Which of the following passwords is considered complex? |
M!croS0ft |
Which of the following basic security components is used to support virtual smart cards? |
Trusted Platform Module |
Which of the following is introduced with Windows 10 that provides biometric authentication that uses a user’s face, iris, or fingerprint to unlock devices? |
Windows Hello |
Which of the following is used to find computers, users, and other resources throughout an Active Directory forest? |
Global Catalog |
Digital certificates, smart, picture passwords, and biometrics are used to perform which of the following actions? |
Authentication |
Why is a setting of 0 for maximum password age not a good idea? |
It means that passwords never expire, which is a major security problem; It means that password aging has been disabled |
Where are user accounts store for computers that are in a workgroup? |
Security Accounts Manager |
Account policies contain various subsets. Which of the following subsets of account policies? |
Password Policy; Account Lockout Policy; Kerberos Policy |
Which term refers to preventing people from reading information they are not authorized to read? |
Confidentiality |
Which protocol is responsible for the establishment of the encryption/decryption keys and algorithm in a TLS connection? |
TLS Handshake protocol |
Which of the following steps begins the process of modifying the default homegroup sharing configuration? |
Select one of the shared libraries in File Explorer and click Share in the toolbar. |
Generally speaking, which of the following password conditions is not considered to be part of a strong password for a corporation? |
Is also used for online accounts |
Which server role is needed for Workplace Join? |
AD FS |
Which term refers to the ability to guarantee that the information has not been arbitrarily changed? |
integrity |
How should Password Settings Objects (PSOs) be assigned to users? |
Assign PSOs to a global security group and add users to the group. |
Why primarily are account lockout policies put into place? |
Security |
Which of the following is used to register a nondomain smartphone or tablet in Active Directory, which will install a certificate on a device so that it can secure single sign-on mechanism? |
Workplace Join |
Which Office 365 administrative role can manage service requests but cannot manage passwords? |
Service Administrator |
Which type of account is used to synchronize a user’s desktop across multiple Windows 10 devices? |
Microsoft accounts |
An organization currently uses the Office 365 Small Business Premium offering. The organization currently has 22 employees, though there have been a few new hires and terminations since the Office 365 contract was signed. The organization is currently out of Office 365 licenses. What should be done? |
Delete the Office 365 accounts for the terminated employees. |
Which of the following Office 2016 products is not available in the Office 365 Small Business Premium offering? |
InfoPath |
An organization has 20 users. The organization needs to have file storage and sharing, Office Online, and desktop versions of Office. Which Office 365 business plan is the least expensive option for what is needed? |
Office 365 Small Business Premium |
Which of the following functions does the System Preparation Utility (sysprep.exe) perform on a system? |
It removes a system’s name and SID. |
When adding a Windows update to a WIM image file, the Windows update must be in which of the following file formats? |
.cab file |
Which of the following utilities must be run on a cloned system to ensure that the clone receives its own SID? |
sysprep |
Which Office 365 deployment model is best for small organizations that want to provide a self-service approach to installation? |
Deploying directly from the Office 365 portal |
Which role is given to the person who creates the Office 365 account for his company? |
Global Administrator |
Which of the following methods are available to deploy a Windows app that has been created within an organization and needs to be deployed to users? (Choose all that apply.) |
Place the app in the Windows Store Sideload the app using Microsoft Intune. |
When using sysprep on the master computer, why should the /oobe parameter be included? |
It presents the Windows Welcome Wizard on the next boot. |
Which Office 365 feature keeps Exchange, Lync, and SharePoint up to date? |
Software upgrades |
Which of the following are features of Windows apps? (Choose all that apply.) |
They are designed to run in a single, full window display. They are available from the Windows Store. They are certified for content by Microsoft. |
Which Office 365 administrative role can manage purchases and support tickets? |
Billing Adminastrator |
Which of the following is the standard location for the Documents folder for the user JSmith? |
C:\Users\JSmith\Documents |
In which folder are the user profiles found? |
C:\Users |
Which of the following is the name of the User State Migration Tool that is used to restore files and settings on the target computer? |
