50
Screenshot-50
 

You need to identify to which collections each user can be assigned access.What should you identify? To answer, select the appropriate options in the answer area.

 

User1:

None
CloudCollection1 only
HybridCollection1 only
CloudCollection1 and HybridCollection1

You manage a Microsoft Azure RemoteApp deployment. The deployment consists of a cloud collection named CloudCollection1 and a hybrid collection named HybridCollection1. Both collections reside in a subscription named Subscription1. Subscription1 contains two Active Directory instances named AzureAD1 and AzureAD2. AzureAD1 is the associated directory ofSubcsription1. AzureAD1 is synchronized to an on-premises Active Directory forest named constoso.com. Passwords are synchronized between AzureAD1 and the on-premises Active Directory. You have the following user accounts:

 
Screenshot-50
Screenshot-50
 
 

You need to identify to which collections each user can be assigned access.What should you identify? To answer, select the appropriate options in the answer area.

 

User2:
None
CloudCollection1 only
HybridCollection1 only
CloudCollection1 and HybridCollection1

You manage a Microsoft Azure RemoteApp deployment. The deployment consists of a cloud collection named CloudCollection1 and a hybrid collection named HybridCollection1. Both collections reside in a subscription named Subscription1. Subscription1 contains two Active Directory instances named AzureAD1 and AzureAD2. AzureAD1 is the associated directory ofSubcsription1. AzureAD1 is synchronized to an on-premises Active Directory forest named constoso.com. Passwords are synchronized between AzureAD1 and the on-premises Active Directory. You have the following user accounts:

 
Screenshot-50
Screenshot-50
 
 

You need to identify to which collections each user can be assigned access.What should you identify? To answer, select the appropriate options in the answer area.

 

User3:

 
None
CloudCollection1 only
HybridCollection1 only
CloudCollection1 and HybridCollection1
You have a Windows 10 Enterprise computer. You have a 1-terabyte external hard drive. You purchase a second 1-terabyte external hard drive. You need to create a fault-tolerant volume that includes both external hard drives. You also need to ensure that additional external hard drives can be added to the volume. Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.
 
Screenshot-23
Screenshot-23
 
What is step 1?
Restore your data from the backup
From Storage Spaces, create a new storage pool. Set the Resiliency Type to two-way mirror.
From Storage Spaces, create a new storage pool. Set the Resiliency Type to parity.
From Storage Spaces, create a new storage pool. Set the Resiliency Type to three-way mirror.
Back up the existing data on your original external hard drive.
From Disk Management, create and format a new volume on the second external drive.
From Disk Management, create a mirrored volume containing the two external drives.
You have a Windows 10 Enterprise computer. You have a 1-terabyte external hard drive. You purchase a second 1-terabyte external hard drive. You need to create a fault-tolerant volume that includes both external hard drives. You also need to ensure that additional external hard drives can be added to the volume. Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.
 
Screenshot-23
Screenshot-23
 
What is step 2?
Restore your data from the backup
From Storage Spaces, create a new storage pool. Set the Resiliency Type to two-way mirror.
From Storage Spaces, create a new storage pool. Set the Resiliency Type to parity.
From Storage Spaces, create a new storage pool. Set the Resiliency Type to three-way mirror.
Back up the existing data on your original external hard drive.
From Disk Management, create and format a new volume on the second external drive.
From Disk Management, create a mirrored volume containing the two external drives.
You have a Windows 10 Enterprise computer. You have a 1-terabyte external hard drive. You purchase a second 1-terabyte external hard drive. You need to create a fault-tolerant volume that includes both external hard drives. You also need to ensure that additional external hard drives can be added to the volume. Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.
 
Screenshot-23
Screenshot-23
 
What is step 3?
Restore your data from the backup
From Storage Spaces, create a new storage pool. Set the Resiliency Type to two-way mirror.
From Storage Spaces, create a new storage pool. Set the Resiliency Type to parity.
From Storage Spaces, create a new storage pool. Set the Resiliency Type to three-way mirror.
Back up the existing data on your original external hard drive.
From Disk Management, create and format a new volume on the second external drive.
From Disk Management, create a mirrored volume containing the two external drives.

You plan to deploy a Microsoft Azure RemoteApp collection by using a custom template image. The image will contain Microsoft Word and Excel Office 365ProPlus programs. You need to install the Word and Excel programs. The solution must minimize the amount of Internet traffic used during installation. Which four actions should you perform in sequence?

 
Screenshot-37
Screenshot-37
 
Step 1:
Download the Office Deployment Tool.
Modify the Click-to-Run for Office 365 Configuration.xml file.
Run setup.exe /configure.
Download the Office365 Deployment Readiness Tool.
Run setup.exe /packager.
Run setup.exe /download.

You plan to deploy a Microsoft Azure RemoteApp collection by using a custom template image. The image will contain Microsoft Word and Excel Office 365ProPlus programs. You need to install the Word and Excel programs. The solution must minimize the amount of Internet traffic used during installation. Which four actions should you perform in sequence?

