No student devices needed. Know more
52 questions
Edward is a network administrator for Global Dynamics. The company runs an Active Directory domain named GloDyn.com.
The domain contains a computer named Research1 that runs Windows 10 Enterprise. Research1 contains a folder named Tests that is configured with the NTFS permissions shown below.
There are three employees who work in the Research department. They will access the Research1 workstation, but they will only access it from the network.
True or False: Roger can modify files in the Data share.
False
True
Derrick has a public computer named Computer1 that runs Windows 10. Computer1 contains a folder named Folder1.
He needs to provide a user named User1 with the ability to modify the permissions of Folder1. The solution must use the principle of least privilege.
Which NTFS permission should he assign to User1?
Read & execute
Modify
Full control
Write
All of your laptops use Windows 10 and have been connected to a wireless access point that is configured to use Advanced Encryption Standard (AES) security. There is no preshared password key being used. You need to connect a new Windows 10 laptop to the access point. How would you set up the security setting on the laptop?
WAP-Security
WPA-Personal
WPA2-Enterprise
WPA2-Personal
Peter is the IT Director at Green Valley Credit Union. He is responsible for identifying which version of Windows 10 should be installed on computers used by the Credit Union's loan officers. A representative from Microsoft suggests that Peter look at installing Windows 10 Professional in S mode.
Which two features, of those listed below, are unique to Windows 10 Pro in S mode? Select two.
Only permits installation of applications from the Microsoft Store
Uses Internet Explorer as the default browser
Supports joining Microsoft Azure Active Directory (Azure AD)
Minimizes the attack surface on the computer
Dymond wants to perform unattended installations of Windows 10. He will set up a server that contains all of the files needed to support the unattended installations. The clients that will be installed contain PXE-boot ROMs to connect to the network server. Which of the following services should he use for the remote installation?
FAST
System Preparation Tool
Setup Manager
WDS
The ___ utility is used to create a disk image of Windows 10 that can then be deployed to other computers. Fill in the blank.
RISprep
Windows SIM
DISM
WDSUTIL
Tony is the Deployment Technician for a company that just purchased 750 new computers. These computers will run Windows 10. Tony is responsible for managing the Windows 10 deployment process. The actions that he takes next must include the following requirements:
Tony must use the Microsoft Deployment Toolkit (MDT) to deploy Windows 10 to new computers.
The Hyper-V feature must be enabled on each new computer during the deployment.
There are two different ways that Tony can complete this task. What are they? Select two.
Add a task sequence step that adds a provisioning package.
Add a custom command to the Unattend.xml file.
In a Group Policy object (GPO), from Computer Configuration, configure Application Control Policies
Add a configuration setting to Windows Deployment Services (WDS).
Add a task sequence step that runs dism.exe.
The IT manager, Edward, has decided to use a Windows 10 system to store some local folders for network access. The folder will be located on a NTFS partition. Edward has assigned both NTFS permissions and share permissions. Which of the following is true about how share permissions and NTFS permissions work together on the same folder?
The share permissions will always take precedence.
The NTFS permissions will always take precedence.
Neither. When Windows 10 sets permissions, it does it through HomeGroups only.
The system will look at both the share permissions and the NTFS permissions, and whichever set is more restrictive will be applied to the folder.
Dymond works for Global Dynamics. You help manage the Active Directory forest used by the company. The forest contains a root domain named glodyn.com and a child domain named research.glodyn.com.
A computer named PC010 is joined to the research.glodyn.com domain. PC010 runs Windows 10 Enterprise.
PC010 contains a folder named Data. The following Share and Security permissions are assigned to the Data folder:
True or False: All the local users on PC010 have Read access to \\PC010\Data.
False
True
True or False: Windows 10 allows the use of User-Specific LGPOs.
False
True
Margie owns a computer that runs Windows 10. She finds that Windows updates have not installed successfully on her computer for several weeks. She needs to gather detailed information about the failures so she can resolve the problem and resume receiving updates.
Which of the following actions would best help Margie gather the information she needs?
Examine the Application log in Event Viewer
Run the PowerShell cmdlet, Get-WindowsErrorReporting
Run the PowerShell cmdlet, Get-WindowsUpdateLog
Examine the Security log in Event Viewer
Jamie is troubleshooting a problem generated by a anpplication running on a Windows 10 computer. She finds that each time the problem occurs, a message is generated in the Application log that is visible through Event Viewer.
There are 24 other computers which all run Windows 10 and have the same application installed. Jamie would like to see if the same problem occurs on the other Windows 10 computers.
What action could Jamie take to gather these event log entries from all 25 computers to a single location?
Create a Windows Defender Firewall rule
Enable Remote Desktop on each computer
Create a group policy
Create an Event Viewer subscription
You are the network administrator for a large organization with many laptop users who travel for business reasons. The company currently uses a VPN to provide employees on the road with access to the company's network, but they would like to start moving the company network to the cloud.
