1168c

Your page rank:

Total word count: 6254
Pages: 23

Calculate the Price

- -
275 words
Looking for Expert Opinion?
Let us have a look at your work and suggest how to improve it!
Get a Consultant

Which of the following passwords is considered complex?

M!croS0ft

Which of the following basic security components is used to support virtual smart cards?

Trusted Platform Module

Which of the following is introduced with Windows 10 that provides biometric authentication that uses a user’s face, iris, or fingerprint to unlock devices?

Windows Hello

Which of the following is used to find computers, users, and other resources throughout an Active Directory forest?

Global Catalog

Digital certificates, smart, picture passwords, and biometrics are used to perform which of the following actions?

Authentication

Why is a setting of 0 for maximum password age not a good idea?

It means that passwords never expire, which is a major security problem; It means that password aging has been disabled

Where are user accounts store for computers that are in a workgroup?

Security Accounts Manager

Account policies contain various subsets. Which of the following subsets of account policies?

Password Policy; Account Lockout Policy; Kerberos Policy

Which term refers to preventing people from reading information they are not authorized to read?

Confidentiality

Which protocol is responsible for the establishment of the encryption/decryption keys and algorithm in a TLS connection?

TLS Handshake protocol

Which of the following steps begins the process of modifying the default homegroup sharing configuration?

Select one of the shared libraries in File Explorer and click Share in the toolbar.

Generally speaking, which of the following password conditions is not considered to be part of a strong password for a corporation?

Is also used for online accounts

Which server role is needed for Workplace Join?

AD FS

Which term refers to the ability to guarantee that the information has not been arbitrarily changed?

integrity

How should Password Settings Objects (PSOs) be assigned to users?

Assign PSOs to a global security group and add users to the group.

Why primarily are account lockout policies put into place?

Security

Which of the following is used to register a nondomain smartphone or tablet in Active Directory, which will install a certificate on a device so that it can secure single sign-on mechanism?

Workplace Join

Which Office 365 administrative role can manage service requests but cannot manage passwords?

Service Administrator

Which type of account is used to synchronize a user’s desktop across multiple Windows 10 devices?

Microsoft accounts

An organization currently uses the Office 365 Small Business Premium offering. The organization currently has 22 employees, though there have been a few new hires and terminations since the Office 365 contract was signed. The organization is currently out of Office 365 licenses. What should be done?

Delete the Office 365 accounts for the terminated employees.

Which of the following Office 2016 products is not available in the Office 365 Small Business Premium offering?

InfoPath

An organization has 20 users. The organization needs to have file storage and sharing, Office Online, and desktop versions of Office. Which Office 365 business plan is the least expensive option for what is needed?

Office 365 Small Business Premium

Which of the following functions does the System Preparation Utility (sysprep.exe) perform on a system?

It removes a system’s name and SID.

When adding a Windows update to a WIM image file, the Windows update must be in which of the following file formats?

.cab file

Which of the following utilities must be run on a cloned system to ensure that the clone receives its own SID?

sysprep

Which Office 365 deployment model is best for small organizations that want to provide a self-service approach to installation?

Deploying directly from the Office 365 portal

Which role is given to the person who creates the Office 365 account for his company?

Global Administrator

Which of the following methods are available to deploy a Windows app that has been created within an organization and needs to be deployed to users? (Choose all that apply.)

Place the app in the Windows Store Sideload the app using Microsoft Intune.

When using sysprep on the master computer, why should the /oobe parameter be included?

It presents the Windows Welcome Wizard on the next boot.

Which Office 365 feature keeps Exchange, Lync, and SharePoint up to date?

Software upgrades

Which of the following are features of Windows apps? (Choose all that apply.)

They are designed to run in a single, full window display. They are available from the Windows Store. They are certified for content by Microsoft.

Which Office 365 administrative role can manage purchases and support tickets?

Billing Adminastrator

Which of the following is the standard location for the Documents folder for the user JSmith?

C:\Users\JSmith\Documents

In which folder are the user profiles found?