LoadState.exe |
Where can the offline files in Windows 10 be found? |
C:\Windows\CSC |
The User State Migration Tool uses three XML files to perform targeted migrations. Which of the following files is not used by the User State Migration Tool? |
MigSettings.xml |
Which folder is included in the separate user profiles? (Choose all that apply.) |
Favorites, AppData, Downloads |
Which USMT component is used to copy the user files and settings from a centralized storage area to a user’s new system? |
LoadState |
Which USMT component is used to copy the user files and settings into a centralized storage area? |
ScanState |
Which extension does the mandatory user profile NTUser file have? |
.man |
Which type of profile has settings that cannot be changed by a user? |
Mandatory user profile |
Which type of user profile is stored in the C:\Users folder and is automatically created when a user logs on to the computer for the first time? |
Local user profile |
Which of the following is used to migrate user data between two systems running Windows 7, 8/8.1, or 10? |
User State Migration Tool |
Which of the following does a user state include? (Choose all that apply.) |
Application data, User data, user registry |
Which of the following is a series of folders that are associated with specific user accounts that contain personal documents, user-specific registry settings, and Internet favorites? |
User profile |
Which of the following is the captured image of the state, data, and hardware configuration of a VM at a particular moment in time? |
Checkpoint |
In Windows 10, the Hyper-V feature can be enabled in which of the following ways? |
Open the Turn Windows features on or off dialog box from Control Panel. |
Computer virtualization in Windows 10 is based on a module called the _________. |
Hypervisor |
In Hyper-V terminology, a virtual switch configured to provide connections external to the Hyper-V environment is called which of the following? |
External network switch |
Which type of disk enables a user to preserve an existing virtual disk image file in its original state, while mounting it in an OS and even modifying its contents? |
Differencing disk |
What is the primary purpose of the software package offered by Hyper-V called guest integration services? |
Guest integration services resolves compatibility issues of certain guest operating systems running on the host. |
To utilize the Client Hyper-V feature in Windows 10, which of the following requirements must be met? (Choose all that apply.) |
Must have a 64-bit processor that incorporates second level address translation (SLAT) technology Must have a minimum of 4 GB of memory |
In Windows 10, which Hyper-V feature can be used to return to a known good previous state in the VM? |
Checkpoint |
In Windows 10 Hyper-V, which type of switch allows communication with other VMs on the same computer, but does not allow communication with other computers? |
Private |
Which of the following types of virtual switch allows only communication between VMs on a computer? |
Private |
What is the primary graphical tool for creating and managing virtual machines? |
Hyper-V Manager |
When choosing between disk types in the New Virtual Hard Disk Wizard, which type permits an image size up to 2 TB? |
VHD |
In Windows 10, a user is running a Hyper-V Windows 7 virtual machine. Unfortunately, the C drive is running out of disk space, and the user needs to expand the virtual machine disks. The user adds a second hard drive. Which option should be used to move the VM? |
Move the virtual machine’s data to a single location. |
In some cases, certain Hyper-V guest operating system features do not function properly using the OS’s own device drivers. What Hyper-V software package can help remedy compatibility issues? |
Guest integration services |
Which of the following can the powercfg.exe utility be used to accomplish that can be accomplished in no other way? |
Export and import power management plans. |
Which two steps must be executed with powercfg.exe to export power plans from a computer? |
Enter powercfg.exe -list and make a note of the listed GUIDs. Enter powercfg.exe -export power.pow GUID. |
Which Windows 10 low-power mode writes information to the hibernation file, and then enters a sleep state that allows for a fast wake time? |
Hybrid mode |
Which power plan on a portable Windows 10 system sets the Maximum processor state value to 70%? |
Balanced (Battery) |
Which Windows 10 power-saving mode saves all computer operational data to the hard drive before turning the computer completely off? |
Hibernate mode |
Which of the following installation sources are acceptable for the creation of a Windows To Go workspace? (Choose all that apply.) |
A Windows 10 Enterprise ISO file Correct Answer A Windows 10 installation disc on optical media Correct! A Windows 10 .wim file |
Which power plan on a portable Windows 10 system dims the display after 5 minutes? |
Balanced (AC) |
Which of the following is known as Stand By mode, Suspend mode, or Suspend to RAM? |