What directory service could the company implement to help that transition occur more quckly?
Active Directory Directory Service
Azure Active Directory
OneDrive
DirectAccess
You manage a computer running Windows 10 Enterprise. The computer is used by five employees as shown in the table below:
Which three user profiles will persist after each user signs out?
Ivan, Jackie, Grace
Harry, Ivan, Lorna
Jackie, Ivan, Harry
Grace, Jackie, Lorna
Lorna, Harry, Jackie
James manages a dozen computers running Windows 10 Enterprise. All the computers are joined to an Active Directory domain. The computers do not have TPM chips installed.
James must accomplish two tasks:
1. He must be able to encrypt the hard drive on each computer using BitLocker.
2. He must be able to store the recovery keys in Active Directory.
James wants to create a group policy to help him complete these tasks as easily as possible on all twelve computers. Which two Group Policy settings should he configure? Choose two.
Configure minimum PIN strength at start up
Require additional authentication at startup
Choose default folder for recover password
Choose how BitLocker-protected operating system drives can be recovered
Allow Secure Boot for integrity validatio
Quinn manages a computer that runs Windows 10 and is connected to an Azure AD domain. He needs to open Control Panel, but each time he tries, he receives the error message shown below:
What action should Quinn take in order to access Control Panel?
He should change the Local Group Policies settings for this computer.
He should execute PowerShell as an Administrator.
He should configure Group Policy Preferences in Azure AD.
He should open Control Panel.
You are the administrator for Blue Skies Travel. Blue Skies Travel uses an Active Directory domain. All company computers are joined to the domain.
It has recently been decided that Tier 2 Tech Support team members should have the ability to view the System, Application, and Setup logs on all company computers running Windows 10. All members of the team are also members of the Users group.
What action must you take in order to give the Tier 2 Tech Support team members access to the required log files?
Add the team members to the Administrator group
Add the team members to the Event Log Readers group
Add the team members to the Authenticated Users group
Nothing
The owner of your company has come to you and stated that they want all of the hardware on all systems to use BitLocker and BitLocker To Go. What utility should you install to help manage and maintain BitLocker and BitLocker To Go?
MNBM
MNNM
MABM
MBAM
Julia manages a small number of computers running Windows 10. Each computer has two network interfaces. The interfaces are named Adapter1 and Adapter2.
Julia runs the following command on each Windows 10 computer:
Set-NetIPInterface –InterfaceAlias "Adapter2" –InterfaceMetric 1
What effect does that command have on the computers that Julia manages?
It limits the amount of data that can be transmitted through Adapter2.
It disables Adapter2.
It ensures that all network traffic running to or from the computers will use Adapter2 unless Adapter2 is unavailable.
It assigns a static IPv6 address to Adapter2.
You manage a shared computer running Windows 10 in your company's shipping department. You have been asked to prevent warehouse workers from being able to change the wireless network settings on the shared computer. At the same time, you must ensure that local administrators can modify the wireless network settings when needed.
What tool or utility would best allow you to meet this goal?
Settings
Device Manager
Control Panel
Local Group Policy Editor
Jan manages a small network used by the research team at Global Technologies. Because of the highly confidential and proprietary applications tested on these computers, the network is not connected to any other company network or to the Internet. There are 30 computers on the network. Each computer runs Windows 10 and is configured as part of a workgroup.
Jan has just found that none of the computers on the research network have been activated.
Jan needs to find a method for activating the computers without connecting her network to the Internet. Which Microsoft technology would best allow Jan to accomplish this task?
Digital Entitlement Activation
Volume Activation Management Tool (VAMT)
Active Directory-based activation
Key Management Service (KMS)
John manages a computer named PC01 which runs Windows 10. PC01 supports a service named App01 which is configured as shown below:
John found that another user was able to sign in to PC01 using the AppService account. That user then damaged some of the files stored on PC01.
John wants to secure the AppService account so that it cannot be used by another individual to sign on to PC01 again. His solution must use the principle of least privilege.
John performs the following actions:
1. He configures App01 to sign in as the LocalSystem account.
2. He selects the Allow service to interact with desktop check box.
3. He deletes the AppService account.
Will these actions allow John to achieve his goal?
No
Yes
Your organization has chosen to use 255.255.255.240 as its new subnet mask. What is the increment for subnet ranges in a 240 subnet mask?
4
16
8
32
Tom manages a computer running Windows 10. The computer contains a folder named C:\Data that is shared as Data1.
Tom runs two PowerShell commands to examine the shared folder as shown in the screen capture below:
Who can read the files in the Data1 share? Select all that apply.
None of the users
Alice
Carl
Bob
You manage the computers used in your company's accounting department. You are afraid that one of these computers has been attacked and that sensitive data files stored in a confidential folder have been modified or deleted. You need to enable logging on the attacked computer so that you can find out which users have been reading and editing the contents of the folder.