C:\Users

Which of the following is the name of the User State Migration Tool that is used to restore files and settings on the target computer?

LoadState.exe

Where can the offline files in Windows 10 be found?

C:\Windows\CSC

The User State Migration Tool uses three XML files to perform targeted migrations. Which of the following files is not used by the User State Migration Tool?

MigSettings.xml

Which folder is included in the separate user profiles? (Choose all that apply.)

Favorites, AppData, Downloads

Which USMT component is used to copy the user files and settings from a centralized storage area to a user’s new system?

LoadState

Which USMT component is used to copy the user files and settings into a centralized storage area?

ScanState

Which extension does the mandatory user profile NTUser file have?

.man

Which type of profile has settings that cannot be changed by a user?

Mandatory user profile

Which type of user profile is stored in the C:\Users folder and is automatically created when a user logs on to the computer for the first time?

Local user profile

Which of the following is used to migrate user data between two systems running Windows 7, 8/8.1, or 10?

User State Migration Tool

Which of the following does a user state include? (Choose all that apply.)

Application data, User data, user registry

Which of the following is a series of folders that are associated with specific user accounts that contain personal documents, user-specific registry settings, and Internet favorites?

User profile

Which of the following is the captured image of the state, data, and hardware configuration of a VM at a particular moment in time?

Checkpoint

In Windows 10, the Hyper-V feature can be enabled in which of the following ways?

Open the Turn Windows features on or off dialog box from Control Panel.

Computer virtualization in Windows 10 is based on a module called the _________.

Hypervisor

In Hyper-V terminology, a virtual switch configured to provide connections external to the Hyper-V environment is called which of the following?

External network switch

Which type of disk enables a user to preserve an existing virtual disk image file in its original state, while mounting it in an OS and even modifying its contents?

Differencing disk

What is the primary purpose of the software package offered by Hyper-V called guest integration services?

Guest integration services resolves compatibility issues of certain guest operating systems running on the host.

To utilize the Client Hyper-V feature in Windows 10, which of the following requirements must be met? (Choose all that apply.)

Must have a 64-bit processor that incorporates second level address translation (SLAT) technology Must have a minimum of 4 GB of memory

In Windows 10, which Hyper-V feature can be used to return to a known good previous state in the VM?

Checkpoint

In Windows 10 Hyper-V, which type of switch allows communication with other VMs on the same computer, but does not allow communication with other computers?

Private

Which of the following types of virtual switch allows only communication between VMs on a computer?

Private

What is the primary graphical tool for creating and managing virtual machines?

Hyper-V Manager

When choosing between disk types in the New Virtual Hard Disk Wizard, which type permits an image size up to 2 TB?

VHD

In Windows 10, a user is running a Hyper-V Windows 7 virtual machine. Unfortunately, the C drive is running out of disk space, and the user needs to expand the virtual machine disks. The user adds a second hard drive. Which option should be used to move the VM?

Move the virtual machine’s data to a single location.

In some cases, certain Hyper-V guest operating system features do not function properly using the OS’s own device drivers. What Hyper-V software package can help remedy compatibility issues?

Guest integration services

Which of the following can the powercfg.exe utility be used to accomplish that can be accomplished in no other way?

Export and import power management plans.

Which two steps must be executed with powercfg.exe to export power plans from a computer?

Enter powercfg.exe -list and make a note of the listed GUIDs. Enter powercfg.exe -export power.pow GUID.

Which Windows 10 low-power mode writes information to the hibernation file, and then enters a sleep state that allows for a fast wake time?

Hybrid mode

Which power plan on a portable Windows 10 system sets the Maximum processor state value to 70%?

Balanced (Battery)

Which Windows 10 power-saving mode saves all computer operational data to the hard drive before turning the computer completely off?

Hibernate mode

Which of the following installation sources are acceptable for the creation of a Windows To Go workspace? (Choose all that apply.)

A Windows 10 Enterprise ISO file Correct Answer A Windows 10 installation disc on optical media Correct! A Windows 10 .wim file

Which power plan on a portable Windows 10 system dims the display after 5 minutes?