 
Screenshot-37
Screenshot-37
 
Step 2:
Download the Office Deployment Tool.
Modify the Click-to-Run for Office 365 Configuration.xml file.
Run setup.exe /configure.
Download the Office365 Deployment Readiness Tool.
Run setup.exe /packager.
Run setup.exe /download.

You plan to deploy a Microsoft Azure RemoteApp collection by using a custom template image. The image will contain Microsoft Word and Excel Office 365ProPlus programs. You need to install the Word and Excel programs. The solution must minimize the amount of Internet traffic used during installation. Which four actions should you perform in sequence?

 
Screenshot-37
Screenshot-37
 
Step 4:
Download the Office Deployment Tool.
Modify the Click-to-Run for Office 365 Configuration.xml file.
Run setup.exe /configure.
Download the Office365 Deployment Readiness Tool.
Run setup.exe /packager.
Run setup.exe /download.

You plan to deploy a Microsoft Azure RemoteApp collection by using a custom template image. The image will contain Microsoft Word and Excel Office 365ProPlus programs. You need to install the Word and Excel programs. The solution must minimize the amount of Internet traffic used during installation. Which four actions should you perform in sequence?

 
Screenshot-37
Screenshot-37
 
Step 4:
Download the Office Deployment Tool.
Modify the Click-to-Run for Office 365 Configuration.xml file.
Run setup.exe /configure.
Download the Office365 Deployment Readiness Tool.
Run setup.exe /packager.
Run setup.exe /download.

You manage Microsoft Intune for a company named Contoso. You have an administrative computer named Computer1 that runs Windows 10 Enterprise. You need to add a Windows Store universal app named App1 to the Company Portal Apps list for all users. Which three actions should you perform in sequence?

 

Screenshot-48

Screenshot-48

 

Step 1:

From the Microsoft Intune administrative console, manage the deployment settings of App1.
Log on to Computer1 by using your domain account.
On Computer1, run the Add Software - Microsoft Intune Software Publisher Wizard.
From Windows Store, install App1 on Computer1.
Log on to Computer1 by using the built-in Administrator account.

You manage Microsoft Intune for a company named Contoso. You have an administrative computer named Computer1 that runs Windows 10 Enterprise. You need to add a Windows Store universal app named App1 to the Company Portal Apps list for all users. Which three actions should you perform in sequence?

 

Screenshot-48

Screenshot-48

 

Step 2:

From the Microsoft Intune administrative console, manage the deployment settings of App1.
Log on to Computer1 by using your domain account.
On Computer1, run the Add Software - Microsoft Intune Software Publisher Wizard.
From Windows Store, install App1 on Computer1.
Log on to Computer1 by using the built-in Administrator account.

You manage Microsoft Intune for a company named Contoso. You have an administrative computer named Computer1 that runs Windows 10 Enterprise. You need to add a Windows Store universal app named App1 to the Company Portal Apps list for all users. Which three actions should you perform in sequence?

 

Screenshot-48

Screenshot-48

 

Step 3:

