MD-100 Vertical PDF
MD-100 Vertical PDF
129q
Number: MD-100
Passing Score: 800
Time Limit: 120 min
File Version: 5.0
MD-100
Windows 10
Version 5.0
VCEConvert.com
Testlet 1
Case Study
This is a case study. Case studies are not timed separately. You can use as much exam times as you would like to complete each case. However, there may
be additional studies and sections on this exam. You must manage your time to ensure that you are able to complete all questions included on this exam in the time
provided.
To answer the questions included in a case study, you will need to reference information that is provided in the case study. Case studies might contain exhibits and
other resources that provide more information about the scenario that is described in the case study. Each question is independent of the other questions in this case
study.
At the end of this case study, a review screen will appear. This screen allows you to review your answers and to make changes before you move to the next section
of the exam. After you begin a new section, you cannot return to this section.
Overview
Existing Environment
Fabrikam, Inc. is a distribution company that has 500 employees and 100 contractors.
Active Directory
The network contains an Active Directory forest named fabrikam.com. The forest is synced to Microsoft Azure Active Directory (Azure AD). All the employees are
assigned Microsoft 365 E3 licenses.
Client Computers
All the employees have computers that run Windows 10 Enterprise. All the computers are installed without Volume License Keys. Windows 10 license keys are never
issued.
All the employees register their computer to Azure AD when they first receive the computer.
All the contractors have their own computer that runs Windows 10. None of the computers are joined to Azure AD.
Operational Procedures
Security policies
The following security policies are enforced on all the client computers in the domain:
All the computers are encrypted by using BitLocker Drive Encryption (BitLocker). BitLocker recovery information is stored in Active Directory and Azure AD.
The local Administrators group on each computer contains an enabled account named LocalAdmin.
The LocalAdmin account is managed by using Local Administrator Password Solution (LAPS).
Problem Statements
Employees in the finance department use an application named Application1. Application1 frequently crashes due to a memory error. When Application1 crashes,
an event is written to the application log and an administrator runs a script to delete the temporary files and restart the application.
When employees attempt to connect to the network from their home computer, they often cannot establish a VPN connection because of misconfigured VPN
settings.
An employee has a computer named Computer11. Computer11 has a hardware failure that prevents the computer from connecting to the network.
User10 reports that Computer10 is not activated.
Technical requirements
Fabrikam identifies the following technical requirements for managing the client computers:
QUESTION 1
HOTSPOT
What should you do? To answer, select the appropriate options in the answer area.
Hot Area:
Correct Answer:
Section: [none]
VCEConvert.com
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/windows/configuration/provisioning-packages/provisioning-install-icd
QUESTION 2
You need to ensure that User10 can activate Computer10.
A. Request that a Windows 10 Enterprise license be assigned to User10, and then activate Computer10.
B. From the Microsoft Deployment Toolkit (MDT), add a Volume License Key to a task sequence, and then redeploy Computer10.
C. From System Properties on Computer10, enter a Volume License Key, and then activate Computer10.
D. Request that User10 perform a local AutoPilot Reset on Computer10, and then activate Computer10.
Correct Answer: D
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/windows/deployment/windows-autopilot/windows-autopilot-requirements-licensing
VCEConvert.com
Testlet 2
Case Study
This is a case study. Case studies are not timed separately. You can use as much exam times as you would like to complete each case. However, there may
be additional studies and sections on this exam. You must manage your time to ensure that you are able to complete all questions included on this exam in the time
provided.
To answer the questions included in a case study, you will need to reference information that is provided in the case study. Case studies might contain exhibits and
other resources that provide more information about the scenario that is described in the case study. Each question is independent of the other questions in this case
study.
At the end of this case study, a review screen will appear. This screen allows you to review your answers and to make changes before you move to the next section
of the exam. After you begin a new section, you cannot return to this section.
Overview
Contoso, Ltd. is a consulting company that has a main office in Montreal and two branch offices in Seattle and New York.
Contoso recently opened a new branch office in San Diego. All the users in the San Diego office work from home.
Existing environment
The on-premises network contains an Active Directory domain named contoso.com. The domain is synced to Microsoft Azure Active Directory (Azure AD).
You have four computers named Computer1, Computer2, Computer3, and ComputerA. ComputerA is in a workgroup on an isolated network segment and runs the
Long Term Servicing Channel version of Windows 10. ComputerA connects to a manufacturing system and is business critical. All the other computers are joined to
the domain and run the Semi-Annual Channel version of Windows 10.
In the domain, you create four groups named Group1, Group2, Group3, and Group4.
Computer2 has the local Group Policy settings shown in the following table.
VCEConvert.com
The computers are updated by using Windows Update for Business.
Requirements
Planned Changes
Contoso plans to purchase computers preinstalled with Windows 10 Pro for all the San Diego office users.
Technical requirements
The computers in the San Diego office must be upgraded automatically to Windows 10 Enterprise and must be joined to Azure AD the first time a user starts each
new computer. End users must not be required to accept the End User License Agreement (EULA).
VCEConvert.com
Helpdesk users must be able to troubleshoot Group Policy object (GPO) processing on the Windows 10 computers. The helpdesk users must be able to identify
which Group Policies are applied to the computers.
Users in the HR department must be able to view the list of files in a folder named D:\Reports on Computer3.
ComputerA must be configured to have an Encrypting File System (EFS) recovery agent.
Quality update installations must be deferred as long as possible on ComputerA.
Users in the IT department must use dynamic look on their primary device.
User6 must be able to connect to Computer2 by using Remote Desktop.
The principle of least privilege must be used whenever possible.
Administrative effort must be minimized whenever possible.
Assigned access must be configured on Computer1.
QUESTION 1
You need to meet the technical requirements for the San Diego office computers.
Correct Answer: D
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/windows/deployment/windows-autopilot/windows-autopilot
QUESTION 2
HOTSPOT
What should you do? To answer, select the appropriate options in the answer area.
Hot Area:
VCEConvert.com
Correct Answer:
VCEConvert.com
Section: [none]
Explanation
Explanation/Reference:
VCEConvert.com
Question Set 3
QUESTION 1
Your company has an isolated network used for testing. The network contains 20 computers that run Windows 10. The computers are in a workgroup. During testing,
the computers must remain in the workgroup.
You need to recommend a solution to activate the computers without connecting the network to the Internet.
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/windows/deployment/volume-activation/activate-using-key-management-service-vamt
QUESTION 2
You plan to deploy Windows 10 to 100 secure computers.
You need to select a version of Windows 10 that meets the following requirements:
What is the best version to achieve the goal? More than one answer choice may achieve the goal. Select the BEST answer.
Correct Answer: C
Section: [none]
Explanation
VCEConvert.com
Explanation/Reference:
References:
https://www.microsoft.com/en-za/windows/compare
QUESTION 3
DRAG DROP
You have a computer named Computer1 that runs Windows 7. Computer1 has a local user named User1 who has a customized profile.
On Computer1, you perform a clean installation of Windows 10 without formatting the drives.
You need to migrate the settings of User1 from Windows7 to Windows 10.
Which two actions should you perform? To answer, drag the appropriate actions to the correct targets. Each action may be used once, more than once, or not at all.
You may need to drag the split bar between panes or scroll to view content.
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/windows/deployment/usmt/usmt-how-it-works
QUESTION 4
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might
meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
VCEConvert.com
You discover that a user used the Service1 account to sign in to Computer1 and deleted some files.
You need to ensure that the identity used by Application1 cannot be used by a user to sign in to sign in to the desktop on Computer1. The solution must use the
principle of least privilege.
Solution: On Computer1, you configure Application1 to sign in as the LocalSystem account and select the Allow service to interact with desktop check box. You
delete the Service1 account.
A. Yes
B. No
Correct Answer: B
Section: [none]
VCEConvert.com
Explanation
Explanation/Reference:
QUESTION 5
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might
meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You discover that a user used the Service1 account to sign in to Computer1 and deleted some files.
VCEConvert.com
You need to ensure that the identity used by Application1 cannot be used by a user to sign in to sign in to the desktop on Computer1. The solution must use the
principle of least privilege.
Solution: On Computer1, you assign Service1 the deny log on locally user right.
A. Yes
B. No
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/windows/security/threat-protection/security-policy-settings/deny-log-on-locally
QUESTION 6
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might
meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
VCEConvert.com
You discover that a user used the Service1 account to sign in to Computer1 and deleted some files.
You need to ensure that the identity used by Application1 cannot be used by a user to sign in to sign in to the desktop on Computer1. The solution must use the
principle of least privilege.
Solution: On Computer1, you assign Service1 the deny log on as a service user right.
A. Yes
B. No
Correct Answer: A
Section: [none]
Explanation
VCEConvert.com
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/windows/security/threat-protection/security-policy-settings/deny-log-on-as-a-service
QUESTION 7
You have a Microsoft Azure Active Directory (Azure AD) tenant.
Some users sign in to their computer by using Windows Hello for Business.
A user named User1 purchases a new computer and joins the computer to Azure AD.
User1 attempts to configure the sign-in options and receives the error message shown in the exhibit.
You open Device Manager and confirm that all the hardware works correctly.
You need to ensure that User1 can use Windows Hello for Business facial recognition to sign in to the computer.