Balanced (AC)

Which of the following is known as Stand By mode, Suspend mode, or Suspend to RAM?

Sleep mode

Which power plan on a portable Windows 10 system dims the display after 10 minutes?

High Performance (AC)

To create a Windows To Go workspace on a USB drive, which minimum size USB drive is required?

32 GB

Which power plan on a portable Windows 10 system puts the computer to sleep after 15 minutes?

Power Saver (AC)

By default, eight tiles appear in the Windows Mobility Center. Which of the following items does not
appear by default here?

User Accounts

Where in Control Panel can users find quick access to settings most commonly adjusted by mobile computer users?

Windows Mobility Center

Which power plan is not
shown by default in the Power Options control panel?

High Performance

Which of the following hardware items is not compatible with Windows To Go workspaces?

A USB hub

Which conditions must users meet to self-enroll their computers in Microsoft Intune? (Choose all that apply.)

They must be a local administrator on the computer. Correct! They must connect to the Microsoft Intune portal using Internet Explorer. Correct! They must use a Microsoft Online ID.

Which of the following groups is not a default group created when Microsoft Intune is initially set up?

Lost Devices

A user wants to configure Windows Firewall on Windows tablets that are part of her domain and that are managed through Microsoft Intune. Which of the following is the best way to manage these settings?

Use Group Policy or a Microsoft Intune policy, but not both.

Which Microsoft Intune report would be best to obtain information about the software that is installed versus what is licensed?

License Installation Reports

Which Microsoft Intune report would be best to obtain information about the software updates that succeeded or failed?

Update Reports

A user wants to enroll devices in Microsoft Intune. Which of the following is the first step he should perform?

Set up Mobile Device Management Authority for Microsoft Intune.

Which of the following operating systems support the installation of the Microsoft Intune client software? (Choose all that apply.)

Windows 7; Windows XP; Windows 10

Microsoft Intune has three different methods of creating groups. Which of the following is not
one of those methods?

Query-based

To enroll an Apple iPhone in Microsoft Intune, which of the following must be requested from Apple?

An Apple Push Notification Service certificate

Which of the following policy templates are used in Microsoft Intune policies? (Choose two answers.)

Windows Firewall Settings Microsoft Intune Center Settings

After performing an installation of the Microsoft Intune client on a computer, which of the following is the typical expected maximum amount of time it should take for the new computer to complete the inventory and status updates processes?

30 Min

An administrator has a mobile computer that she is managing with Microsoft Intune. The employee who was using the computer was terminated and the administrator needs to ensure that all data is removed from the laptop. What should be done?

Retire the computer with Microsoft Intune.

You have around 100 machines running Windows 10 that is being managed by Microsoft Intune. You want to run a report that shows the software that is on the machines. Which formats are available to provide the report in? (Choose all that apply.)

Export to CSV Export to HTML

Which Microsoft Intune report would be best to get information about the software that is installed on specific computers?

Detected Software Reports

Which of the following can be used with Microsoft Intune to quickly organize and manage computers and users?

Microsoft Intune Groups

Several hundred users are being managed by Microsoft Intune. What is the best way to deploy updates to a few test machines to make sure that the updates do not cause problems?

Manually deploy the updates from Microsoft Intune.

In Microsoft Intune, which of the following happen when an update is declined? (Choose three answers.)

The update is hidden in default views. Correct! Any associated reported data is lost. Correct! All approvals for the update are removed.

In Microsoft Intune, what is used to specify that an update will be installed automatically when a certain date is reached?

Deadline

Which two methods can be used to determine which updates need to be approved and deployed?

Use the Intune console. Use Intune reports.

By default, how frequently do Microsoft Intune agents check for updates?

Every 8 hours

An administrator has about a hundred computers being managed by Microsoft Intune. A critical update from the Widget Corporation needs to be deployed. What should be done?

Use the Microsoft Intune Software Publisher to deploy the third-party update.

Which of the following can be created so that Microsoft Intune will automatically approve the installation of all critical and security updates as soon as Microsoft releases them?