Sleep mode |
Which power plan on a portable Windows 10 system dims the display after 10 minutes? |
High Performance (AC) |
To create a Windows To Go workspace on a USB drive, which minimum size USB drive is required? |
32 GB |
Which power plan on a portable Windows 10 system puts the computer to sleep after 15 minutes? |
Power Saver (AC) |
By default, eight tiles appear in the Windows Mobility Center. Which of the following items does not |
User Accounts |
Where in Control Panel can users find quick access to settings most commonly adjusted by mobile computer users? |
Windows Mobility Center |
Which power plan is not |
High Performance |
Which of the following hardware items is not compatible with Windows To Go workspaces? |
A USB hub |
Which conditions must users meet to self-enroll their computers in Microsoft Intune? (Choose all that apply.) |
They must be a local administrator on the computer. Correct! They must connect to the Microsoft Intune portal using Internet Explorer. Correct! They must use a Microsoft Online ID. |
Which of the following groups is not a default group created when Microsoft Intune is initially set up? |
Lost Devices |
A user wants to configure Windows Firewall on Windows tablets that are part of her domain and that are managed through Microsoft Intune. Which of the following is the best way to manage these settings? |
Use Group Policy or a Microsoft Intune policy, but not both. |
Which Microsoft Intune report would be best to obtain information about the software that is installed versus what is licensed? |
License Installation Reports |
Which Microsoft Intune report would be best to obtain information about the software updates that succeeded or failed? |
Update Reports |
A user wants to enroll devices in Microsoft Intune. Which of the following is the first step he should perform? |
Set up Mobile Device Management Authority for Microsoft Intune. |
Which of the following operating systems support the installation of the Microsoft Intune client software? (Choose all that apply.) |
Windows 7; Windows XP; Windows 10 |
Microsoft Intune has three different methods of creating groups. Which of the following is not |
Query-based |
To enroll an Apple iPhone in Microsoft Intune, which of the following must be requested from Apple? |
An Apple Push Notification Service certificate |
Which of the following policy templates are used in Microsoft Intune policies? (Choose two answers.) |
Windows Firewall Settings Microsoft Intune Center Settings |
After performing an installation of the Microsoft Intune client on a computer, which of the following is the typical expected maximum amount of time it should take for the new computer to complete the inventory and status updates processes? |
30 Min |
An administrator has a mobile computer that she is managing with Microsoft Intune. The employee who was using the computer was terminated and the administrator needs to ensure that all data is removed from the laptop. What should be done? |
Retire the computer with Microsoft Intune. |
You have around 100 machines running Windows 10 that is being managed by Microsoft Intune. You want to run a report that shows the software that is on the machines. Which formats are available to provide the report in? (Choose all that apply.) |
Export to CSV Export to HTML |
Which Microsoft Intune report would be best to get information about the software that is installed on specific computers? |
Detected Software Reports |
Which of the following can be used with Microsoft Intune to quickly organize and manage computers and users? |
Microsoft Intune Groups |
Several hundred users are being managed by Microsoft Intune. What is the best way to deploy updates to a few test machines to make sure that the updates do not cause problems? |
Manually deploy the updates from Microsoft Intune. |
In Microsoft Intune, which of the following happen when an update is declined? (Choose three answers.) |
The update is hidden in default views. Correct! Any associated reported data is lost. Correct! All approvals for the update are removed. |
In Microsoft Intune, what is used to specify that an update will be installed automatically when a certain date is reached? |
Deadline |
Which two methods can be used to determine which updates need to be approved and deployed? |
Use the Intune console. Use Intune reports. |
By default, how frequently do Microsoft Intune agents check for updates? |
Every 8 hours |
An administrator has about a hundred computers being managed by Microsoft Intune. A critical update from the Widget Corporation needs to be deployed. What should be done? |
Use the Microsoft Intune Software Publisher to deploy the third-party update. |
Which of the following can be created so that Microsoft Intune will automatically approve the installation of all critical and security updates as soon as Microsoft releases them? |
Automatic Approval rules |
When would an LLMNR client use LLMNR instead of other forms of name resolution? |
Only when the primary and secondary DNS servers are unreachable |