From the Microsoft Intune administrative console, manage the deployment settings of App1.
Log on to Computer1 by using your domain account.
On Computer1, run the Add Software - Microsoft Intune Software Publisher Wizard.
From Windows Store, install App1 on Computer1.
Log on to Computer1 by using the built-in Administrator account.
A company has client computers that run Windows 10. The client computer systems frequently use IPSec tunnels to securely transmit data. You need to configure the IPSec tunnels to use 256-bit encryption keys. Which encryption type should you use?
3DES
DES
RSA
AES
You administer a group of 10 client computers that run Windows 10. The client computers are members of a local workgroup. Employees log on to the client computers by using their Microsoft accounts. The company plans to use Windows BitLocker Drive Encryption. You need to back up the BitLocker recovery key. Which two options can you use? (Each correct answer presents a complete solution. Choose two.)
Save the recovery key to a file on the BitLocker-encrypted drive.
Save the recovery key in the Credential Store.
Save the recovery key to OneDrive.
Print the recovery key.
You are using sysprep to prepare a system for imaging. You want to reset the security ID (SID) and clear the event logs. Which option should you use?
/generalize
/oobe
/audit
/unattend
Group Policy is a set of rules which control the working environment of user accounts and computer accounts. Group Policy provides the centralized management and configuration of operating systems, applications and users’ settings in an Active Directory environment. http://www.gratisexam.com/ In other words, Group Policy in part controls what users can and can’t do on a computer system. Which one of these policies requires a reboot?
Turn off Windows Defender
Turn off Autoplay for non-volume devices
Disable Active Desktop
Turn off Data Execution Prevention for Explorer
Which term is used to refer to installing apps directly to a device without going through the Windows Store?
SQL Injection
BranchCache
DLL Hijack
Sideloading
You have a desktop computer that runs Windows 8 Enterprise. You add three new 3-terabyte disks. You need to create a new 9-terabyte volume. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
From Disk Management, create a new spanned volume.
From Disk Management, convert all of the 3-terabyte disks to GPT.
From PowerShell, run the New-VirtualDisk cmdlet.
From Disk Management, bring all disks offline.
From Diskpart, run the Convert MBR command.
From PowerShell, run the Add-PhysicalDisk cmdlet.
At home, you use a Windows 10 desktop computer. At work, you use a Windows 10 laptop that is connected to a corporate network. You use the same Microsoft account to log on to both computers. You have a folder with some personal documents on your desktop computer. The folder must be available and synced between both computers. You need to ensure that the latest version of these files is available. What should you do?
Create a folder by using OneDrive for Windows. Move all of the personal documents to the new folder.
Move the folder to the Libraries folder. Go to PC Settings. Under Sync your settings, enable App settings.
Right-click the folder and click Properties. Under Security, provide Full Control for the Microsoft account.
Right-click the folder and select Share With, and then select Homegroup (view and edit).
You have 100 client Windows 10 computers. Users are NOT configured as local administrators. You need to prevent the users from running applications that they downloaded from the Internet, unless the applications are signed by a trusted publisher. What should you configure in the Security settings from the Action Center?
Virus protection
User Account Control
Windows SmartScreen settings
Network Access Protection
You are a systems administrator of a small branch office. Computers in the office are joined to a Windows 8 HomeGroup. The HomeGroup includes one shared printer and several shared folders. You join a new computer to the HomeGroup and try to access the HomeGroup shared folders. You discover that the shared folders are unavailable, and you receive an error message that indicates the password is incorrect. You need to reconfigure the new computer in order to access the HomeGroup resources. What should you do?
Adjust the time settings on the new computer to match the time settings of the HomeGroup computers.
Change the HomeGroup password and re-enter it on the computers of all members of the HomeGroup.
Change the default sharing configuration for the shared folders on the HomeGroup computers.
Reset your account password to match the HomeGroup password.
Your network contains an Active Directory domain. The domain contains 100 Windows 10 client computers. All of the computers secure al connections to computers on the internal network by using IPSec. The network contains a server that runs a legacy application. The server does NOT support IPSec. You need to ensure that some of the Windows 8 computers can connect to the legacy server. The solution must ensure that all other connections are secured by using IPSec. What should you do?
Modify the settings of the Domain Profile.
Create a connection security rule.
Create an inbound firewall rule.
Modify the settings of the Private Profile,
You administer laptop and desktop computers that run Windows 8 Pro. Your company uses Active Directory Domain Services (AD DS) and Active Directory Certificate Services (AD CS). Your company decides that access to the company network for all users must be controlled by two-factor authentication. You need to configure the computers to meet this requirement. What should you do?
Install smart card readers on all computers. Issue smart cards to all users.
Enable the Password must meet complexity requirements policy setting. Instruct users to log on by using the domain \username format for their username and their strong password.
Create an Internet Protocol security (IPsec) policy that requires the use of Kerberos to authenticate all traffic. Apply the IPsec policy to the domain.
Issue photo identification to all users. Instruct all users to set up and use PIN Logon.
QUESTION 48 Your network contains an Active Directory domain and 100 Windows 10 client computers. All software is deployed by using Microsoft Application Virtualization (App-V) 5.0. Users are NOT configured as local administrators, Your company purchases a subscription to Microsoft Office 365 that includes Office 365 ProPlus. You need to create an App-V package for Office 365 ProPlus. What should you do?
Run the Office Customization Tool (OCT), run the App-V Sequencer and then run Setup /Packager.
Download the Office Deployment Tool for Click-to-Run, run the App-V Sequencer and then run Setup /Ad mm.
Download the Office Deployment Tool for Click-to-Run, run Setup /Download and then run Setup /Packager.
Run the Office Customization Tool (OCT), run Setup /Download and then run the App-V Sequencer
You administer computers that run Windows 8 Enterprise and are members of an Active Directory domain. Some volumes on the computers are encrypted with BitLocker. The BitLocker recovery passwords are stored in Active Directory. A user forgets the BitLocker password to local drive E: and is unable to access the protected volume. You need to provide a BitLocker recovery key to unlock the protected volume. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
Ask the user to run the manage-bde-protectors-disable e: command.
Ask the user for his or her logon name.
Ask the user to run the manage-bde-unlock E:-pw command.
Ask the user for his or her computer name.
Ask the user for a recovery key ID for the protected drive.
You are a systems administrator for your company. The company has employees who work remotely by using a virtual private network (VPN) connection from their computers, which run Windows 8 Pro. These employees use an application to access the company intranet database servers. The company recently decided to distribute the latest version of the application through using a public cloud. Some users report that every time they try to download the application by using Internet Explorer, they receive a warning message that indicates the application could harm their computer. You need to recommend a solution that prevents this warning message from appearing, without compromising the security protection of the computers. What should you do?
Publish the application through a public file transfer protocol (FTP) site.
Publish the application through an intranet web site.
Instruct employees to disable the SmartScreen Filter from within the Internet Explorer settings.
Publish the application to Windows Store.
Your network contains an Active Directory domain. The domain contains 100 Windows 10 client computers. All of the computers secure al connections to computers on the internal network by using IPSec. The network contains a server that runs a legacy application. The server does NOT support IPSec. You need to ensure that some of the Windows 8 computers can connect to the legacy server. The solution must ensure that all other connections are secured by using IPSec. What should you do?
Modify the settings of the Domain Profile
Create a connection security rule
Create an inbound firewall rule
Modify the settings of the Private Profile
You administer computers that run Windows 8 Enterprise in an Active Directory domain in a single Active Directory Site. All user account objects in Active Directory have the Manager attribute populated. The company has purchased a subscription to Windows Intune. The domain security groups are synchronized with the Microsoft Online directory. You create a Windows Intune group that specifies a manager as a membership criterion. You notice that the group has no members. You need to ensure that users that meet the membership criteria are added to the Windows Intune group. What should you do?
Force Active Directory replication within the domain.
Ensure that all user accounts are identified as synchronized users.
Ensure that the user who is performing the search has been synchronized with the Microsoft Online directory.
Synchronize the Active Directory Domain Service (AD DS) with the Microsoft Online directory.
You have a Windows 8.1 Enterprise client computer named Computer1. The Storage Spaces settings of Computer1 are configured as shown in the following exhibit. (Click the Exhibit button.) You plan to create a three-way mirror storage space in the storage pool and to set the size of the storage space to 50 GB. You need to identify the minimum number of disks that must be added to the storage poo! For the planned mirror. How many disks should you identify?
 