Automatic Approval rules

When would an LLMNR client use LLMNR instead of other forms of name resolution?

Only when the primary and secondary DNS servers are unreachable

Which troubleshooting utility allows generating DNS request messages and transmitting them to specific DNS servers on the network?

nslookup

The IP address of 10.240.0.0 with a subnet mask of 255.255.255.0 represents which of the following?

a network address

Which of the following would be considered a second-level domain?

microsoft.com

The Windows operating system supports three name-resolution systems. Which of the following is not
a name-resolution system?

Address Resolution Protocol

Which IPv6 address type is routable within an organization, but not outside the organization?

Unique local unicast

Which of the following features searches for other devices on the network and allows other computers and devices on the same network to find your Windows-based computer or device?

Network discovery

Which of the following Windows 10 network locations has the network discovery enabled by default? (Choose all that apply.)

Correct! Home network Correct! Work network Correct! Domain network

Which of the following represent valid IPv6 addresses? (Choose all that apply.)

FDC0:0:0:02BD:FF:BECB:FEF4:961D Correct! FDC0:0000:0000:02BD:00FF:BECB:FEF4:961D Correct! FDC0::02BD:FF:BECB:FEF4:961D

Which IPv6 address type can be used to communicate with any IPv6 device?

Global unicast

Which network adapter setting allows users to increase throughput and decrease CPU utilization by increasing the standard Ethernet frame size?

Jumbo Frames

Which IEEE standard defines wireless networks that are backward compatible with 802.11b and provides a maximum bandwidth of 54 Mbps?

802.11g

Location-aware printing utilizes which two services to determine network information and the current location of the Windows 10 computer? (Choose two.)

Network Location Awareness service, Network List Service

Which wireless mode allows wireless clients to connect to a network using a wireless access point?

Infrastructure mode

Which IEEE standard defines improved encryption for wireless networks, including AES?

802.11i

Which WPA mode of operation uses a session key that is changed each time the wireless client communicates with the AP?

Enterprise mode

Which WPA mode allows users to provide authentication via a pre-shared key or password?

Personal mode

Which technology is used to reduce the usage of expensive data connections?

Metered Internet connections

A user has a mobile smartphone running Windows Phone 10 and a laptop running Windows 10. How can she use her mobile smartphone as an access point?

By using Internet Sharing

Which Microsoft implementation uses ad hoc wireless networking that allows users to easily connect to another wireless device?

Wi-Fi Direct

Windows Firewall in Windows 10 can have rules configured that allow traffic to flow in which direction(s)?

Both inbound and outbound

A Windows Firewall policy file has which of the following file extensions?

.wfw

In Windows Firewall with Advanced Security, which type of rule should be configured to perform IPsec?

Connection security rules

Which tool is used to configure IPsec when communicating with a server?

Windows Firewall with Advanced Security

When using the Windows Firewall with Advanced Security console, three distinct network locations impact the behavior of Windows Firewall. Which of the following is not
one of these network locations used by Windows Firewall?

Default

In Windows Firewall with Advanced Security, which type of rule should be used to designate computers that do not require authentication when communicating with a local computer running Windows 10?

Authentication exception rules

Which of the following Windows Firewall with Advanced Security (WFAS) profiles is most appropriate if a user is connected to an open hotspot at a local coffee shop?

Public

Which storage space resiliency type can be used to protect against two simultaneous drive failures?

Three-way mirror

When using the OneDrive desktop app, which of the following terms is described as gaining remote access to any file on a computer?

Fetching

In relation to the virtual folders, DFS Namespace shared folders are referred to as which of the following?

Targets

Which of the following benefits does the new Storage Spaces feature of Windows 10 provide?

It allows you to combine several physical drives into one logical drive.

When DFS Replication and DFS Namespace are combined into a single service offering, the pair creates which of the following types of file sharing service?

Fault tolerant

Which of the following is the primary difference between DFS domain-based namespaces and DFS stand-alone namespaces?

Where the namespaces are stored

Which of the following statements are true of extended partitions? (Choose all that apply.)