Which troubleshooting utility allows generating DNS request messages and transmitting them to specific DNS servers on the network? |
nslookup |
The IP address of 10.240.0.0 with a subnet mask of 255.255.255.0 represents which of the following? |
a network address |
Which of the following would be considered a second-level domain? |
microsoft.com |
The Windows operating system supports three name-resolution systems. Which of the following is not |
Address Resolution Protocol |
Which IPv6 address type is routable within an organization, but not outside the organization? |
Unique local unicast |
Which of the following features searches for other devices on the network and allows other computers and devices on the same network to find your Windows-based computer or device? |
Network discovery |
Which of the following Windows 10 network locations has the network discovery enabled by default? (Choose all that apply.) |
Correct! Home network Correct! Work network Correct! Domain network |
Which of the following represent valid IPv6 addresses? (Choose all that apply.) |
FDC0:0:0:02BD:FF:BECB:FEF4:961D Correct! FDC0:0000:0000:02BD:00FF:BECB:FEF4:961D Correct! FDC0::02BD:FF:BECB:FEF4:961D |
Which IPv6 address type can be used to communicate with any IPv6 device? |
Global unicast |
Which network adapter setting allows users to increase throughput and decrease CPU utilization by increasing the standard Ethernet frame size? |
Jumbo Frames |
Which IEEE standard defines wireless networks that are backward compatible with 802.11b and provides a maximum bandwidth of 54 Mbps? |
802.11g |
Location-aware printing utilizes which two services to determine network information and the current location of the Windows 10 computer? (Choose two.) |
Network Location Awareness service, Network List Service |
Which wireless mode allows wireless clients to connect to a network using a wireless access point? |
Infrastructure mode |
Which IEEE standard defines improved encryption for wireless networks, including AES? |
802.11i |
Which WPA mode of operation uses a session key that is changed each time the wireless client communicates with the AP? |
Enterprise mode |
Which WPA mode allows users to provide authentication via a pre-shared key or password? |
Personal mode |
Which technology is used to reduce the usage of expensive data connections? |
Metered Internet connections |
A user has a mobile smartphone running Windows Phone 10 and a laptop running Windows 10. How can she use her mobile smartphone as an access point? |
By using Internet Sharing |
Which Microsoft implementation uses ad hoc wireless networking that allows users to easily connect to another wireless device? |
Wi-Fi Direct |
Windows Firewall in Windows 10 can have rules configured that allow traffic to flow in which direction(s)? |
Both inbound and outbound |
A Windows Firewall policy file has which of the following file extensions? |
.wfw |
In Windows Firewall with Advanced Security, which type of rule should be configured to perform IPsec? |
Connection security rules |
Which tool is used to configure IPsec when communicating with a server? |
Windows Firewall with Advanced Security |
When using the Windows Firewall with Advanced Security console, three distinct network locations impact the behavior of Windows Firewall. Which of the following is not |
Default |
In Windows Firewall with Advanced Security, which type of rule should be used to designate computers that do not require authentication when communicating with a local computer running Windows 10? |
Authentication exception rules |
Which of the following Windows Firewall with Advanced Security (WFAS) profiles is most appropriate if a user is connected to an open hotspot at a local coffee shop? |
Public |
Which storage space resiliency type can be used to protect against two simultaneous drive failures? |
Three-way mirror |
When using the OneDrive desktop app, which of the following terms is described as gaining remote access to any file on a computer? |
Fetching |
In relation to the virtual folders, DFS Namespace shared folders are referred to as which of the following? |
Targets |
Which of the following benefits does the new Storage Spaces feature of Windows 10 provide? |
It allows you to combine several physical drives into one logical drive. |
When DFS Replication and DFS Namespace are combined into a single service offering, the pair creates which of the following types of file sharing service? |
Fault tolerant |
Which of the following is the primary difference between DFS domain-based namespaces and DFS stand-alone namespaces? |
Where the namespaces are stored |
Which of the following statements are true of extended partitions? (Choose all that apply.) |
You do not format the extended partition. Correct! Extended partitions cannot host an operating system. Correct! Extended partitions cannot host an operating system. |
DFS Replication does not replace the need for backups because of which feature of replication? |
It replicates deleted, changed, and corrupted files. |