Gratis-54
Gratis-54
1
3
4
5
Your company has Windows 10 client computers. All of the computers are managed by using Windows Intune. You need to provide a user with the ability to deploy software to the computers by using Windows Intune. The solution must minimize the number of permissions assigned to the user. Which role should you use?
 
User management administrator from the Windows Intune account portal
Global administrator from the Windows Intune account portal
Service administrator from the Windows Intune administrator console
Service administrator from the Windows Intune account portal
Your company has a main office and two branch offices named Branch1 and Branch2. The main office contains a file server named Server1 that has BranchCache enabled. Branch1 contains a server named Server2 that is configured as a hosted cache server. All client computers run Windows 8 Enterprise. All of the computers are joined to an Active Directory domain. The BranchCache settings of all the computers are configured as shown in the following exhibit. (Click the Exhibit button.) In the table below, identify the effective setting for the client computers in each branch office. Make one selection in each column. Each correct selection is worth one point.
 
Gratis-B12
Gratis-B12
 
Branch1 Computers will:
Not use BranchCache
Retrieve cached content from peers
Retrieve cached content from Server1
Retrieve cached content from Server2
Your company has a main office and two branch offices named Branch1 and Branch2. The main office contains a file server named Server1 that has BranchCache enabled. Branch1 contains a server named Server2 that is configured as a hosted cache server. All client computers run Windows 8 Enterprise. All of the computers are joined to an Active Directory domain. The BranchCache settings of all the computers are configured as shown in the following exhibit. (Click the Exhibit button.) In the table below, identify the effective setting for the client computers in each branch office. Make one selection in each column. Each correct selection is worth one point.
 
Gratis-B12
Gratis-B12
 
Branch2 Computers will:
Not use BranchCache
Retrieve cached content from peers
Retrieve cached content from Server1
Retrieve cached content from Server2
You provide support for a small company. The company purchases a Windows 10 laptop for an employee who travels often. The company wants to use BitLocker to secure the hard drive for the laptop in case it is lost or stolen. While attempting to enable BitLocker, you receive the error message shown in the following image:
 
Gratis-B12(1)
Gratis-B12(1)
 
A supported configuration for BitLocker is possible on this laptop:
Yes
No
You administer computers that run Windows 8. The computers on your network are produced by various manufacturers and often require custom drivers.
 
You need to design a recovery solution that allows the repair of any of the computers by using a Windows Recovery Environment (WinRE).
 
In which order should you perform the actions?
 
Gratis-RickB30
Gratis-RickB30
 
Step 1:
 
Create a bootable WinRE Recovery media.
Extract WinRE files from the Windows Assessment and Deployment Kit (ADK).
Unmount the image file.
Add additional drivers.
Mount the WinRE image file.
Commit the changes.
You administer computers that run Windows 8. The computers on your network are produced by various manufacturers and often require custom drivers.
 
You need to design a recovery solution that allows the repair of any of the computers by using a Windows Recovery Environment (WinRE).
 
In which order should you perform the actions?
 
Gratis-RickB30
Gratis-RickB30
 
Step 2:
Create a bootable WinRE Recovery media.
Extract WinRE files from the Windows Assessment and Deployment Kit (ADK).
Unmount the image file.
Add additional drivers.
Mount the WinRE image file.
Commit the changes.
You administer computers that run Windows 8. The computers on your network are produced by various manufacturers and often require custom drivers.
 
You need to design a recovery solution that allows the repair of any of the computers by using a Windows Recovery Environment (WinRE).
 
In which order should you perform the actions?
 
Gratis-RickB30
Gratis-RickB30
 
Step 3:
Create a bootable WinRE Recovery media.
Extract WinRE files from the Windows Assessment and Deployment Kit (ADK).
Unmount the image file.
Add additional drivers.
Mount the WinRE image file.
Commit the changes.
You administer computers that run Windows 8. The computers on your network are produced by various manufacturers and often require custom drivers.
 
You need to design a recovery solution that allows the repair of any of the computers by using a Windows Recovery Environment (WinRE).
 
In which order should you perform the actions?
 