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/windows/security/identity-protection/hello-for-business/hello-planning-guide
VCEConvert.com
QUESTION 8
Your company uses Microsoft Deployment Toolkit (MDT) to deploy Windows 10 to new computers.
You need to ensure that the Hyper-V feature is enabled on the computers during the deployment.
What are two possible ways to achieve the goal? Each correct answer presents part of the solution.
Correct Answer: AC
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/windows/deployment/deploy-windows-mdt/create-a-windows-10-reference-image
QUESTION 9
Your network contains an Active Directory domain that is synced to a Microsoft Azure Active Directory (Azure AD) tenant.
You need to migrate the Documents folder of users to Microsoft OneDrive for Business.
Correct Answer: A
Section: [none]
Explanation
Explanation/Reference:
References:
VCEConvert.com
https://docs.microsoft.com/en-us/onedrive/redirect-known-folders?redirectSourcePath=%252fen-us%252farticle%252fredirect-windows-known-folders-to-onedrive-
e1b3963c-7c6c-4694-9f2f-fb8005d9ef12
QUESTION 10
Your network contains an Active Directory domain. The domain contains a user named User1.
User1 needs to sign in to cloud resources by using the Microsoft account without being prompted for credentials.
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
References:
https://support.microsoft.com/en-za/help/4028195/microsoft-account-how-to-sign-in
QUESTION 11
HOTSPOT
Your network contains an Active Directory domain named adatum.com that uses Key Management Service (KMS) for activation.
How should you complete the command? To answer, select the appropriate options in the answer area.
Hot Area:
VCEConvert.com
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
References:
https://blogs.technet.microsoft.com/odsupport/2011/11/14/how-to-discover-office-and-windows-kms-hosts-via-dns-and-remove-unauthorized-instances/
QUESTION 12
HOTSPOT
You create a file named LayoutModification.xml in the C:\Users\Default\AppData\Local\Microsoft\Windows\Shell\folder. LayoutModification.xml contains the following
markup.
VCEConvert.com
What is the effect of the configuration? To answer, select the appropriate options in the answer area.
Hot Area:
Correct Answer:
VCEConvert.com
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/windows/configuration/configure-windows-10-taskbar
VCEConvert.com
Testlet 1
Case Study
This is a case study. Case studies are not timed separately. You can use as much exam times as you would like to complete each case. However, there may
be additional studies and sections on this exam. You must manage your time to ensure that you are able to complete all questions included on this exam in the time
provided.
To answer the questions included in a case study, you will need to reference information that is provided in the case study. Case studies might contain exhibits and
other resources that provide more information about the scenario that is described in the case study. Each question is independent of the other questions in this case
study.
At the end of this case study, a review screen will appear. This screen allows you to review your answers and to make changes before you move to the next section
of the exam. After you begin a new section, you cannot return to this section.
Overview
Existing Environment
Fabrikam, Inc. is a distribution company that has 500 employees and 100 contractors.
Active Directory
The network contains an Active Directory forest named fabrikam.com. The forest is synced to Microsoft Azure Active Directory (Azure AD). All the employees are
assigned Microsoft 365 E3 licenses.
Client Computers
All the employees have computers that run Windows 10 Enterprise. All the computers are installed without Volume License Keys. Windows 10 license keys are never
issued.
All the employees register their computer to Azure AD when they first receive the computer.
All the contractors have their own computer that runs Windows 10. None of the computers are joined to Azure AD.
Operational Procedures
Security policies
The following security policies are enforced on all the client computers in the domain:
All the computers are encrypted by using BitLocker Drive Encryption (BitLocker). BitLocker recovery information is stored in Active Directory and Azure AD.
The local Administrators group on each computer contains an enabled account named LocalAdmin.
The LocalAdmin account is managed by using Local Administrator Password Solution (LAPS).
Problem Statements
Employees in the finance department use an application named Application1. Application1 frequently crashes due to a memory error. When Application1 crashes,
an event is written to the application log and an administrator runs a script to delete the temporary files and restart the application.
When employees attempt to connect to the network from their home computer, they often cannot establish a VPN connection because of misconfigured VPN
settings.
An employee has a computer named Computer11. Computer11 has a hardware failure that prevents the computer from connecting to the network.
User10 reports that Computer10 is not activated.
Technical requirements
Fabrikam identifies the following technical requirements for managing the client computers:
QUESTION 1
You need to sign in as LocalAdmin on Computer11.
A. From the LAPS UI tool, view the administrator account password for the computer object of Computer11.
B. From Windows Configuration Designer, create a configuration package that sets the password of the LocalAdmin account on Computer11.
C. Use a Group Policy object (GPO) to set the local administrator password.
D. From Microsoft Intune, set the password of the LocalAdmin account on Computer11.
Correct Answer: A
Section: [none]
Explanation
VCEConvert.com
Explanation/Reference:
References:
https://technet.microsoft.com/en-us/mt227395.aspx
QUESTION 2
An employee reports that she must perform a BitLocker recovery on her laptop. The employee does not have her BitLocker recovery key but does have a Windows
10 desktop computer.
What should you instruct the employee to do from the desktop computer?
Correct Answer: C
Section: [none]
Explanation
Explanation/Reference:
References:
https://celedonpartners.com/blog/storing-recovering-bitlocker-keys-azure-active-directory/
VCEConvert.com
Testlet 2
Case Study
This is a case study. Case studies are not timed separately. You can use as much exam times as you would like to complete each case. However, there may
be additional studies and sections on this exam. You must manage your time to ensure that you are able to complete all questions included on this exam in the time
provided.
To answer the questions included in a case study, you will need to reference information that is provided in the case study. Case studies might contain exhibits and
other resources that provide more information about the scenario that is described in the case study. Each question is independent of the other questions in this case
study.
At the end of this case study, a review screen will appear. This screen allows you to review your answers and to make changes before you move to the next section
of the exam. After you begin a new section, you cannot return to this section.
Overview
Contoso, Ltd. is a consulting company that has a main office in Montreal and two branch offices in Seattle and New York.
Contoso recently opened a new branch office in San Diego. All the users in the San Diego office work from home.
Existing environment
The on-premises network contains an Active Directory domain named contoso.com. The domain is synced to Microsoft Azure Active Directory (Azure AD).
You have four computers named Computer1, Computer2, Computer3, and ComputerA. ComputerA is in a workgroup on an isolated network segment and runs the
Long Term Servicing Channel version of Windows 10. ComputerA connects to a manufacturing system and is business critical. All the other computers are joined to
the domain and run the Semi-Annual Channel version of Windows 10.
In the domain, you create four groups named Group1, Group2, Group3, and Group4.
Computer2 has the local Group Policy settings shown in the following table.
VCEConvert.com
The computers are updated by using Windows Update for Business.
Requirements
Planned Changes
Contoso plans to purchase computers preinstalled with Windows 10 Pro for all the San Diego office users.
Technical requirements
The computers in the San Diego office must be upgraded automatically to Windows 10 Enterprise and must be joined to Azure AD the first time a user starts each
new computer. End users must not be required to accept the End User License Agreement (EULA).
Helpdesk users must be able to troubleshoot Group Policy object (GPO) processing on the Windows 10 computers. The helpdesk users must be able to identify
VCEConvert.com
which Group Policies are applied to the computers.
Users in the HR department must be able to view the list of files in a folder named D:\Reports on Computer3.
ComputerA must be configured to have an Encrypting File System (EFS) recovery agent.
Quality update installations must be deferred as long as possible on ComputerA.
Users in the IT department must use dynamic look on their primary device.
User6 must be able to connect to Computer2 by using Remote Desktop.
The principle of least privilege must be used whenever possible.
Administrative effort must be minimized whenever possible.
Assigned access must be configured on Computer1.
QUESTION 1
HOTSPOT
You need to meet the technical requirements for the helpdesk users.
What should you do? To answer, select the appropriate options in the answer area.
Hot Area:
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
References:
https://www.itprotoday.com/compute-engines/what-group-policy-creator-owners-group
QUESTION 2
HOTSPOT
You need to meet the technical requirements for the HR department users.
Which permissions should you assign to the HR department users for the D:\Reports folder? To answer, select the appropriate permissions in the answer area.
Hot Area:
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
References:
VCEConvert.com
https://www.online-tech-tips.com/computer-tips/set-file-folder-permissions-windows/
QUESTION 3
You need to meet the technical requirements for EFS on ComputerA.
A. Run certutil.exe, and then add a certificate to the local computer certificate store.
B. Run cipher.exe, and then add a certificate to the local computer certificate store.
C. Run cipher.exe, and then add a certificate to the local Group Policy.
D. Run certutil.exe, and then add a certificate to the local Group Policy.
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/windows/security/information-protection/windows-information-protection/create-and-verify-an-efs-dra-certificate
VCEConvert.com
Question Set 3
QUESTION 1
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might
meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a computer named Computer1 that runs Windows 10. The computer contains a folder. The folder contains sensitive data.
You need to log which user reads the contents of the folder and modifies and deletes files in the folder.
Solution: From the properties of the folder, you configure the Auditing settings and from Audit Policy in the local Group Policy, you configure Audit object access.