Which storage space resiliency type can be used to protect up to a single drive failure and requires two drives, minimum? |
Two-way mirror |
Which storage space resiliency type offers no data protection when a drive fails? |
Simple |
Which of the following is the maximum number of USB devices that can be attached to a single USB port? |
127 |
When using a hosted-cache mode server, which of the following happens if a client requests a file that is not in the cache on the server? |
The client will traverse the WAN link, download the data, and put it in the local server’s cache. |
Which storage space resiliency type can be used to protect up to a single drive failure and requires three drives, minimum? |
parity |
An administrator must deploy at least one or more BranchCache-enabled servers at the main office to enable BranchCache. Which of the following server types is not an option as a BranchCache-enabled server? |
FTP servers |
When setting target priority on a root target for a DFS domain-based namespace, users can override referral ordering and select the priority they want to use. Which of the following does the "Last among all targets" option specify? |
Users should never be referred to this target unless all other targets are unavailable. |
Which Group Policy setting is needed to disallow the usage of portable media devices on a domain’s computers? |
Prevent installation of removable devices |
Which of the following scenarios will cause BitLocker to go into recovery mode? (Choose all that apply.) |
Changing the boot order to another fixed drive Correct! Moving the BitLocker-protected drive to another computer Correct! Pressing the F8 or F10 key during the boot process |
Which of the following is created so that files are automatically scanned and classified based on their content? |
Classification rules |
Regarding Dynamic Access Control, which term describes the process of using a trusted identity provider to provide authentication? |
Claims-based access control |
Which of the following options are available for implementing BitLocker Drive Encryption? (Choose all that apply.) |
Encrypt entire drive Correct! Encrypt used disk space only |
When using TPM with BitLocker, which of the following modes can use Group Policy to enforce the usage of a strong password that must be entered before the computer can boot into Windows? |
TPM-PIN mode |
When planning NTFS/Share permissions on storage spaces or volumes in which files/folders are shared, which of the following is generally considered the best approach? |
Share permissions: Full Control, NTFS permissions: desired access |
When using TPM with BitLocker, which of the following modes requires that the user present a valid certificate via a secure method before the computer will boot into Windows? |
TPM-SmartCard mode |
Which administrative interface is provided for setting encryption policies, monitoring computers against those policies, and reporting the encryption status across organizations? |
Microsoft BitLocker Administration and Monitoring |
After creating claim types, which of the following is the next step that must be performed to allow the claim to function properly? |
Configure resource properties. |
Which of the following statements are true concerning share permissions? (Choose all that apply.) |
For drives formatted with the FAT/FAT32 file system, share permissions are the only option available. Correct! They determine the type of access that others will have to the folder when they connect to it over the network. |
When using TPM with BitLocker, which of the following modes requires that the user provide a USB flash drive with the keys before the computer can boot into Windows? |
TPM-Startup Key mode |
How can the usage of removable storage devices best be tracked on a domain’s computers? |
Configure audit policies for removable storage in Group Policy. |
When using BitLocker on domain-based computers that use the TPM-PIN mode, which of the following conditions must be met for the system volume to automatically unlock without needing the user to enter a PIN? (Choose all that apply.) |
TPM is enabled. Correct! The computer is connected to the domain over a wired connection. Correct Answer A Network Unlock server is installed on a Windows Deployment Services server. |
After creating claim types, which of the following is the next step that must be performed to allow the claim to function properly? |
Configure resource properties. |
Which of the following are default libraries included in a user profile? (Choose all that apply.) |
Music, Documents |
Which basic printer permission should be granted to a user to be able to pause, resume, restart, and cancel his own print jobs, as well as the print jobs of others? |
Manage documents |
How can Public folder sharing be turned on? |
Enable the feature by opening the Network and Sharing Center and enable the appropriate feature in Advanced Sharing Settings. |
Which of the following statements is true of public folder sharing? |