Gratis-RickB30
Gratis-RickB30
 
Step 4:
Create a bootable WinRE Recovery media.
Extract WinRE files from the Windows Assessment and Deployment Kit (ADK).
Unmount the image file.
Add additional drivers.
Mount the WinRE image file.
Commit the changes.
You administer computers that run Windows 8. The computers on your network are produced by various manufacturers and often require custom drivers.
 
You need to design a recovery solution that allows the repair of any of the computers by using a Windows Recovery Environment (WinRE).
 
In which order should you perform the actions?
 
Gratis-RickB30
Gratis-RickB30
 
Step 5:
Create a bootable WinRE Recovery media.
Extract WinRE files from the Windows Assessment and Deployment Kit (ADK).
Unmount the image file.
Add additional drivers.
Mount the WinRE image file.
Commit the changes.
You administer computers that run Windows 8. The computers on your network are produced by various manufacturers and often require custom drivers.
 
You need to design a recovery solution that allows the repair of any of the computers by using a Windows Recovery Environment (WinRE).
 
In which order should you perform the actions?
 
Gratis-RickB30
Gratis-RickB30
 
Step 6:
Create a bootable WinRE Recovery media.
Extract WinRE files from the Windows Assessment and Deployment Kit (ADK).
Unmount the image file.
Add additional drivers.
Mount the WinRE image file.
Commit the changes.
You manage Microsoft Intune for a company named Contoso. You have 200 computers that run Windows 10. The computers are Intune clients. You need to configure software updates for the clients.
 
Which policy template should you use to configure each software updates setting? To answer, drag the appropriate policy templates to the correct settings. Each policy template may be used once, more than once, or not at all.
 
Gratis-14
Gratis-14
 
Require automatic updates:
 
Microsoft Intune Agent Settings
Windows Configuration Policy
Windows Custom Policy (Windows 10 and Windows 10 Mobile)
You manage Microsoft Intune for a company named Contoso. You have 200 computers that run Windows 10. The computers are Intune clients. You need to configure software updates for the clients.
 
Which policy template should you use to configure each software updates setting? To answer, drag the appropriate policy templates to the correct settings. Each policy template may be used once, more than once, or not at all.
 
Gratis-14
Gratis-14
 
Minimum classification of updates to install automatically:
 
Microsoft Intune Agent Settings
Windows Configuration Policy
Windows Custom Policy (Windows 10 and Windows 10 Mobile)
You manage Microsoft Intune for a company named Contoso. You have 200 computers that run Windows 10. The computers are Intune clients. You need to configure software updates for the clients.
 
Which policy template should you use to configure each software updates setting? To answer, drag the appropriate policy templates to the correct settings. Each policy template may be used once, more than once, or not at all.
 
Gratis-14
Gratis-14
 
Allow immediate installation of updates that do not interrupt Windows:
 
Microsoft Intune Agent Settings
Windows Configuration Policy
Windows Custom Policy (Windows 10 and Windows 10 Mobile)
You support desktop computers for a company named Fabrikam, Inc. The computers are members of the Active Directory domain named fabrikam.com.
http://www.gratisexam.com/
Fabrikam works with a supplier named Contoso, Ltd. Each company has a public key infrastructure (PKI), and no public certificate authorities (CAs) are used. Fabrikam employees regularly use a Contoso website that is hosted on a server in the contoso.com domain. The website requires SSL and mutual authentication.
 
You need to configure the computers to allow Fabrikam users to access the Contoso website without any warning prompts. You also need to use the fewest certificates possible.
 
Which certificate or certificates should you use?
 
Gratis-20
Gratis-20
 
trusted root authorities certificate store for the local computer account:
Contoso.com root certificate
No certificate required
Fabrikam root certificate
Client (user) certificate issued by Contoso
Client (user) certificate issued by Fabrikam
You support desktop computers for a company named Fabrikam, Inc. The computers are members of the Active Directory domain named fabrikam.com.
http://www.gratisexam.com/
Fabrikam works with a supplier named Contoso, Ltd. Each company has a public key infrastructure (PKI), and no public certificate authorities (CAs) are used. Fabrikam employees regularly use a Contoso website that is hosted on a server in the contoso.com domain. The website requires SSL and mutual authentication.
 
You need to configure the computers to allow Fabrikam users to access the Contoso website without any warning prompts. You also need to use the fewest certificates possible.
 
Which certificate or certificates should you use?
 
Gratis-20
Gratis-20
 
untrusted certificates store for the user's account:
Contoso.com root certificate
No certificate required
Fabrikam root certificate
Client (user) certificate issued by Contoso
Client (user) certificate issued by Fabrikam
You support desktop computers for a company named Fabrikam, Inc. The computers are members of the Active Directory domain named fabrikam.com.
http://www.gratisexam.com/
Fabrikam works with a supplier named Contoso, Ltd. Each company has a public key infrastructure (PKI), and no public certificate authorities (CAs) are used. Fabrikam employees regularly use a Contoso website that is hosted on a server in the contoso.com domain. The website requires SSL and mutual authentication.
 
You need to configure the computers to allow Fabrikam users to access the Contoso website without any warning prompts. You also need to use the fewest certificates possible.
 