A. Yes
B. No
Correct Answer: A
Section: [none]
Explanation
Explanation/Reference:
References:
https://www.netwrix.com/how_to_detect_who_changed_file_or_folder_owner.html
QUESTION 2
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might
meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a computer named Computer1 that runs Windows 10. The computer contains a folder. The folder contains sensitive data.
You need to log which user reads the contents of the folder and modifies and deletes files in the folder.
Solution: From the properties of the folder, you configure the Auditing settings and from the Audit Policy in the local Group Policy, you configure Audit directory
service access.
A. Yes
B. No
Correct Answer: B
Section: [none]
VCEConvert.com
Explanation
Explanation/Reference:
References:
https://www.netwrix.com/how_to_detect_who_changed_file_or_folder_owner.html
QUESTION 3
HOTSPOT
You turn on System Protection and create a restore point named Point1.
Add four files named File1.txt, File2.dll, File3.sys, and File4.exe to the desktop.
Run a configuration script that adds the following four registry keys:
- Key1 to HKEY_CURRENT_USER
- Key2 to HKEY_CLASSES_ROOT
- Key3 to HKEY_LOCAL_MACHINE\SYSTEM
- Key4 to HKEY_CURRENT_CONFIG
Which files and registry keys are removed? To answer, select the appropriate options in the answer area.
Hot Area:
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
References:
https://www.maketecheasier.com/what-system-restore-can-and-cannot-do-to-your-windows-system/
https://superuser.com/questions/343112/what-does-windows-system-restore-exactly-back-up-and-restore
QUESTION 4
HOTSPOT
VCEConvert.com
Which two settings should you configure? To answer, select the appropriate options in the answer area.
Hot Area:
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/windows/deployment/update/waas-manage-updates-wsus#configure-automatic-updates-and-update-service-location
QUESTION 5
Your network contains an Active Directory domain. The domain contains 1,000 computers that run Windows 10.
You discover that when users are on their lock screen, they see a different background image every day, along with tips for using different features in Windows 10.
You need to disable the tips and the daily background image for all the Windows 10 computers.
Correct Answer: D
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/windows/configuration/windows-spotlight
QUESTION 6
HOTSPOT
You have a computer named Computer1 that runs Windows 10. Computer1 contains a folder named Data on drive C. The Advanced Security Settings for the Data
folder are shown in the exhibit. (Click the Exhibit tab.)
VCEConvert.com
You share C:\Data as shown in the following table.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Hot Area:
VCEConvert.com
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
Explanation:
User1 cannot write files when connected to \\Computer1\Data because the Users group only has Read & Execute NTFS permission to the C:\Data folder and there
are no explicit NTFS permissions for User1.
User1 cannot write files locally because the Users group only has Read & Execute NTFS permission to the C:\Data folder and there are no explicit NTFS permissions
for User1.
Administrators cannot change the NTFS permissions of files and folders when connected to \\Computer1\Data because they only have Change share permission.
The would need Full Control share permission. They could do it locally because they have Full Control NTFS permission.
QUESTION 7
You have a file named Reg1.reg that contains the following content.
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
QUESTION 8
You have a computer named Computer1 that runs Windows 10.
VCEConvert.com
On Computer1, you create the local users shown in the following table.
Which three user profiles will persist after each user signs out? Each correct answer presents part of the solution.
A. User1
B. User2
C. User3
D. User4
E. User5
Explanation/Reference:
QUESTION 9
HOTSPOT
You have a computer that runs Windows 10. The computer is in a workgroup. The computer is used to provide visitors with access to the Internet.
VCEConvert.com
Always sign in automatically as User1.
Start an application named App1.exe at sign-in.
What should you use to meet each requirement? To answer, select the appropriate options in the answer area.
Hot Area:
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
References:
http://www.itexpertmag.com/server/complete-manageability-at-no-extra-cost
QUESTION 10
You have 20 computers that run Windows 10. The computers are in a workgroup.
You need to create a local user named Admin1 on all the computers. Admin1 must be a member of the Remote Management Users group.
A. From Windows Configuration Designer, create a provisioning package, and then run the provisioning package on each computer.
B. Create a script that runs the New-ADUser cmdlet and the Set-AdGroup cmdlet.
C. Create a Group Policy object (GPO) that contains the Local User Group Policy preference.
D. Create a script that runs the New-MsolUser cmdlet and the Add-ADComputerServiceAccount cmdlet.
Correct Answer: C
Section: [none]
Explanation
Explanation/Reference:
References:
https://blogs.technet.microsoft.com/askpfeplat/2017/11/06/use-group-policy-preferences-to-manage-the-local-administrator-group/
QUESTION 11
You have several computers that run Windows 10. The computers are in a workgroup and have BitLocker Drive Encryption (BitLocker) enabled.
You join the computers to Microsoft Azure Active Directory (Azure AD).
You need to ensure that you can recover the BitLocker recovery key for the computers from Azure AD.
VCEConvert.com
A. Disable BitLocker.
B. Add a BitLocker key protector.
C. Suspend BitLocker.
D. Disable the TMP chip.
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/windows/security/information-protection/bitlocker/prepare-your-organization-for-bitlocker-planning-and-policies#bitlocker-key-
protectors
QUESTION 12
HOTSPOT
Your network contains an Active Directory forest. The forest contains a root domain named contoso.com and a child domain named corp.contoso.com.
You have a computer named Computer1 that runs Windows 10. Computer1 is joined to the corp.contoso.com domain.
Computer1 contains a folder named Folder1. In the Security settings of Folder1, Everyone is assigned the Full control permissions.
On Computer1, you share Folder1 as Share1 and assign the Read permissions for Share1 to the Users group.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Hot Area:
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
References:
https://www.techrepublic.com/article/learn-the-basic-differences-between-share-and-ntfs-permissions/
QUESTION 13
HOTSPOT
You have a computer named Computer1 that runs Windows 10. Computer1 is in a workgroup.
VCEConvert.com
On Computer1, you create the users shown in the following table.
What is the effect of the configuration? To answer, select the appropriate options in the answer area.
Hot Area:
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
References:
https://support.microsoft.com/en-za/help/310316/how-permissions-are-handled-when-you-copy-and-move-files-and-folders
QUESTION 14
HOTSPOT
You have a computer named Computer1 that runs Windows 10 and is joined to an Active Directory domain named adatum.com.
A user named Admin1 signs in to Computer1 and runs the whoami command as shown in the following exhibit.
VCEConvert.com
Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.
Hot Area:
Correct Answer:
Section: [none]
VCEConvert.com
Explanation
Explanation/Reference:
QUESTION 15
You have a computer named Computer1 that runs Windows 10.
You need to configure User Account Control (UAC) to prompt administrators for their credentials.
Correct Answer: C
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/windows/security/identity-protection/user-account-control/user-account-control-security-policy-settings
QUESTION 16
You have several computers that run Windows 10. The computers are in a workgroup.
You need to prevent users from using Microsoft Store apps on their computer.
What are two possible ways to achieve the goal? Each correct answer presents part of the solution.
A. From Security Settings in the local Group Policy, configure Security Options.
B. From Administrative Templates in the local Group Policy, configure the Store settings.
C. From Security Settings in the local Group Policy, configure Software Restriction Policies.
D. From Security Settings in the local Group Policy, configure Application Control Policies.
Correct Answer: BD
Section: [none]
Explanation
Explanation/Reference:
References:
https://www.techrepublic.com/article/how-to-manage-your-organizations-microsoft-store-group-policy/
VCEConvert.com
QUESTION 17
You have a computer named Computer1 that runs Windows 10.
You need to prevent standard users from changing the wireless network settings on Computer1. The solution must allow administrators to modify the wireless
network settings.
Correct Answer: C
Section: [none]
Explanation
Explanation/Reference:
QUESTION 18
HOTSPOT
You have three computers that run Windows 10 as shown in the following table.
All the computers have C and D volumes. The Require additional authentication at startup Group Policy settings is disabled on all the computers.
Which volumes can you encrypt by using BitLocker Drive Encryption (BitLocker)? To answer, select the appropriate options in the answer area.
Hot Area:
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
References:
VCEConvert.com
https://www.windowscentral.com/how-use-bitlocker-encryption-windows-10
QUESTION 19
Your network contains an Active Directory domain named contoso.com. The domain contains named Computer1 that runs Windows 10.
On Computer1, you create an NTFS folder and assign Full control permissions to Everyone.
You share the folder as Share1 and assign the permissions shown in the following table.
When accessing Share1, which two actions can be performed by User1 but not by User2? Each correct answer presents part of the solution.
Correct Answer: BD
Section: [none]
Explanation
Explanation/Reference:
References:
https://www.varonis.com/blog/ntfs-permissions-vs-share/
QUESTION 20
HOTSPOT
You have a computer that runs Windows 10. The computer contains a folder named C:\ISOs that is shared in ISOs.
You run several commands on the computer as shown in the following exhibit.
VCEConvert.com
Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.
Hot Area:
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
QUESTION 21
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might
meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
VCEConvert.com
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
A user named User1 has a computer named Computer1 that runs Windows 10. Computer1 is joined to an Azure Active Directory (Azure AD) tenant named
contoso.com. User1 joins Computer1 to contoso.com by using user1@contoso.com.