Public folder sharing places all shared files in a single location. |
The hardware that actually produces hard-copy documents is called a _________. |
Print device |
Which printing configuration makes the computer with the locally attached print device function as a print server? |
Locally attached printer sharing |
Which of the following steps begins the process of modifying the default homegroup sharing configuration? |
Select one of your shared libraries in File Explorer and click Share in the toolbar. |
Which of the following statements states the differences, physically and logically, between the two printing configurations: network-attached printing and network-attached printer sharing? |
They are essentially the same physically. Logically, the print jobs are handled differently. |
For users at home, which file sharing is most likely the simplest to set up and use? |
Homegroup sharing |
Which permission do users have by default regarding printer access and the ability to manage documents? |
By default, all printers assign the Allow Print permission to Everyone. |
In Windows, a _________ is the software interface through which a computer communicates with a print device. |
Printer |
Which of the following is not a basic printer permission? |
Take ownership |
With one of the following network printing configurations, the print devices do not need to be attached to computers; instead, they can be connected directly to the network. Identify the network printing configuration described. |
Network-attached printing |
Why are success audits as important as failure audits? |
Successes allow you to track activity such as new account creation. |
Auditing is used for which of the following purposes? |
Recording users’ actions |
Authentication is used for which of the following purposes? |
To verify a user’s identity |
Which Windows feature allows an administrator to control the amount of disk space that is made available to each user? |
Disk quotas |
Why should using basic audit policy settings and advanced audit policy settings together be avoided? |
Audit policies might cause conflicts or erratic behavior. |
Why is choosing what to audit, instead of auditing everything that a user does, a good idea? |
High levels of auditing can affect system performance. |
Which type of audit event notifies an administrator that an account failed to log on? |
Logon/Logoff |
Why is it a good idea (other than the effect on system performance) to set up auditing for only those objects that really need to be focused on? |
Searching through too many events makes finding problems more difficult. |
Authorization is used for which of the following purposes? |
To grant access to a user |
When implementing disk quotas, there are several requirements that must be met. Which of the following items is not one of those requirements for implementing disk quotas? |
Quotas apply to all users, including administrators. |
When configuring disk quotas using Group Policy, which of the following must administrators be aware of when configuring the default and warning levels in their quotas? |
The limits will only apply to users who have never written data to the volumes in scope. |
Which of the following is the purpose of implementing new audit subsettings? |
To focus on important audit items |
An administrator wants to enable disk quotas on a volume. Three users in the organization should have quota limits that are double what all other users should have. There are a total of 53 users in the organization. Which of the following methods is the most administratively efficient manner? |
Configure default quotas at the lower size and then configure specific quota entries for the three users with larger quotas. |
Which VPN protocol encapsulates PPP traffic using the Secure Sockets Layer (SSL) protocol? |
Secure Socket Tunneling Protocol (SSTP) |
Which VPN authentication protocol sends the password unencrypted? |
PAP |
Which of the following tools enables users to connect to a remote computer, including servers with no interaction required from the remote computer, so that they can interact with the Windows desktop and applications? |
Remote Desktop |
When using the CMAK to create a VPN profile, what must be done if selecting the Allow the user to choose a VPN server before connecting option? |
A text listing of VPN servers must be provided. |
Which component of SSTP ensures that if there is a break in connectivity, the user can continue without restarting the connection? |
MOBIKE |
Which VPN protocol relies on the IP security extensions (IPsec) for encryption and, as a result, performs a double encapsulation? |
Layer 2 Tunneling Protocol (L2TP) |
Which VPN authentication protocol allows third-party vendors to develop custom authentication schemes, including biometrics? |
EAP-MS-CHAP v2 |
Which VPN authentication protocol performs two-way authentication that allows users to change expired passwords during the connection process? |
MS-CHAP v2 |
How many inbound Remote Desktop connections will Windows 10 allow? |
one |