Which certificate or certificates should you use?
 
Gratis-20
Gratis-20
 
personal certificate store for the local computer account:
Contoso.com root certificate
No certificate required
Fabrikam root certificate
Client (user) certificate issued by Contoso
Client (user) certificate issued by Fabrikam
You support desktop computers for a company named Fabrikam, Inc. The computers are members of the Active Directory domain named fabrikam.com.
http://www.gratisexam.com/
Fabrikam works with a supplier named Contoso, Ltd. Each company has a public key infrastructure (PKI), and no public certificate authorities (CAs) are used. Fabrikam employees regularly use a Contoso website that is hosted on a server in the contoso.com domain. The website requires SSL and mutual authentication.
 
You need to configure the computers to allow Fabrikam users to access the Contoso website without any warning prompts. You also need to use the fewest certificates possible.
 
Which certificate or certificates should you use?
 
Gratis-20
Gratis-20
 
personal certificate store for the user's account:
Contoso.com root certificate
No certificate required
Fabrikam root certificate
Client (user) certificate issued by Contoso
Client (user) certificate issued by Fabrikam
You administer Windows 10 Enterprise computers. Your company has a team of technical writers that is preparing technical manuals and help files. The team manager wants to ensure that the technical writers are able to restore any documents that been modified within the last year. You need to ensure that the technical writers can restore Microsoft Word files to any previous versions for up to one year. Which three actions should you perform in sequence?
 
Gratis-22
Gratis-22
 
Step 1:
Create a network share, configure NTFS, and then share permissions.
Turn on System Protection and create a restore point.
Turn on File History.
Configure the Keep Saved Versions setting.
You administer Windows 10 Enterprise computers. Your company has a team of technical writers that is preparing technical manuals and help files. The team manager wants to ensure that the technical writers are able to restore any documents that been modified within the last year. You need to ensure that the technical writers can restore Microsoft Word files to any previous versions for up to one year. Which three actions should you perform in sequence?
 
Gratis-22
Gratis-22
 
Step 2:
Create a network share, configure NTFS, and then share permissions.
Turn on System Protection and create a restore point.
Turn on File History.
Configure the Keep Saved Versions setting.
You administer Windows 10 Enterprise computers. Your company has a team of technical writers that is preparing technical manuals and help files. The team manager wants to ensure that the technical writers are able to restore any documents that been modified within the last year. You need to ensure that the technical writers can restore Microsoft Word files to any previous versions for up to one year. Which three actions should you perform in sequence?
 
Gratis-22
Gratis-22
 
Step 3:
Create a network share, configure NTFS, and then share permissions.
Turn on System Protection and create a restore point.
Turn on File History.
Configure the Keep Saved Versions setting.
You manage update compliance for Windows 10 desktop computers that are part of a domain. You need to configure new desktops to automatically receive updates from an intranet resource that you manage. Which three actions should you perform in sequence?
 
Gratis-23
Gratis-23
 
Step 1: 
Configure a computer group and put all Windows 8.1 desktops into the OU. Enable client-side targeting in the GPO.
On the desktop computer, run the command gpupdate/force.
Create a GPO that enables automatic updates. Configure the GPO to use an internal server as the update repository.
On the desktop, under the Update and Recovery, select Install updates automatically (recommended).
You manage update compliance for Windows 10 desktop computers that are part of a domain. You need to configure new desktops to automatically receive updates from an intranet resource that you manage. Which three actions should you perform in sequence?
 
Gratis-23
Gratis-23
 
Step 2: 
Configure a computer group and put all Windows 8.1 desktops into the OU. Enable client-side targeting in the GPO.
On the desktop computer, run the command gpupdate/force.
Create a GPO that enables automatic updates. Configure the GPO to use an internal server as the update repository.
On the desktop, under the Update and Recovery, select Install updates automatically (recommended).
You manage update compliance for Windows 10 desktop computers that are part of a domain. You need to configure new desktops to automatically receive updates from an intranet resource that you manage. Which three actions should you perform in sequence?
 
Gratis-23
Gratis-23
 
Step 3: 
Configure a computer group and put all Windows 8.1 desktops into the OU. Enable client-side targeting in the GPO.
On the desktop computer, run the command gpupdate/force.
Create a GPO that enables automatic updates. Configure the GPO to use an internal server as the update repository.
On the desktop, under the Update and Recovery, select Install updates automatically (recommended).
You work for a small company that uses Windows 10 computers. The computers are joined to a homegroup. You want to share an existing folder named Research. It is located in the Documents folder. You need to give users the ability to change the files in this folder. Which three actions should you perform in sequence?
 
Gratis-24
Gratis-24
 
Step 1:
Under Permission level, choose Read/Write.
Under Choose People to Share With, add the home group.
Right-click the Research folder.
Enable sharing of the Documents folder in the homegroup settings.
You work for a small company that uses Windows 10 computers. The computers are joined to a homegroup. You want to share an existing folder named Research. It is located in the Documents folder. You need to give users the ability to change the files in this folder. Which three actions should you perform in sequence?
 