Computer1 contains a folder named Folder1. Folder1 is in drive C and is shared as Share1. Share1 has the permission shown in the following table.
A user named User2 has a computer named Computer2 that runs Windows 10. User2 joins Computer2 to contoso.com by using user2@contoso.com.
User2 attempts to access Share1 and receives the following error message: “The username or password is incorrect.”
Solution: In Azure AD, you create a group named Group1 that contains User1 and User2. You grant Group1 Change access to Share1.
A. Yes
B. No
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc754178(v%3dws.10)
QUESTION 22
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might
meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
A user named User2 has a computer named Computer2 that runs Windows 10. User2 joins Computer2 to contoso.com by using user2@contoso.com.
Computer1 contains a folder named Folder1. Folder1 is in drive C and is shared as Share1. Share1 has the permission shown in the following table.
VCEConvert.com
A user named User2 has a computer named Computer2 that runs Windows 10. User2 joins Computer2 to contoso.com by using user2@contoso.com.
User2 attempts to access Share1 and receives the following error message: “The username or password is incorrect.”
Solution: You create a local user account on Computer1 and instruct User2 to use the local account to connect to Share1.
A. Yes
B. No
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
QUESTION 23
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might
meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
A user named User1 has a computer named Computer1 that runs Windows 10. Computer1 is joined to an Azure Active Directory (Azure AD) tenant named
contoso.com. User1 joins Computer1 to contoso.com by using user1@contoso.com.
Computer1 contains a folder named Folder1. Folder1 is in drive C and is shared as Share1. Share1 has the permission shown in the following table.
A user named User2 has a computer named Computer2 that runs Windows 10. User2 joins Computer2 to contoso.com by using user2@contoso.com.
User2 attempts to access Share1 and receives the following error message: “The username or password is incorrect.”
VCEConvert.com
Solution: In Azure AD, you create a group named Group1 that contains User1 and User2. You grant Group1 Modify access to Folder1.
A. Yes
B. No
Correct Answer: A
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc754178(v%3dws.10)
QUESTION 24
You have a computer named Computer1 that runs Windows 10. Computer1 contains a folder named Folder1.
You need to log any users who take ownership of the files in Folder1.
Which two actions should you perform? Each correct answer presents part of the solution.
Correct Answer: BD
Section: [none]
Explanation
Explanation/Reference:
References:
https://www.netwrix.com/how_to_detect_who_changed_file_or_folder_owner.html
QUESTION 25
HOTSPOT
Your network contains an Active Directory domain. The domain contains the users shown in the following table.
VCEConvert.com
The domain contains a computer named Computer1 that runs Windows 10. Computer1 contains a folder named Folder1 that has the following permissions:
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Hot Area:
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
VCEConvert.com
References:
https://www.varonis.com/blog/ntfs-permissions-vs-share/
http://www.ntfs.com/ntfs-permissions-file-advanced.htm
https://docs.microsoft.com/en-us/windows-server/storage/dfs-namespaces/enable-access-based-enumeration-on-a-namespace
QUESTION 26
You are a network administrator at your company.
The company uses an application that checks for network connectivity to a server by sending a ping request to the IPv6 address of the server replies, the application
loads.
You manually send the ping request from the computer of the user and the server does not reply. You send the ping request from your computer and the server
replies.
You need to ensure that the ping request works from the user’s computer.
Correct Answer: D
Section: [none]
Explanation
Explanation/Reference:
References:
https://www.howtogeek.com/howto/windows-vista/allow-pings-icmp-echo-request-through-your-windows-vista-firewall/
QUESTION 27
HOTSPOT
Use the drop-down menus to select the answer choice that completes each statement based on the information presented on the graphic.
VCEConvert.com
NOTE: Each correct selection is worth one point.
Hot Area:
VCEConvert.com
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
QUESTION 28
HOTSPOT
You have a computer named Computer5 that runs Windows 10 that is used to share documents in a workgroup.
You create three users named User-a, User-b, User-c. The users plan to access Computer5 from the network only.
You have a folder named Data. The Advanced Security Settings for the Data folder are shown in the Security exhibit. (Click the Security Exhibit tab).
VCEConvert.com
You share the Data folder. The permission for User-a are shown in the User-a exhibit (Click the User-a tab.)
VCEConvert.com
The permissions for user-b are shown in the User-b exhibit. (Click the User-b tab.)
VCEConvert.com
The permissions for user-c are shown in the User-c exhibit. (Click the User-c tab.)
VCEConvert.com
For each of the following statements, select Yes if the statements is true. Otherwise, select No.
Hot Area:
VCEConvert.com
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
QUESTION 29
HOTSPOT
You have a computer that runs Windows 10 and contains the folders shown in the following table.
On FolderA, you remove permission inheritance. To each folder, you assign the NTFS permissions shown in the following table.
VCEConvert.com
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Hot Area:
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/windows/security/identity-protection/access-control/access-control
QUESTION 30
VCEConvert.com
Your network contains an Active Directory domain. The domain contains a computer named Computer1 that runs Windows 10.
You need to view the settings to Computer1 by Group Policy objects (GPOs) in the domain and local Group Policies.
A. gpresult
B. secedit
C. gpupdate
D. gpfixup
Correct Answer: A
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/gpresult
QUESTION 31
Your network contains an Active Directory domain. The domain contains computers that run Windows 10.
You need to provide a user with the ability to remotely create and modify shares on the computers. The solution must use the principle of least privilege.
A. Power Users
B. Remote Management Users
C. Administrators
D. Network Configuration Operators
Correct Answer: C
Section: [none]
Explanation
Explanation/Reference:
QUESTION 32
You have a computer named Computer1 that runs Windows 10. Computer1 belongs to a workgroup.
VCEConvert.com
What is the effect of the configurations?
A. User1 is prevented from signing in until the user is assigned additional user rights.
B. User1 appears on the sign-in screen and can sign in without a password.
C. User1 is prevented from signing in until an administrator manually sets a password for the user.
D. User1 appears on the sign-in screen and must set a new password on the first sign-in attempts.
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.localaccounts/new-localuser?view=powershell-5.1
QUESTION 33
You have a computer that runs Windows 10 and is joined to Azure Active Directory (Azure AD).
You attempt to open Control Panel and receive the error message shown on the following exhibit.
VCEConvert.com
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
References:
https://windows10skill.com/this-operation-has-been-cancelled-due-to-restrictions-in-effect-on-this-pc/
QUESTION 34
HOTSPOT
Your domain contains named Computer named Computer1 that runs Windows 10. Computer1 does not have a TPM.
You need to be able to encrypt the C drive by using Bitlocker Drive Encryption (BitLocker). The solution must ensure that the recovery key is stored in Active
Directory.
Which two Group Policy settings should you configure? To answer, select the appropriate settings in the answer area.
Hot Area:
VCEConvert.com
Correct Answer:
VCEConvert.com
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/windows/security/information-protection/bitlocker/bitlocker-group-policy-settings#bkmk-rec1
QUESTION 35
You have a public computer named Computer1 that runs Windows 10/ Computer1 contains a folder named Folder1.
You need to provide a user named User1 with the ability to modify the permissions of Folder1. The solution must use the principle of least privilege.
VCEConvert.com
Which NTFS permission should you assign to User1?
A. Full control
B. Modify
C. Write
D. Read & execute
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc754344%28v%3dws.10%29
QUESTION 36
You have 10 computers that run Windows 10 and have BitLocker Drive Encryption (BitLocker) enabled.
You need to ensure that you are not prompted for the BitLocker recovery key on the next restart. The drive must be protected by BitLocker on subsequent restarts.
A. Unlock-BitLocker
B. Disable-BitLocker
C. Add-BitLockerKeyProtector
D. Suspend-BitLocker
Correct Answer: D
Section: [none]
Explanation
Explanation/Reference:
References:
https://support.microsoft.com/en-us/help/4057282/bitlocker-recovery-key-prompt-after-surface-uefi-tpm-firmware-update
QUESTION 37
HOTSPOT
You run gpresult /user user1 /v and receive the output shown in the following exhibit.
VCEConvert.com
Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.
Hot Area:
VCEConvert.com
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
References:
https://www.windowscentral.com/how-apply-local-group-policy-settings-specific-users-windows-10
QUESTION 38
HOTSPOT
VCEConvert.com
You have a computer named Computer1 that runs Windows 10. Computer1 is in a workgroup.
You create a folder named Folder1 that has the permissions shown in the following table.
You create a file named File1.txt in Folder1 and allow Group2 Full control permissions to File1.txt.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Hot Area:
VCEConvert.com
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
References:
https://www.dell.com/support/article/za/en/zadhs1/sln156352/understanding-file-and-folder-permissions-in-windows?lang=en
QUESTION 39
HOTSPOT
You have a workgroup computer named Computer1 that runs Windows 10. Computer1 has the users accounts shown in the following table:
Computer1 has the local Group Policy shown in the following table.
VCEConvert.com
You create the Local Computer\Administrators policy shown in the following table.
You create the Local Computer\Non-Administrators policy shown in the following table.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Hot Area:
Correct Answer:
VCEConvert.com
Section: [none]
Explanation
Explanation/Reference:
Reference:
https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-vista/cc766291(v=ws.10)
QUESTION 40
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might
meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
A user named User2 has a computer named Computer2 that runs Windows 10. User2 joins Computer2 to contoso.com by using user2@contoso.com.