You do not format the extended partition. Correct! Extended partitions cannot host an operating system. Correct! Extended partitions cannot host an operating system.

DFS Replication does not replace the need for backups because of which feature of replication?

It replicates deleted, changed, and corrupted files.

Which storage space resiliency type can be used to protect up to a single drive failure and requires two drives, minimum?

Two-way mirror

Which storage space resiliency type offers no data protection when a drive fails?

Simple

Which of the following is the maximum number of USB devices that can be attached to a single USB port?

127

When using a hosted-cache mode server, which of the following happens if a client requests a file that is not in the cache on the server?

The client will traverse the WAN link, download the data, and put it in the local server’s cache.

Which storage space resiliency type can be used to protect up to a single drive failure and requires three drives, minimum?

parity

An administrator must deploy at least one or more BranchCache-enabled servers at the main office to enable BranchCache. Which of the following server types is not an option as a BranchCache-enabled server?

FTP servers

When setting target priority on a root target for a DFS domain-based namespace, users can override referral ordering and select the priority they want to use. Which of the following does the "Last among all targets" option specify?

Users should never be referred to this target unless all other targets are unavailable.

Which Group Policy setting is needed to disallow the usage of portable media devices on a domain’s computers?

Prevent installation of removable devices

Which of the following scenarios will cause BitLocker to go into recovery mode? (Choose all that apply.)

Changing the boot order to another fixed drive Correct! Moving the BitLocker-protected drive to another computer Correct! Pressing the F8 or F10 key during the boot process

Which of the following is created so that files are automatically scanned and classified based on their content?

Classification rules

Regarding Dynamic Access Control, which term describes the process of using a trusted identity provider to provide authentication?

Claims-based access control

Which of the following options are available for implementing BitLocker Drive Encryption? (Choose all that apply.)

Encrypt entire drive Correct! Encrypt used disk space only

When using TPM with BitLocker, which of the following modes can use Group Policy to enforce the usage of a strong password that must be entered before the computer can boot into Windows?

TPM-PIN mode

When planning NTFS/Share permissions on storage spaces or volumes in which files/folders are shared, which of the following is generally considered the best approach?

Share permissions: Full Control, NTFS permissions: desired access

When using TPM with BitLocker, which of the following modes requires that the user present a valid certificate via a secure method before the computer will boot into Windows?

TPM-SmartCard mode

Which administrative interface is provided for setting encryption policies, monitoring computers against those policies, and reporting the encryption status across organizations?

Microsoft BitLocker Administration and Monitoring

After creating claim types, which of the following is the next step that must be performed to allow the claim to function properly?

Configure resource properties.

Which of the following statements are true concerning share permissions? (Choose all that apply.)

For drives formatted with the FAT/FAT32 file system, share permissions are the only option available. Correct! They determine the type of access that others will have to the folder when they connect to it over the network.

When using TPM with BitLocker, which of the following modes requires that the user provide a USB flash drive with the keys before the computer can boot into Windows?

TPM-Startup Key mode

How can the usage of removable storage devices best be tracked on a domain’s computers?

Configure audit policies for removable storage in Group Policy.

When using BitLocker on domain-based computers that use the TPM-PIN mode, which of the following conditions must be met for the system volume to automatically unlock without needing the user to enter a PIN? (Choose all that apply.)

TPM is enabled. Correct! The computer is connected to the domain over a wired connection. Correct Answer A Network Unlock server is installed on a Windows Deployment Services server.

After creating claim types, which of the following is the next step that must be performed to allow the claim to function properly?

Configure resource properties.

Which of the following are default libraries included in a user profile? (Choose all that apply.)

Music, Documents

Which basic printer permission should be granted to a user to be able to pause, resume, restart, and cancel his own print jobs, as well as the print jobs of others?

Manage documents

How can Public folder sharing be turned on?

Enable the feature by opening the Network and Sharing Center and enable the appropriate feature in Advanced Sharing Settings.

Which of the following statements is true of public folder sharing?

Public folder sharing places all shared files in a single location.

The hardware that actually produces hard-copy documents is called a _________.