Gratis-24
Gratis-24
 
Step 2:
Under Permission level, choose Read/Write.
Under Choose People to Share With, add the home group.
Right-click the Research folder.
Enable sharing of the Documents folder in the homegroup settings.
You work for a small company that uses Windows 10 computers. The computers are joined to a homegroup. You want to share an existing folder named Research. It is located in the Documents folder. You need to give users the ability to change the files in this folder. Which three actions should you perform in sequence?
 
Gratis-24
Gratis-24
 
Step 3:
Under Permission level, choose Read/Write.
Under Choose People to Share With, add the home group.
Right-click the Research folder.
Enable sharing of the Documents folder in the homegroup settings.
You have a Windows 8 computer. You need to migrate from Windows 8 to Windows 10 while retaining as much data as possible. You load the Windows 10 media into the DVD drive. Which three actions should you perform next in sequence?
 
Gratis-25
Gratis-25
 
Step 1:
Under installation options, choose Keep personal files.
Run the Setup.exe file from the DVD.
Enter the license key.
Under installation options, choose Windows settings.
You have a Windows 8 computer. You need to migrate from Windows 8 to Windows 10 while retaining as much data as possible. You load the Windows 10 media into the DVD drive. Which three actions should you perform next in sequence?
 
Gratis-25
Gratis-25
 
Step 2:
Under installation options, choose Keep personal files.
Run the Setup.exe file from the DVD.
Enter the license key.
Under installation options, choose Windows settings.
You have a Windows 8 computer. You need to migrate from Windows 8 to Windows 10 while retaining as much data as possible. You load the Windows 10 media into the DVD drive. Which three actions should you perform next in sequence?
 
Gratis-25
Gratis-25
 
Step 3:
Under installation options, choose Keep personal files.
Run the Setup.exe file from the DVD.
Enter the license key.
Under installation options, choose Windows settings.
You administer Windows 8 Pro computers in your company network. You discover that Sleep, Shut down and Restart are the only options available when you select the Power button as shown in the following exhibit (Click the Exhibit button.) You need to enable hibernation on the computer. Which three steps should you perform in sequence?
 
Gratis-26
Gratis-26
 
Step 1:
Change the When I press the power button menu settings.
From the Charm Bar, open Change PC Settings.
Select Don't require a password.
Select What the power button does.
You administer Windows 8 Pro computers in your company network. You discover that Sleep, Shut down and Restart are the only options available when you select the Power button as shown in the following exhibit (Click the Exhibit button.) You need to enable hibernation on the computer. Which three steps should you perform in sequence?
 
Gratis-26
Gratis-26
 
Step 2:
Change the When I press the power button menu settings.
From the Charm Bar, open Change PC Settings.
Select Don't require a password.
Select What the power button does.
You administer Windows 8 Pro computers in your company network. You discover that Sleep, Shut down and Restart are the only options available when you select the Power button as shown in the following exhibit (Click the Exhibit button.) You need to enable hibernation on the computer. Which three steps should you perform in sequence?
 
Gratis-26
Gratis-26
 
Step 3:
Change the When I press the power button menu settings.
From the Charm Bar, open Change PC Settings.
Select Don't require a password.
Select What the power button does.
You administer 50 laptops that run Windows 7 Professional 32-bit. You want to install Windows 8 Pro 64-bit on every laptop. Users will keep their own laptops. You need to ensure that user application settings, Windows settings, and user files are maintained after Windows 8 Pro is installed. Which four actions should you perform in sequence?
 
Gratis-27
Gratis-27
 
Step 1:
 
Run the Scanstate.exe c:\store / i:migdocs.xml /i:migapp.xml /v:13 /c / hardlink /nocompress command.
Copy the User State Migration Tool (USMT) files and tools to the source computer.
Run the Scanstate.exe c:\store / i:migdocs.xml /i:migapp.xml /v:13 /c command.
Install Windows 8 Pro on the existing Windows partition with no formatting or repartitioning. Install standard operating environment applications.
Run the Loadstate.exe c:\store / i:migdocs.xml /i:migapp.xml /v:13 /c / hardlink /nocompress command.
Install Windows 8 Pro by deleting all existing partitions and create a new one. Install standard operating environment applications.
You administer 50 laptops that run Windows 7 Professional 32-bit. You want to install Windows 8 Pro 64-bit on every laptop. Users will keep their own laptops. You need to ensure that user application settings, Windows settings, and user files are maintained after Windows 8 Pro is installed. Which four actions should you perform in sequence?
 
Gratis-27
Gratis-27
 
Step 2:
 
Run the Scanstate.exe c:\store / i:migdocs.xml /i:migapp.xml /v:13 /c / hardlink /nocompress command.
Copy the User State Migration Tool (USMT) files and tools to the source computer.
Run the Scanstate.exe c:\store / i:migdocs.xml /i:migapp.xml /v:13 /c command.
Install Windows 8 Pro on the existing Windows partition with no formatting or repartitioning. Install standard operating environment applications.
Run the Loadstate.exe c:\store / i:migdocs.xml /i:migapp.xml /v:13 /c / hardlink /nocompress command.
Install Windows 8 Pro by deleting all existing partitions and create a new one. Install standard operating environment applications.
You administer 50 laptops that run Windows 7 Professional 32-bit. You want to install Windows 8 Pro 64-bit on every laptop. Users will keep their own laptops. You need to ensure that user application settings, Windows settings, and user files are maintained after Windows 8 Pro is installed. Which four actions should you perform in sequence?
 