Computer1 contains a folder named Folder1. Folder1 is in drive C and is shared as Share1. Share1 has the permission shown in the following table.
A user named User2 has a computer named Computer2 that runs Windows 10. User2 joins Computer2 to contoso.com by using user2@contoso.com.
User2 attempts to access Share1 and receives the following error message: “The username or password is incorrect.”
Solution: You create a local group on Computer1 and add the Guest account to the group. You grant the group Modify access to Share1.
VCEConvert.com
A. Yes
B. No
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
QUESTION 41
Your network contains an Active Directory domain. The domain contains 1,000 computers that run Windows 10.
You need to prevent the computers of the research department from appearing in Network in File Explorer.
Correct Answer: C
Section: [none]
Explanation
Explanation/Reference:
QUESTION 42
HOTSPOT
You have two computers named Computer1 and Computer2 that run Windows 10. The computers are in a workgroup.
Create a user named User1 and specify the same user password as the one set on Computer1.
Create a share named Share2 and grant User1 Full control access to Share2.
Enable Remote Desktop.
What are the effects of the configurations? To answer, select the appropriate options in the answer area.
VCEConvert.com
NOTE: Each correct selection is worth one point.
Hot Area:
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
QUESTION 43
HOTSPOT
Your network contains an Active Directory domain. The domain contains a group named Group1.
All the computers in the domain run Windows 10. Each computer contains a folder named C:\Documents that has the default NTFS permissions set.
VCEConvert.com
You need to configure the NTFS permissions to meet the following requirements:
All domain users must be able to open the files in the Templates folder.
Only the members of Group1 must be allowed to edit the files in the Templates folder.
How should you configure the NTFS settings on the Templates folder? To answer, select the appropriate options in the answer area.
Hot Area:
Correct Answer:
VCEConvert.com
Section: [none]
Explanation
Explanation/Reference:
QUESTION 44
You deploy Windows 10 to 20 new laptops.
The laptops will be used by users who work at customer sites. Each user will be assigned one laptop and one Android device.
You need to recommend a solution to lock the laptop when the users leave their laptop for an extended period.
Which two actions should you include in the recommendation? Each correct answer presents part of the solution.
Correct Answer: DF
Section: [none]
Explanation
Explanation/Reference:
VCEConvert.com
Testlet 1
Case Study
This is a case study. Case studies are not timed separately. You can use as much exam times as you would like to complete each case. However, there may
be additional studies and sections on this exam. You must manage your time to ensure that you are able to complete all questions included on this exam in the time
provided.
To answer the questions included in a case study, you will need to reference information that is provided in the case study. Case studies might contain exhibits and
other resources that provide more information about the scenario that is described in the case study. Each question is independent of the other questions in this case
study.
At the end of this case study, a review screen will appear. This screen allows you to review your answers and to make changes before you move to the next section
of the exam. After you begin a new section, you cannot return to this section.
Overview
Existing Environment
Fabrikam, Inc. is a distribution company that has 500 employees and 100 contractors.
Active Directory
The network contains an Active Directory forest named fabrikam.com. The forest is synced to Microsoft Azure Active Directory (Azure AD). All the employees are
assigned Microsoft 365 E3 licenses.
Client Computers
All the employees have computers that run Windows 10 Enterprise. All the computers are installed without Volume License Keys. Windows 10 license keys are never
issued.
All the employees register their computer to Azure AD when they first receive the computer.
All the contractors have their own computer that runs Windows 10. None of the computers are joined to Azure AD.
Operational Procedures
Security policies
The following security policies are enforced on all the client computers in the domain:
All the computers are encrypted by using BitLocker Drive Encryption (BitLocker). BitLocker recovery information is stored in Active Directory and Azure AD.
The local Administrators group on each computer contains an enabled account named LocalAdmin.
The LocalAdmin account is managed by using Local Administrator Password Solution (LAPS).
Problem Statements
Employees in the finance department use an application named Application1. Application1 frequently crashes due to a memory error. When Application1 crashes,
an event is written to the application log and an administrator runs a script to delete the temporary files and restart the application.
When employees attempt to connect to the network from their home computer, they often cannot establish a VPN connection because of misconfigured VPN
settings.
An employee has a computer named Computer11. Computer11 has a hardware failure that prevents the computer from connecting to the network.
User10 reports that Computer10 is not activated.
Technical requirements
Fabrikam identifies the following technical requirements for managing the client computers:
QUESTION 1
You need to recommend a solution to configure the employee VPN connections.
Correct Answer: D
Section: [none]
Explanation
VCEConvert.com
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/windows-server/remote/remote-access/vpn/always-on-vpn/deploy/vpn-deploy-client-vpn-connections#bkmk_ProfileXML
QUESTION 2
You need to take remote control of an employee’s computer to troubleshoot an issue.
Correct Answer: A
Section: [none]
Explanation
Explanation/Reference:
References:
https://support.microsoft.com/en-us/help/4027243/windows-10-solve-pc-problems-with-quick-assist
VCEConvert.com
Testlet 2
Case Study
This is a case study. Case studies are not timed separately. You can use as much exam times as you would like to complete each case. However, there may
be additional studies and sections on this exam. You must manage your time to ensure that you are able to complete all questions included on this exam in the time
provided.
To answer the questions included in a case study, you will need to reference information that is provided in the case study. Case studies might contain exhibits and
other resources that provide more information about the scenario that is described in the case study. Each question is independent of the other questions in this case
study.
At the end of this case study, a review screen will appear. This screen allows you to review your answers and to make changes before you move to the next section
of the exam. After you begin a new section, you cannot return to this section.
Overview
Contoso, Ltd. is a consulting company that has a main office in Montreal and two branch offices in Seattle and New York.
Contoso recently opened a new branch office in San Diego. All the users in the San Diego office work from home.
Existing environment
The on-premises network contains an Active Directory domain named contoso.com. The domain is synced to Microsoft Azure Active Directory (Azure AD).
You have four computers named Computer1, Computer2, Computer3, and ComputerA. ComputerA is in a workgroup on an isolated network segment and runs the
Long Term Servicing Channel version of Windows 10. ComputerA connects to a manufacturing system and is business critical. All the other computers are joined to
the domain and run the Semi-Annual Channel version of Windows 10.
In the domain, you create four groups named Group1, Group2, Group3, and Group4.
Computer2 has the local Group Policy settings shown in the following table.
VCEConvert.com
The computers are updated by using Windows Update for Business.
Requirements
Planned Changes
Contoso plans to purchase computers preinstalled with Windows 10 Pro for all the San Diego office users.
Technical requirements
The computers in the San Diego office must be upgraded automatically to Windows 10 Enterprise and must be joined to Azure AD the first time a user starts each
new computer. End users must not be required to accept the End User License Agreement (EULA).
VCEConvert.com
Helpdesk users must be able to troubleshoot Group Policy object (GPO) processing on the Windows 10 computers. The helpdesk users must be able to identify
which Group Policies are applied to the computers.
Users in the HR department must be able to view the list of files in a folder named D:\Reports on Computer3.
ComputerA must be configured to have an Encrypting File System (EFS) recovery agent.
Quality update installations must be deferred as long as possible on ComputerA.
Users in the IT department must use dynamic look on their primary device.
User6 must be able to connect to Computer2 by using Remote Desktop.
The principle of least privilege must be used whenever possible.
Administrative effort must be minimized whenever possible.
Assigned access must be configured on Computer1.
QUESTION 1
You need to meet the technical requirement for User6.
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
QUESTION 2
You need to meet the technical requirement for the IT department users.
Correct Answer: D
Section: [none]
Explanation
Explanation/Reference:
References:
https://support.microsoft.com/en-za/help/4028111/windows-lock-your-windows-10-pc-automatically-when-you-step-away-from
VCEConvert.com
Question Set 3
QUESTION 1
Your company has a wireless access point that uses WPA2-Enterprise.
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
References:
https://support.microsoft.com/en-za/help/17137/windows-setting-up-wireless-network
QUESTION 2
A user named User1 has a computer named Computer1 that runs Windows 10.
User1 connects to a Microsoft Azure virtual machine named VM1 by using Remote Desktop.
When the VPN1 connection is established, User1 cannot connect to VM1. When User1 disconnects from the VPN1, the user can connect to VM1.
You need to ensure that User1 can connect to VM1 while connected to the VPN1.
What should you do?
A. From the proxy settings, add the IP address of VM1 to the bypass list to bypass the proxy.
B. From the properties of VPN1, clear the Use default gateway on remote network check box.
C. From the properties of the Remote Desktop connection to VM1, specify a Remote Desktop Gateway (RD Gateway).
D. From the properties of VPN1, configure a static default gateway address.
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
References:
https://www.stevejenkins.com/blog/2010/01/using-the-local-default-gateway-with-a-windows-vpn-connection/
VCEConvert.com
QUESTION 3
Your network contains an Active Directory domain. The domain contains a user named Admin1. All computers run Windows 10.
You need to ensure that Admin1 can establish remote PowerShell connections to the computers. The solution must use the principle of least privilege.