Print device

Which printing configuration makes the computer with the locally attached print device function as a print server?

Locally attached printer sharing

Which of the following steps begins the process of modifying the default homegroup sharing configuration?

Select one of your shared libraries in File Explorer and click Share in the toolbar.

Which of the following statements states the differences, physically and logically, between the two printing configurations: network-attached printing and network-attached printer sharing?

They are essentially the same physically. Logically, the print jobs are handled differently.

For users at home, which file sharing is most likely the simplest to set up and use?

Homegroup sharing

Which permission do users have by default regarding printer access and the ability to manage documents?

By default, all printers assign the Allow Print permission to Everyone.

In Windows, a _________ is the software interface through which a computer communicates with a print device.

Printer

Which of the following is not a basic printer permission?

Take ownership

With one of the following network printing configurations, the print devices do not need to be attached to computers; instead, they can be connected directly to the network. Identify the network printing configuration described.

Network-attached printing

Why are success audits as important as failure audits?

Successes allow you to track activity such as new account creation.

Auditing is used for which of the following purposes?

Recording users’ actions

Authentication is used for which of the following purposes?

To verify a user’s identity

Which Windows feature allows an administrator to control the amount of disk space that is made available to each user?

Disk quotas

Why should using basic audit policy settings and advanced audit policy settings together be avoided?

Audit policies might cause conflicts or erratic behavior.

Why is choosing what to audit, instead of auditing everything that a user does, a good idea?

High levels of auditing can affect system performance.

Which type of audit event notifies an administrator that an account failed to log on?

Logon/Logoff

Why is it a good idea (other than the effect on system performance) to set up auditing for only those objects that really need to be focused on?

Searching through too many events makes finding problems more difficult.

Authorization is used for which of the following purposes?

To grant access to a user

When implementing disk quotas, there are several requirements that must be met. Which of the following items is not one of those requirements for implementing disk quotas?

Quotas apply to all users, including administrators.

When configuring disk quotas using Group Policy, which of the following must administrators be aware of when configuring the default and warning levels in their quotas?

The limits will only apply to users who have never written data to the volumes in scope.

Which of the following is the purpose of implementing new audit subsettings?

To focus on important audit items

An administrator wants to enable disk quotas on a volume. Three users in the organization should have quota limits that are double what all other users should have. There are a total of 53 users in the organization. Which of the following methods is the most administratively efficient manner?

Configure default quotas at the lower size and then configure specific quota entries for the three users with larger quotas.

Which VPN protocol encapsulates PPP traffic using the Secure Sockets Layer (SSL) protocol?

Secure Socket Tunneling Protocol (SSTP)

Which VPN authentication protocol sends the password unencrypted?

PAP

Which of the following tools enables users to connect to a remote computer, including servers with no interaction required from the remote computer, so that they can interact with the Windows desktop and applications?

Remote Desktop

When using the CMAK to create a VPN profile, what must be done if selecting the Allow the user to choose a VPN server before connecting option?

A text listing of VPN servers must be provided.

Which component of SSTP ensures that if there is a break in connectivity, the user can continue without restarting the connection?

MOBIKE

Which VPN protocol relies on the IP security extensions (IPsec) for encryption and, as a result, performs a double encapsulation?

Layer 2 Tunneling Protocol (L2TP)

Which VPN authentication protocol allows third-party vendors to develop custom authentication schemes, including biometrics?

EAP-MS-CHAP v2

Which VPN authentication protocol performs two-way authentication that allows users to change expired passwords during the connection process?

MS-CHAP v2

How many inbound Remote Desktop connections will Windows 10 allow?

one

Which VPN protocol provides support for IPv6 and the new VPN Reconnect feature, as well as authentication by EAP, using PEAP, EAP-MSCHAPv2, or smart cards?

Internet Key Exchange, Version 2 (IKEv2)

Which VPN protocol is the oldest and least secure of the VPN protocols?