Which VPN protocol provides support for IPv6 and the new VPN Reconnect feature, as well as authentication by EAP, using PEAP, EAP-MSCHAPv2, or smart cards? |
Internet Key Exchange, Version 2 (IKEv2) |
Which VPN protocol is the oldest and least secure of the VPN protocols? |
Point-to-Point Tunneling Protocol (PPTP) |
Which VPN protocol does not support using Password Authentication Protocol (PAP), Challenge Handshake Authentication Protocol (CHAP), and Microsoft Challenge Handshake Authentication Protocol Version 2 (MSCHAPv2), and instead can only use EAP-MSCHAPv2 or a certificate for authentication? |
Internet Key Exchange, Version 2 (IKEv2) |
Which port is used by Remote Assistance and Remote Desktop? |
tcp 3389 |
Which form of authentication is used by SSTP? |
digital certificates |
In Windows 10, which of the following is the quickest method to deploy VPN settings to approximately 150 client computers? |
Use the Connection Manager Administration Kit. |
In Windows 10, which wizard can be used to make the process of setting up a VPN profile and connecting to a VPN much simpler? |
VPN Connection Wizard |
Which of the following Remote Desktop Services service roles is used to enable a server to host RemoteApp programs? |
RD Session Host |
On which of the following types of devices can the RemoteApp client be installed? (Choose all that apply.) |
Apple ios – Android – Windows Pc – Macintosh |
Which of the following is the default Web Feed URL? |
https://<servername>/RDWeb/Feed/webfeed.aspx |
Which of the following allows user to connect to virtual desktops and applications that are hosted on a remote computer via the cloud? |
RemoteApps |
Which of the following is the URL to access RemoteApp applications? |
https://Servername/RDWeb |
Which of the following statements describes how to run Azure RemoteApp on an iPhone? |
On the iPhone, install the Azure RemoteApp Client from the Apple App Store. |
Which of the following is used to enable or disable a RemoteApp program in Windows Server 2012 R2? |
The RDMS UI |
Which of the following methods ensures passwords are not saved when using Remote Desktop Services clients? |
Configure a GPO that does not allow passwords to be saved. |
In Windows Server 2016, which of the following uses several Remote Desktop Sessions Hosts to serve RemoteApps? |
Session collection |
Which of the following tasks best describes how to add a Remote App connection feed to a computer running Windows 10? |
Specify the Web Feed URL from the Access RemoteApp and Desktop Connections applet. |
Which of the following is used to manage Remote Desktop Services on a server running Windows Server 2016? |
Server Manager |
Which of the following actions creates a sync conflict? (Choose all that apply.) |
A user deleted a file in a shared folder after another person makes a change to the same file while he is offline. |
Which of the following are methods to connect to a Work Folder? (Choose three answers.) |
Group policy – Auto Discovery – URL Entry |
A user has an offline folder. While she is traveling, she is accessing and making changes to a file. However, back in the office, the file is deleted by another user. What does this cause? |
A sync conflict |
The company would like to provide users with access to their files while using their mobile devices. They want to conserve bandwidth and provide users with faster repeat access to the files while still allowing them to access the files when disconnected from the network. Which technology best fits this need? |
Transparent caching combined with Offline files and two-way synchronization |
Which of the following allows users to store and access work files from a sync share, which can then be accessed from multiple devices (including bring-your-own-devices)? |
Work Folders |
When scheduling for offline file sync, which of the following are examples of event triggers that can be configured? (Choose all that apply.) |
Correct! Logging on to your computer Correct! Locking Windows Correct! Unlocking Windows |
Which of the following tools is best to use when a user has bookmarked his favorite sites and wants to make sure they are available across multiple PCs? |
Configure them to sync via Settings. |
Which of the following are ways in which Sync Center syncs mobile devices and offline files? (Choose all that apply.) |
One-Way and Two-Way |
Which of the following statements are correct? (Choose all that apply.) |
Client Hyper-V allows users to connect to Hyper-V VMs running on other computers. Correct Answer Client Hyper-V allows users to create and run virtual machines simultaneously. Correct! Client Hyper-V consists of a Management console and a Virtual Machine Connection component. |
Which of the following tools is needed to sequence an existing application and then deploy it to Windows 10 computers? |
Microsoft Desktop Optimization Pack (MDOP) |
Which of the following programs can be used to manage RemoteApps? |
Server Manager |
Which of the following reports in the ACM provides information on whether an application works on a 32- or 64-bit operating system? |