Correct Answer: D
Section: [none]
Explanation
Explanation/Reference:
References:
https://4sysops.com/wiki/enable-powershell-remoting/
QUESTION 4
You have 200 computers that run Windows 10 and are joined to an Active Directory domain.
You need to enable Windows Remote Management (WinRM) on all the computers by using Group Policy.
Which three actions should you perform? Each correct answer presents part of the solution.
A. Set the Startup Type of the Windows Remote Management (WS-Management) service to Automatic.
B. Enable the Windows Firewall: Allow inbound remote administration exception setting.
C. Enable the Allow remote server management through WinRM setting.
D. Enable the Windows Firewall: Allow inbound Remote Desktop exceptions setting.
E. Enable the Allow Remote Shell access setting.
F. Set the Startup Type of the Remote Registry service to Automatic.
Explanation/Reference:
References:
http://www.mustbegeek.com/how-to-enable-winrm-via-group-policy/
VCEConvert.com
QUESTION 5
A user has a computer that runs Windows 10.
When the user connects the computer to the corporate network, the user cannot access the internal corporate servers. The user can access servers on the Internet.
You run the ipconfig command and receive the following output.
You send a ping request and successfully ping the default gateway, the DNS servers, and the DHCP server.
Correct Answer: A
Section: [none]
Explanation
Explanation/Reference:
QUESTION 6
HOTSPOT
VCEConvert.com
From the Settings app, you view the connection properties shown in the following exhibit.
Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.
Hot Area:
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
QUESTION 7
You have 15 computers that run Windows 10. Each computer has two network interfaces named Interface1 and Interface2.
VCEConvert.com
You need to ensure that network traffic uses Interface1, unless Interface1 is unavailable.
Correct Answer: A
Section: [none]
Explanation
Explanation/Reference:
References:
https://tradingtechnologies.atlassian.net/wiki/spaces/KB/pages/27439127/How+to+Change+Network+Adapter+Priorities+in+Windows+10
https://docs.microsoft.com/en-us/powershell/module/nettcpip/set-netipinterface?view=win10-ps
QUESTION 8
Your network contains an Active Directory domain. The domain contains 10 computers that run Windows 10. Users in the finance department use the computers.
From Computer1, you plan to run a script that executes Windows PowerShell commands on the finance department computers.
You need to ensure that you can run the PowerShell commands on the finance department from Computer1.
A. From the local Group Policy, enable the Allow Remote Shell Access setting.
B. From the local Group Policy, enable the Turn on Script Execution setting.
C. From the Windows PowerShell, run the Enable-MMAgent cmdlet.
D. From the Windows PowerShell, run the Enable-PSRemoting cmdlet.
Correct Answer: D
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.core/enable-psremoting?view=powershell-6
QUESTION 9
You have an Azure Active Directory (Azure AD) tenant that contains a user named user1@contoso.com.
VCEConvert.com
You have a computer named Computer1 that runs Windows 10.
You join Computer1 to Azure AD. You enable Remote Desktop on Computer1.
User1@contoso.com attempts to connect to Computer1 by using Remote Desktop and receives the following error message: “The logon attempt failed.”
You need to ensure that the user can connect to Computer1 by using Remote Desktop.
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/windows/security/threat-protection/security-policy-settings/allow-log-on-through-remote-desktop-services
QUESTION 10
DRAG DROP
You enable Windows PowerShell remoting on a computer that runs Windows 10.
You need to limit which PowerShell cmdlets can be used in a remote session.
Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the
correct order.
VCEConvert.com
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
References:
https://www.petri.com/powershell-remoting-restricting-user-commands
QUESTION 11
VCEConvert.com
HOTSPOT
You have a computer named Computer1 that runs Windows 10. Computer1 has an IP address of 10.10.1.200 and a subnet mask of 255.255.255.0.
You configure the proxy settings on Computer1 as shown in the following exhibit.
Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.
Hot Area:
VCEConvert.com
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
References:
https://www.howtogeek.com/tips/how-to-set-your-proxy-settings-in-windows-8.1/
QUESTION 12
You have a computer that is configured as shown in the following exhibit.
VCEConvert.com
What can the computer connect to?
A. all the local computers and the remote computers within your corporate network only
B. all the local computers and the remote computers, including Internet hosts
C. only other computers on the same network segment that have automatic private IP addressing (APIPA)
D. only other computers on the same network segment that have an address from a class A network ID
Correct Answer: B
Section: [none]
Explanation
VCEConvert.com
Explanation/Reference:
QUESTION 13
Your network contains an Active Directory domain named contoso.com.
A user named User1 has a personal computer named Computer1 that runs Windows 10 Pro. User1 has a VPN connection to the corporate network.
You need to ensure that when User1 connects to the VPN, network traffic uses a proxy server located in the corporate network. The solution must ensure that User1
can access the Internet when disconnected from the VPN.
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
QUESTION 14
You deploy 100 computers that run Windows 10. Each computer has a cellular connection and a Wi-Fi connection.
You need to prevent the computers from using the cellular connection unless a user manually connects to the cellular network.
A. Set the Use cellular instead of Wi-Fi setting for the cellular connection to Never
B. Run the netsh wlan set hostednetwork mode=disallow command
C. Clear the Let Windows manage this connection check box for the cellular connection
D. Select the Let Windows manage this connection check box for the Wi-Fi connection
Correct Answer: C
Section: [none]
Explanation
Explanation/Reference:
References:
https://support.microsoft.com/en-za/help/10739/windows-10-cellular-settings
QUESTION 15
VCEConvert.com
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might
meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
Solution: From a command prompt, you run netsh wlan delete profile name="Wireless1".
A. Yes
B. No
Correct Answer: A
Section: [none]
Explanation
Explanation/Reference:
Reference:
https://lifehacker.com/remove-wi-fi-profiles-from-windows-8-1-from-the-command-1449954864
QUESTION 16
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might
meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
Solution: From the Services console, you disable the Link-Layer Topology Discovery Mapper service.
A. Yes
B. No
Correct Answer: B
Section: [none]
VCEConvert.com
Explanation
Explanation/Reference:
QUESTION 17
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might
meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
Solution: From the properties of the Wi-Fi adapter, you disable Link-Layer Topology Discovery Responder.
A. Yes
B. No
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
QUESTION 18
Your network contains an Active Directory domain named contoso.com. The domain contains two computers named Computer1 and Computer2 that run Windows
10.
On Computer1, you need to run the Invoke-Command cmdlet to execute several PowerShell commands on Computer2.
Correct Answer: A
Section: [none]
Explanation
VCEConvert.com
Explanation/Reference:
Reference:
https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.core/enable-psremoting?view=powershell-6
QUESTION 19
You have a computer named Computer1 that runs Windows 10.
You need to view the remote addresses to which Computer1 has active TCP connections.
A. Performance Monitor
B. Task Manager
C. Resource Monitor
D. Windows Defender Firewall with Advanced Security
Correct Answer: C
Section: [none]
Explanation
Explanation/Reference:
QUESTION 20
Your company has a Remote Desktop Gateway (RD Gateway).
You have a server named Server1 that is accessible by using Remote Desktop Services (RDS) through the RD Gateway.
You need to configure a Remote Desktop connection to connect through the gateway.
A. Connection settings
B. Server authentication
C. Local devices and resources
D. Connect from anywhere
Correct Answer: D
Section: [none]
Explanation
Explanation/Reference:
VCEConvert.com
Testlet 1
Case Study
This is a case study. Case studies are not timed separately. You can use as much exam times as you would like to complete each case. However, there may
be additional studies and sections on this exam. You must manage your time to ensure that you are able to complete all questions included on this exam in the time
provided.
To answer the questions included in a case study, you will need to reference information that is provided in the case study. Case studies might contain exhibits and
other resources that provide more information about the scenario that is described in the case study. Each question is independent of the other questions in this case
study.
At the end of this case study, a review screen will appear. This screen allows you to review your answers and to make changes before you move to the next section
of the exam. After you begin a new section, you cannot return to this section.
Overview
Existing Environment
Fabrikam, Inc. is a distribution company that has 500 employees and 100 contractors.
Active Directory
The network contains an Active Directory forest named fabrikam.com. The forest is synced to Microsoft Azure Active Directory (Azure AD). All the employees are
assigned Microsoft 365 E3 licenses.
Client Computers
All the employees have computers that run Windows 10 Enterprise. All the computers are installed without Volume License Keys. Windows 10 license keys are never
issued.
All the employees register their computer to Azure AD when they first receive the computer.
All the contractors have their own computer that runs Windows 10. None of the computers are joined to Azure AD.
Operational Procedures
Security policies
The following security policies are enforced on all the client computers in the domain:
All the computers are encrypted by using BitLocker Drive Encryption (BitLocker). BitLocker recovery information is stored in Active Directory and Azure AD.
The local Administrators group on each computer contains an enabled account named LocalAdmin.
The LocalAdmin account is managed by using Local Administrator Password Solution (LAPS).
Problem Statements
Employees in the finance department use an application named Application1. Application1 frequently crashes due to a memory error. When Application1 crashes,
an event is written to the application log and an administrator runs a script to delete the temporary files and restart the application.