Point-to-Point Tunneling Protocol (PPTP)

Which VPN protocol does not support using Password Authentication Protocol (PAP), Challenge Handshake Authentication Protocol (CHAP), and Microsoft Challenge Handshake Authentication Protocol Version 2 (MSCHAPv2), and instead can only use EAP-MSCHAPv2 or a certificate for authentication?

Internet Key Exchange, Version 2 (IKEv2)

Which port is used by Remote Assistance and Remote Desktop?

tcp 3389

Which form of authentication is used by SSTP?

digital certificates

In Windows 10, which of the following is the quickest method to deploy VPN settings to approximately 150 client computers?

Use the Connection Manager Administration Kit.

In Windows 10, which wizard can be used to make the process of setting up a VPN profile and connecting to a VPN much simpler?

VPN Connection Wizard

Which of the following Remote Desktop Services service roles is used to enable a server to host RemoteApp programs?

RD Session Host

On which of the following types of devices can the RemoteApp client be installed? (Choose all that apply.)

Apple ios – Android – Windows Pc – Macintosh

Which of the following is the default Web Feed URL?

//<servername>/RDWeb/Feed/webfeed.aspx

Which of the following allows user to connect to virtual desktops and applications that are hosted on a remote computer via the cloud?

RemoteApps

Which of the following is the URL to access RemoteApp applications?

//Servername/RDWeb

Which of the following statements describes how to run Azure RemoteApp on an iPhone?

On the iPhone, install the Azure RemoteApp Client from the Apple App Store.

Which of the following is used to enable or disable a RemoteApp program in Windows Server 2012 R2?

The RDMS UI

Which of the following methods ensures passwords are not saved when using Remote Desktop Services clients?

Configure a GPO that does not allow passwords to be saved.

In Windows Server 2016, which of the following uses several Remote Desktop Sessions Hosts to serve RemoteApps?

Session collection

Which of the following tasks best describes how to add a Remote App connection feed to a computer running Windows 10?

Specify the Web Feed URL from the Access RemoteApp and Desktop Connections applet.

Which of the following is used to manage Remote Desktop Services on a server running Windows Server 2016?

Server Manager

Which of the following actions creates a sync conflict? (Choose all that apply.)

A user deleted a file in a shared folder after another person makes a change to the same file while he is offline.

Which of the following are methods to connect to a Work Folder? (Choose three answers.)

Group policy – Auto Discovery – URL Entry

A user has an offline folder. While she is traveling, she is accessing and making changes to a file. However, back in the office, the file is deleted by another user. What does this cause?

A sync conflict

The company would like to provide users with access to their files while using their mobile devices. They want to conserve bandwidth and provide users with faster repeat access to the files while still allowing them to access the files when disconnected from the network. Which technology best fits this need?

Transparent caching combined with Offline files and two-way synchronization

Which of the following allows users to store and access work files from a sync share, which can then be accessed from multiple devices (including bring-your-own-devices)?

Work Folders

When scheduling for offline file sync, which of the following are examples of event triggers that can be configured? (Choose all that apply.)

Correct! Logging on to your computer Correct! Locking Windows Correct! Unlocking Windows

Which of the following tools is best to use when a user has bookmarked his favorite sites and wants to make sure they are available across multiple PCs?

Configure them to sync via Settings.

Which of the following are ways in which Sync Center syncs mobile devices and offline files? (Choose all that apply.)

One-Way and Two-Way

Which of the following statements are correct? (Choose all that apply.)

Client Hyper-V allows users to connect to Hyper-V VMs running on other computers. Correct Answer Client Hyper-V allows users to create and run virtual machines simultaneously. Correct! Client Hyper-V consists of a Management console and a Virtual Machine Connection component.

Which of the following tools is needed to sequence an existing application and then deploy it to Windows 10 computers?

Microsoft Desktop Optimization Pack (MDOP)

Which of the following programs can be used to manage RemoteApps?

Server Manager

Which of the following reports in the ACM provides information on whether an application works on a 32- or 64-bit operating system?

Device report

Which of the following features provides users with a consistent desktop experience across multiple devices (desktops, laptops, VDI)?