Gratis-27
Gratis-27
 
Step 3:
 
Run the Scanstate.exe c:\store / i:migdocs.xml /i:migapp.xml /v:13 /c / hardlink /nocompress command.
Copy the User State Migration Tool (USMT) files and tools to the source computer.
Run the Scanstate.exe c:\store / i:migdocs.xml /i:migapp.xml /v:13 /c command.
Install Windows 8 Pro on the existing Windows partition with no formatting or repartitioning. Install standard operating environment applications.
Run the Loadstate.exe c:\store / i:migdocs.xml /i:migapp.xml /v:13 /c / hardlink /nocompress command.
Install Windows 8 Pro by deleting all existing partitions and create a new one. Install standard operating environment applications.
You administer 50 laptops that run Windows 7 Professional 32-bit. You want to install Windows 8 Pro 64-bit on every laptop. Users will keep their own laptops. You need to ensure that user application settings, Windows settings, and user files are maintained after Windows 8 Pro is installed. Which four actions should you perform in sequence?
 
Gratis-27
Gratis-27
 
Step 4:
 
Run the Scanstate.exe c:\store / i:migdocs.xml /i:migapp.xml /v:13 /c / hardlink /nocompress command.
Copy the User State Migration Tool (USMT) files and tools to the source computer.
Run the Scanstate.exe c:\store / i:migdocs.xml /i:migapp.xml /v:13 /c command.
Install Windows 8 Pro on the existing Windows partition with no formatting or repartitioning. Install standard operating environment applications.
Run the Loadstate.exe c:\store / i:migdocs.xml /i:migapp.xml /v:13 /c / hardlink /nocompress command.
Install Windows 8 Pro by deleting all existing partitions and create a new one. Install standard operating environment applications.
You administer desktop computers that run Windows 8 Enterprise and are members of an Active Directory domain. A new security policy states that all traffic between computers in the research department must be encrypted and authenticated by using Kerberos V5. You need to configure the requested traffic authentication settings by using Windows Firewall with Advanced Settings. 
 
Gratis-28
Gratis-28
 
Which three actions should you perform in sequence?
 
Step 1:
Select Require authentication for inbound and outbound connection, and then for authentication method, select Computer (Kerberos V5).
Select Allow on app or feature through Windows Firewall.
Click to expand Inbound Rule, and then select New Rule.
Select the rule type Isolation, and then add the IP addresses of the research department computers. 
Click to expand Outbound Rule, and then select New Rule.
Click to expand Connection Security Rule, and then select New Rule.
Select the rule type Server-to-Server, and then add the IP addresses of the research department computers.
You administer desktop computers that run Windows 8 Enterprise and are members of an Active Directory domain. A new security policy states that all traffic between computers in the research department must be encrypted and authenticated by using Kerberos V5. You need to configure the requested traffic authentication settings by using Windows Firewall with Advanced Settings. 
 
Gratis-28
Gratis-28
 
Which three actions should you perform in sequence?
 
Step 2:
Select Require authentication for inbound and outbound connection, and then for authentication method, select Computer (Kerberos V5).
Select Allow on app or feature through Windows Firewall.
Click to expand Inbound Rule, and then select New Rule.
Select the rule type Isolation, and then add the IP addresses of the research department computers. 
Click to expand Outbound Rule, and then select New Rule.
Click to expand Connection Security Rule, and then select New Rule.
Select the rule type Server-to-Server, and then add the IP addresses of the research department computers.
You administer desktop computers that run Windows 8 Enterprise and are members of an Active Directory domain. A new security policy states that all traffic between computers in the research department must be encrypted and authenticated by using Kerberos V5. You need to configure the requested traffic authentication settings by using Windows Firewall with Advanced Settings. 
 
Gratis-28
Gratis-28
 
Which three actions should you perform in sequence?
 
Step 2:
Select Require authentication for inbound and outbound connection, and then for authentication method, select Computer (Kerberos V5).
Select Allow on app or feature through Windows Firewall.
Click to expand Inbound Rule, and then select New Rule.
Select the rule type Isolation, and then add the IP addresses of the research department computers. 
Click to expand Outbound Rule, and then select New Rule.
Click to expand Connection Security Rule, and then select New Rule.
Select the rule type Server-to-Server, and then add the IP addresses of the research department computers.
{"name":"Microsoft 70-697 Practice Test", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"A company has 100 client computers that run Windows 10 Enterprise. A new company policy requires that all client computers have static IPv6 addresses. You need to assign static IPv6 addresses to the client computers. Which Network Shell (netsh) command should you run?, Refer to the diagram.   Screenshot-3   If a user is logged into the computer, and an update requires a restart, the computer will:, Refer to the diagram Screenshot-3   Windows updates will be downloaded from:","img":"https://www.quiz-maker.com/3012/images/ogquiz.png"}
Powered by: Quiz Maker