Device report |
Which of the following features provides users with a consistent desktop experience across multiple devices (desktops, laptops, VDI)? |
User Experience Virtualization (UE-V) |
Which of the following types of packages can be created to monitor applications for compatibility prior to migrating to Windows 10? |
Runtime-analysis package |
An application will not run under Windows 10, even after running the Application Compatibility Wizard. Which of the following methods can be used so that the users can run the application? (Choose all that apply.) |
Use RemoteApp. Correct! Use App-V. Correct Answer Use Hyper-V. |
Which of the following is not a benefit of running virtual applications? |
Two versions of the application cannot be run on the same computer. |
Which of the following represent security and management tasks that can be handled with Microsoft Intune? (Choose all that apply.) |
Tracking hardware and software inventory Correct Answer Providing remote assistance Correct Answer Protecting computers from malware Correct! Managing the deployment of software updates |
After creating a runtime-analysis package, which of the following methods can be used to deploy the package on a network? (Choose all that apply.) |
Group Policy Correct Answer System Center Configuration Manager Correct Answer Storing the file on a network share Correct! Using removable media to distribute it to systems |
Which of the following tools can be used to overcome problems with User Access Control? |
Standard User Analyzer |
When using Client Hyper-V to set up a test lab, which of the following types of virtual switches should be set up to allow VMs to access the network through the network adapter on the host machine? |
External |
Which of the following options will put a PC back to a new state and will reinstall Windows, but delete files, settings, and apps, except those apps that came with the PC? |
Reset |
Which of the following approaches is considered most effective to decommission an older computer before donating it to charity? |
Initiate PC Reset. |
Which of the following Windows 10 features is used to create a restore point? |
System Restore |
Which of the following is the best method of data recovery? |
Using backups |
Which of the following best represents the time when a manual restore point should be created? |
One day before performing an installation of a new application |
How frequently does Windows 10 automatically create restore points? |
Every 7 days |
An administrator loads a driver for a new scanner, and now the scanner does not work. Which of the following is the best way to restore the old driver so that the scanner will work properly? |
Roll back the driver. |
Which of the following time frames best represents the point at which a restore point should be created? |
Prior to performing a major system event |
By default, how many days is a file deleted with OneDrive kept in the Recycle Bin? |
30 days |
Which of the following terms best describes an application designed to replace the Windows 7 Backup and Restore feature? |
File History |
Which of the following programs restores files through a familiar File Explorer interface? |
File History |
Which of the following allows users to schedule a weekly backup to a secondary disk? |
Using Windows 7 File Recovery |
Which of the following tools best represents the preferred method to back up important documents so that a previous version can be found and restored quickly? |
Correct! System files Correct! Application files |
Which of the following is the easiest way to ensure all of the corporate computers include the newest Windows updates while still ensuring that those updates do not cause any problems for the users? |
Use WSUS. |
How would you update applications on a Windows phone? |
Launch the store app and click the Updates link. |
An administrator has just added a new update to the WSUS server and she wants to test the update to the test group. Which of the following commands should she use so that she doesn’t have to wait for the update to be deployed? |
gpupdate /force |
Which of the following tools is used to remove a Windows update? |
Windows Control Panel |
A family has three computers that have Windows 10 installed. In Windows 10, how can network traffic be minimized when downloading Windows updates? |
Enable the Get updates from more than one place option. |
Which of the following types of update is a tested, cumulative set of hotfixes, security updates, critical updates, and updates, as well as additional fixes for problems found internally? |
Service pack |
Which of the following features should be selected so that machines can get updates from Windows Update or from another local computer running Windows 10 that already has the update? |
Updates from more than one place |
Which of the following update services uses distribution rings to deploy updates in phases? |
Windows Update for Business |
1168c
Share This
Unfinished tasks keep piling up?
Let us complete them for you. Quickly and professionally.
Check Price