User Experience Virtualization (UE-V)

Which of the following types of packages can be created to monitor applications for compatibility prior to migrating to Windows 10?

Runtime-analysis package

An application will not run under Windows 10, even after running the Application Compatibility Wizard. Which of the following methods can be used so that the users can run the application? (Choose all that apply.)

Use RemoteApp. Correct! Use App-V. Correct Answer Use Hyper-V.

Which of the following is not a benefit of running virtual applications?

Two versions of the application cannot be run on the same computer.

Which of the following represent security and management tasks that can be handled with Microsoft Intune? (Choose all that apply.)

Tracking hardware and software inventory Correct Answer Providing remote assistance Correct Answer Protecting computers from malware Correct! Managing the deployment of software updates

After creating a runtime-analysis package, which of the following methods can be used to deploy the package on a network? (Choose all that apply.)

Group Policy Correct Answer System Center Configuration Manager Correct Answer Storing the file on a network share Correct! Using removable media to distribute it to systems

Which of the following tools can be used to overcome problems with User Access Control?

Standard User Analyzer

When using Client Hyper-V to set up a test lab, which of the following types of virtual switches should be set up to allow VMs to access the network through the network adapter on the host machine?

External

Which of the following options will put a PC back to a new state and will reinstall Windows, but delete files, settings, and apps, except those apps that came with the PC?

Reset

Which of the following approaches is considered most effective to decommission an older computer before donating it to charity?

Initiate PC Reset.

Which of the following Windows 10 features is used to create a restore point?

System Restore

Which of the following is the best method of data recovery?

Using backups

Which of the following best represents the time when a manual restore point should be created?

One day before performing an installation of a new application

How frequently does Windows 10 automatically create restore points?

Every 7 days

An administrator loads a driver for a new scanner, and now the scanner does not work. Which of the following is the best way to restore the old driver so that the scanner will work properly?

Roll back the driver.

Which of the following time frames best represents the point at which a restore point should be created?

Prior to performing a major system event

By default, how many days is a file deleted with OneDrive kept in the Recycle Bin?

30 days

Which of the following terms best describes an application designed to replace the Windows 7 Backup and Restore feature?

File History

Which of the following programs restores files through a familiar File Explorer interface?

File History

Which of the following allows users to schedule a weekly backup to a secondary disk?

Using Windows 7 File Recovery

Which of the following tools best represents the preferred method to back up important documents so that a previous version can be found and restored quickly?

Correct! System files Correct! Application files

Which of the following is the easiest way to ensure all of the corporate computers include the newest Windows updates while still ensuring that those updates do not cause any problems for the users?

Use WSUS.

How would you update applications on a Windows phone?

Launch the store app and click the Updates link.

An administrator has just added a new update to the WSUS server and she wants to test the update to the test group. Which of the following commands should she use so that she doesn’t have to wait for the update to be deployed?

gpupdate /force

Which of the following tools is used to remove a Windows update?

Windows Control Panel

A family has three computers that have Windows 10 installed. In Windows 10, how can network traffic be minimized when downloading Windows updates?

Enable the Get updates from more than one place option.

Which of the following types of update is a tested, cumulative set of hotfixes, security updates, critical updates, and updates, as well as additional fixes for problems found internally?

Service pack

Which of the following features should be selected so that machines can get updates from Windows Update or from another local computer running Windows 10 that already has the update?

Updates from more than one place

Which of the following update services uses distribution rings to deploy updates in phases?

Windows Update for Business

Share This
Flashcard

More flashcards like this

NCLEX 10000 Integumentary Disorders

When assessing a client with partial-thickness burns over 60% of the body, which finding should the nurse report immediately? a) ...

Read more

NCLEX 300-NEURO

A client with amyotrophic lateral sclerosis (ALS) tells the nurse, "Sometimes I feel so frustrated. I can’t do anything without ...

Read more

NASM Flashcards

Which of the following is the process of getting oxygen from the environment to the tissues of the body? Diffusion ...

Read more

We can Write a Custom Essay

Consectetur labore ullamco magna do irure fugiat Lorem

Check Price

Successful message
sending