When employees attempt to connect to the network from their home computer, they often cannot establish a VPN connection because of misconfigured VPN
settings.
An employee has a computer named Computer11. Computer11 has a hardware failure that prevents the computer from connecting to the network.
User10 reports that Computer10 is not activated.
Technical requirements
Fabrikam identifies the following technical requirements for managing the client computers:
QUESTION 1
You need to recommend a solution to monitor update deployments.
Correct Answer: C
Section: [none]
Explanation
VCEConvert.com
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/windows/deployment/update/update-compliance-monitor
QUESTION 2
HOTSPOT
You need to reduce the amount of time it takes to restart Application1 when the application crashes.
What should you include in the solution? To answer, select the appropriate options in the answer area.
Hot Area:
Correct Answer:
VCEConvert.com
Section: [none]
Explanation
Explanation/Reference:
Reference:
https://www.howto-connect.com/how-to-attach-a-task-to-this-event-in-event-viewer-in-windows-10/
VCEConvert.com
Testlet 2
Case Study
This is a case study. Case studies are not timed separately. You can use as much exam times as you would like to complete each case. However, there may
be additional studies and sections on this exam. You must manage your time to ensure that you are able to complete all questions included on this exam in the time
provided.
To answer the questions included in a case study, you will need to reference information that is provided in the case study. Case studies might contain exhibits and
other resources that provide more information about the scenario that is described in the case study. Each question is independent of the other questions in this case
study.
At the end of this case study, a review screen will appear. This screen allows you to review your answers and to make changes before you move to the next section
of the exam. After you begin a new section, you cannot return to this section.
Overview
Contoso, Ltd. is a consulting company that has a main office in Montreal and two branch offices in Seattle and New York.
Contoso recently opened a new branch office in San Diego. All the users in the San Diego office work from home.
Existing environment
The on-premises network contains an Active Directory domain named contoso.com. The domain is synced to Microsoft Azure Active Directory (Azure AD).
You have four computers named Computer1, Computer2, Computer3, and ComputerA. ComputerA is in a workgroup on an isolated network segment and runs the
Long Term Servicing Channel version of Windows 10. ComputerA connects to a manufacturing system and is business critical. All the other computers are joined to
the domain and run the Semi-Annual Channel version of Windows 10.
In the domain, you create four groups named Group1, Group2, Group3, and Group4.
Computer2 has the local Group Policy settings shown in the following table.
VCEConvert.com
The computers are updated by using Windows Update for Business.
Requirements
Planned Changes
Contoso plans to purchase computers preinstalled with Windows 10 Pro for all the San Diego office users.
Technical requirements
The computers in the San Diego office must be upgraded automatically to Windows 10 Enterprise and must be joined to Azure AD the first time a user starts each
new computer. End users must not be required to accept the End User License Agreement (EULA).
VCEConvert.com
Helpdesk users must be able to troubleshoot Group Policy object (GPO) processing on the Windows 10 computers. The helpdesk users must be able to identify
which Group Policies are applied to the computers.
Users in the HR department must be able to view the list of files in a folder named D:\Reports on Computer3.
ComputerA must be configured to have an Encrypting File System (EFS) recovery agent.
Quality update installations must be deferred as long as possible on ComputerA.
Users in the IT department must use dynamic look on their primary device.
User6 must be able to connect to Computer2 by using Remote Desktop.
The principle of least privilege must be used whenever possible.
Administrative effort must be minimized whenever possible.
Assigned access must be configured on Computer1.
QUESTION 1
You need to meet the quality update requirement for ComputerA.
A. 14 days
B. 10 years
C. 5 years
D. 180 days
E. 30 days
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/windows/deployment/update/waas-overview
VCEConvert.com
Question Set 3
QUESTION 1
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might
meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You test Windows updates on Computer1 before you make the updates available to other users at your company.
You install a quality update that conflicts with a customer device driver.
Solution: From an elevated command prompt, you run the wusa.exe command and specify the /uninstall parameter.
A. Yes
B. No
Correct Answer: A
Section: [none]
Explanation
Explanation/Reference:
References:
https://support.microsoft.com/en-us/help/934307/description-of-the-windows-update-standalone-installer-in-windows
QUESTION 2
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might
meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You test Windows updates on Computer1 before you make the updates available to other users at your company.
You install a quality update that conflicts with a customer device driver.
Solution: From System Restore, you revert the system state to a restore point that was created before the update was installed.
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
References:
https://support.microsoft.com/en-us/help/934307/description-of-the-windows-update-standalone-installer-in-windows
QUESTION 3
You have 100 computers that run Windows 10. The computers are in a workgroup.
You need to reduce the amount of Internet bandwidth consumed to download updates.
Correct Answer: C
Section: [none]
Explanation
Explanation/Reference:
References:
https://support.microsoft.com/en-us/help/4468254/windows-update-delivery-optimization-faq
QUESTION 4
You have 20 computers that run Windows 10.
You configure all the computers to forward all the events from all the logs to a computer named Computer1 that runs Windows 10.
When you sign in to Computer1, you cannot see any security events from other computers. You can see all the other forwarded events from the other computers.
You need to ensure that the security events are forwarded to Computer1.
VCEConvert.com
B. On each computer, add the NETWORK SERVICE account to the Event Log Readers group.
C. On each computer, run winrm qc –q.
D. On Computer1, add the account of Computer1 to the Event Log Readers group.
Correct Answer: D
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/windows/security/threat-protection/use-windows-event-forwarding-to-assist-in-intrusion-detection
QUESTION 5
HOTSPOT
You have a computer named Computer1 that runs Windows 10 and contains the following files:
C:\Folder1\File1.bat
C:\Folder1\File1.exe
C:\Folder1\File1.cmd
A user named User1 is assigned Read & execute to all the files.
VCEConvert.com
Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.
Hot Area:
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
References:
https://stackoverflow.com/questions/148968/windows-batch-files-bat-vs-cmd
QUESTION 6
You have a computer that runs Windows 10.
You discover that Windows updates are failing to install on the computer.
You need to generate a log file that contains detailed information about the failures.
Correct Answer: C
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/powershell/module/windowsupdate/get-windowsupdatelog?view=win10-ps
QUESTION 7
HOTSPOT
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2016 and a
computer named Computer1 that runs Windows 10.
Server1 contains a share named Backup. All users can read and write data in Backup.
On Monday at 13:00, you configure Backup and Restore (Windows 7) on Computer1 to use the following settings:
Backup Destination:\\Server1\Backup
What do you want to back up?:Local Disk (D:), Include a system image of drives: System Reserved, (C:)
Schedule: Daily at 23:00
You need to identify how many backups will be available on Thursday at 17:00.
What should you identify? To answer, select the appropriate options in the answer area.
Hot Area:
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
References:
https://www.windowscentral.com/how-make-full-backup-windows-10#create_system_image_windows10https://www.bleepingcomputer.com/tutorials/create-system-
image-in-windows-7-8/
QUESTION 8
VCEConvert.com
HOTSPOT
You are planning a recovery strategy for computers that run Windows 10.
You need to create recovery procedures to roll back feature updates and quality updates.
What should you include in the procedures? To answer, select the appropriate options in the answer area.
Hot Area:
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
References:
https://www.thewindowsclub.com/rollback-uninstall-windows-10-creators-update
https://www.dummies.com/computers/pcs/undo-windows-update/
QUESTION 9
You have a computer that runs Windows 10.
You need to start the computer into the Windows Recovery Environment (WinRE).
A. Turn off the computer. Turn on the computer, and then press F8.
B. Turn off the computer. Turn on the computer, and then press F10.
C. From the sign-in screen, hold the Shift key, and then click Restart.
D. Hold Alt+Ctrl+Delete for 10 seconds.
Correct Answer: C
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/windows-hardware/manufacture/desktop/windows-recovery-environment--windows-re--technical-reference
QUESTION 10
HOTSPOT
VCEConvert.com
You are a network administrator at your company.
A user attempts to start a computer and receives the following error message: “Bootmgr is missing.”
Which command should you run next? To answer, select the appropriate options in the answer area.
Hot Area:
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
References:
https://neosmart.net/wiki/bootmgr-is-missing/
QUESTION 11
Your company purchases 20 laptops that use a new hardware platform.
A. Reliability Monitor
B. Task Manager
C. System Configuration
D. Performance Monitor
Correct Answer: A
Section: [none]
Explanation
Explanation/Reference:
References:
https://lifehacker.com/how-to-troubleshoot-windows-10-with-reliability-monitor-1745624446
VCEConvert.com
QUESTION 12
HOTSPOT
You have 100 computers that run Windows 10. You have no servers. All the computers are joined to Microsoft Azure Active Directory (Azure AD).
The computers have different update settings, and some computers are configured for manual updates.
You need to configure Windows Update. The solution must meet the following requirements:
How should you configure Windows Update? To answer, select the appropriate options in the answer area.
Hot Area:
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/windows/deployment/update/waas-optimize-windows-10-updates
https://docs.microsoft.com/en-us/windows/deployment/update/waas-delivery-optimization
QUESTION 13
You have a computer named LON-CL1.Adatum.com that runs Windows 10.
From Event Viewer, you create a custom view named View1 that has the following filter:
User: User1
Logged: Any time
Event logs: System
Computer: LON-CL1
Event IDs: 10000 – 11000
Event level: Error, Verbose
You open Event Viewer and discover the event shown in the exhibit. (Click the Exhibit tab.)
VCEConvert.com
The event does not appear in View1.
Correct Answer: A
Section: [none]
Explanation
Explanation/Reference:
References:
https://www.techrepublic.com/article/how-to-use-custom-views-in-windows-10s-event-viewer/
VCEConvert.com
QUESTION 14
You have a computer named Computer1 that runs Windows 10 and has an application named App1.
You need to use Performance Monitor to collect data about the processor utilization of App1.
A. Process
B. Processor Performance
C. Processor Information
D. Processor
Correct Answer: A
Section: [none]
Explanation
Explanation/Reference:
References:
https://www.cse.wustl.edu/~jain/cse567-06/ftp/os_monitors/index.html
QUESTION 15
HOTSPOT
You have a Microsoft Azure Active Directory (Azure AD) tenant named contoso.com that contain the users shown in the following table.
Computer1 is in a workgroup and has the local users shown in the following table.
VCEConvert.com
User1 joins Computer1 to Azure AD by using user1@contoso.com.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Hot Area:
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
QUESTION 16
HOTSPOT
A user attempts to start a computer and receives the following error message: “Bootmgr is missing.”
Which command should you run next? To answer, select the appropriate options in the answer area.
Hot Area:
VCEConvert.com
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
References:
https://neosmart.net/wiki/bootrec/#Bootrec_in_Windows10
QUESTION 17
HOTSPOT
Which users can analyze the event logs on Computer1? To answer, select the appropriate options in the answer area.
Hot Area:
Correct Answer:
VCEConvert.com
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/windows/security/identity-protection/access-control/local-accounts#sec-localsystem
QUESTION 18
Your company has a main office and a branch office. The offices connect to each other by using a WAN link. Access to the Internet is provided through the main
office.
The branch office contains 25 computers that run Windows 10. The computers contain small hard drives that have very little free disk space.
You need to prevent the computers in the branch office from downloading updates from peers on the network.
VCEConvert.com
D. Configure the updates to use the Semi-Annual Channel (Targeted) channel.
Correct Answer: C
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/windows/deployment/update/waas-branchcache
QUESTION 19
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might
meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
Ten sales users will travel to a location that has limited bandwidth that is expensive. The sales users will be at the location for three weeks.
You need to prevent all Windows updates from downloading for the duration of the trip. The solution must not prevent access to email and the Internet.
Solution: From Update & Security in the Settings app, you turn on Pause Updates.
A. Yes
B. No
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
References:
https://www.makeuseof.com/tag/5-ways-temporarily-turn-off-windows-update-windows-10/
QUESTION 20
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might
meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
Ten sales users will travel to a location that has limited bandwidth that is expensive. The sales users will be at the location for three weeks.
VCEConvert.com
You need to prevent all Windows updates from downloading for the duration of the trip. The solution must not prevent access to email and the Internet.
Solution: From Network & Internet in the Settings app, you set the network connections as metered connections.
A. Yes
B. No
Correct Answer: A
Section: [none]
Explanation
Explanation/Reference:
References:
https://www.makeuseof.com/tag/5-ways-temporarily-turn-off-windows-update-windows-10/
QUESTION 21
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might
meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
Ten sales users will travel to a location that has limited bandwidth that is expensive. The sales users will be at the location for three weeks.
You need to prevent all Windows updates from downloading for the duration of the trip. The solution must not prevent access to email and the Internet.
Solution: From Network & Internet in the Settings app, you set a data limit.
A. Yes
B. No
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
QUESTION 22
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might
meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
VCEConvert.com
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You test Windows updates on Computer1 before you make the updates available to other computers.
You install a quality update that conflicts with a customer device driver.
Solution: From an elevated command prompt, you run the vmic qfe delete command.
A. Yes
B. No
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
QUESTION 23
You have a computer that runs Windows 10 and has BitLocker Drive Encryption (BitLocker) enabled on all volumes.
Correct Answer: D
Section: [none]
Explanation
Explanation/Reference:
References:
https://www.repairwin.com/how-to-disable-bitlocker-in-windows-recovery-environment-winre/
QUESTION 24
VCEConvert.com
You have a computer named Computer1 that runs Windows 10.
You complete a full back up of Computer1 to an external USB drive. You store the USB drive offsite.
You delete several files from your personal Microsoft OneDrive account by using File Explorer, and then you empty the Recycle Bin on Computer1.
You need to recover the files 60 days after you deleted them in the least amount of time possible.
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
References:
https://support.office.com/en-us/article/restore-deleted-files-or-folders-in-onedrive-949ada80-0026-4db3-a953-c99083e6a84f
QUESTION 25
You have a computer that runs Windows 8.1.
When you attempt to perform an in-place upgrade to Windows 10, the computer fails to start after the first restart.
A. \$Windows.~BT\Sources\Panther\
B. \Windows\Logs
C. \Windows\Temp
D. \$Windows.~BT\Inf
Correct Answer: A
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/windows-hardware/manufacture/desktop/windows-setup-log-files-and-event-logs
QUESTION 26
Your network contains an Active Directory domain. The domain contains 10 computers that run Windows 10.
VCEConvert.com
On a different computer named Computer1, you plan to create a collector-initiated subscription to gather the event logs from the Windows 10 computers.
You need to configure the environment to support the event log collection.
Which two actions should you perform? Each correct answer presents part of the solution.
A. Add Computer1 to the Event Log Readers group on the Windows 10 computers
B. Add Computer1 to the Event Log Readers group on Computer1
C. On the Windows 10 computers, change the Startup Type of Windows Event Collector to Automatic
D. Enable Windows Remote Management (WinRM) on the Windows 10 computers
E. Enable Windows Remote Management (WinRM) on Computer1
Correct Answer: AD
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc748890(v=ws.11)
QUESTION 27
You have a computer named Computer1 that runs Windows 10.
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
QUESTION 28
You have several computers that run Windows 10.
VCEConvert.com
All users have Microsoft OneDrive for Business installed.
You need to ensure that all the users can recover the files on their desktop from OneDrive for Business.
Which two actions should you perform? Each correct answer presents part of the solution.
Correct Answer: CD
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/onedrive/plan-onedrive-enterprise
https://docs.microsoft.com/en-us/onedrive/use-group-policy#KFMOptInNoWizard
QUESTION 29
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might
meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You need to ensure that you can recover the files in Folder1 by using the Previous Versions tab.
Solution: You enable File History and add Folder1 to File History.
A. Yes
B. No
Correct Answer: B
Section: [none]
VCEConvert.com
Explanation
Explanation/Reference:
Reference:
https://support.microsoft.com/en-za/help/17128/windows-8-file-history
QUESTION 30
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might
meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You need to ensure that you can recover the files in Folder1 by using the Previous Versions tab.
Solution: You enable File History and add Folder1 in the Documents library.
A. Yes
B. No
Correct Answer: A
Section: [none]
Explanation
Explanation/Reference:
Reference:
https://support.microsoft.com/en-za/help/17128/windows-8-file-history
QUESTION 31
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might
meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You need to ensure that you can recover the files in Folder1 by using the Previous Versions tab.
Solution: You set up Backup and Restore (Windows 7) and include Folder1 in the backup.
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
Reference:
https://support.microsoft.com/en-za/help/17128/windows-8-file-history
QUESTION 32
You have a computer that runs Windows 10. You use the computer to test new Windows features.
You need to configure the computer to receive preview builds of Windows 10 as soon as possible.
What should you configure from Update & Security in the Settings app?
Correct Answer: A
Section: [none]
Explanation
Explanation/Reference:
Reference:
https://insider.windows.com/en-us/getting-started/
QUESTION 33
You have a computer named Computer1 that runs Windows 10. Computer1 connects to multiple wireless networks.
Correct Answer: B
Section: [none]
VCEConvert.com
Explanation
Explanation/Reference:
Reference:
https://www.windowscentral.com/how-connect-wi-fi-network-windows-10
QUESTION 34
HOTSPOT
You configure File History to run every 15 minutes, and then turn on File History.
For each of the following statements, select Yes if the statement in true. Otherwise, select No.
Hot Area:
VCEConvert.com
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
QUESTION 35
A user has a computer that runs Windows 10. The user has access to the following storage locations:
You need to configure Back up using File History from the Settings app.
Which two storage locations can you select by using File History? Each correct answer presents a complete solution.
Explanation/Reference:
QUESTION 36
You have a computer named Computer1 that runs Windows 10.
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
QUESTION 37
HOTSPOT
Your network contains an Active Directory domain named contoso.com. The domain contains two computers named Computer1 and Computer2 that run Windows
10 and are joined to the domain.
On Computer1, you create an event subscription named Subscription1 for Computer2 as shown in the Subscription1 exhibit. (Click the Subcription1 tab.)
VCEConvert.com
Subscription1 is configured to use forwarded events as the destination log.
On Computer1, you create a custom view named View1 as shown in the View1 exhibit. (Click the View1 tab.)
VCEConvert.com
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Hot Area:
VCEConvert.com
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
VCEConvert.com