You perform the following actions:
Open the folder properties dialog box
Configure the Audit settings for that object
Enable the Audit Object access setting in the local Group Policy
Will those actions allow you to achieve your goal?
No
Yes
Jennifer manages a workgroup made up of 75 computers. All computers in the workgroup run Windows 10. Each computer uses a low-bandwidth metered connection to the Internet.
Jennifer has been asked to reduce the Internet bandwidth that is consumed when the workstations download update files from Microsoft. What feature could she configure that would help her meet this requirement?
Group policy setting
Performance optimization
Delivery Optimization
BranchCache in hosted mode
True or False: You can upgrade Windows 7 Enterprise to Windows 10 Professional.
False
True
You are the network administrator for your organization. You are asked by your manager to modify the associations of a few file extensions that are associated with Internet Explorer. How can you accomplish this task?
In Internet Explorer, set extensions on the Extension tab.
In Control Panel, open System and then click Set Associations. Set the proper file extensions.
In Control Panel, open Default Programs and then click Set Associations. Set the proper file extensions.
In Internet Explorer, set extensions on the Advanced tab.
______ is a cloud-based identity authentication and authorization service that enables users to enjoy the benefits of single sign-on (SSO) for cloud-based applications.
Office 365
Azure Active Directory
Azure Active Directory Admin Center
Active Directory Domain Service
You suspect that there may have been some problems with your Windows 10 installation. You want to check the log files that were generated during the installation to confirm what actions were taken and if any errors occurred. Which of the following files should you review? (Choose all that apply.)
setuperr.log
setupact.log
installerr.log
wininstall.log
John manages a computer named PC01 which runs Windows 10. PC01 supports a service named App01 which is configured as shown below:
John found that another user was able to sign in to PC01 using the AppService account. That user then damaged some of the files stored on PC01.
John wants to secure the AppService account so that it cannot be used by another individual to sign on to PC01 again. His solution must use the principle of least privilege.
John configures the AppService account with the Deny log on locally user right.
Will this action allow John to achieve his goal?
No
Yes
Which of the following are Windows 10 rules for creating a new username? (Choose all that apply.)
The username can be identical to another username as long as the casing is different.
The username must be at least 2 characters long.
The username cannot contain periods.
The username can be no longer than 20 characters.
Jack manages the domain for a small business named Grey River Sales that uses Azure AD. The domain contains approximately 100 computers. Although all the computers run Windows 10, they are not all configured in the same way, especially when it comes to updates. For example, the computers used in the Accounting department are configured for manual updates only. The computers used to provide Internet access for guests receive all updates as soon as the local service discovers that a new update has been made available.
Jack does not want to change the way the computers are configured, but he would like to update the network configurations in such a way that:
1. Update traffic from the Internet is minimized.
2. The update configurations for all computers can be managed from a single, centralized location.
3. No new hardware or software needs to be purchased in order to support the new management solution.
What three actions should Jack take to meet these goals? Choose three answers. Each answer will be part of the complete answer.
Jack should enable Delivery Optimization on all Windows 10 computers
Jack should enable Peer caching on all Windows 10 computers.
Jack should use Windows Server Update Service (WSUS).
Jack should enable BranchCache on all Windows 10 computers.
Jack should use Microsoft System Center Configuration Manager.
You are a network administrator for a company named Global Dynamics. The network includes an Active Directory forest named GloDyn.com. The domain is synchronized to an Azure AD domain. Global Dynamics employs more than 1000 people, including approximately 200 interns.
Each intern is given a computer running Windows 10 for use while on the job. The interns' computers are never joined to Azure AD. When a new intern is hired, you must help that individual configure three settings on their computer: the browser security and proxy settings, user certificates, and wireless network connection settings. The process of helping each new intern can be very time-consuming as many interns are nervous about their first day at work and few interns have strong technical skills.
Your supervisor has asked you to recommend a solution that would minimize the amount of time and effort needed to help the interns configure their computers. If possible, your solution should allow the interns to open a file from the company's SharePoint site that could be used as part of an automated configuration process.
Which of the following options would best allow you to achieve this goal?
Create a CAB file using Windows Deployment Services.
Create an XML file using Microsoft Deployment Toolkit.
Configure a Windows AutoPilot solution using a WIM file.
Create a PPKG file using Windows Configuration Designer.
Paul manages a computer running Windows 10. The Windows 10 computer contains a folder named Data. Paul needs the ability to identify any users who attempt to take ownership of the files saved to the Data folder.
What actions could Paul take to create a log of any users who try to take ownership of the files stored in Data? Choose two.
Modify the folder attributes of Data.
Modify the Advanced Security Settings for Data.
From a Group Policy object (GPO), configure the Audit Sensitive Privilege Use setting.
From a Group Policy object (GPO), configure the Audit File System setting.
Install the Remote Server Administration Tools (RSAT).
Miguel is a quality assurance technician in the IT department at Global Dynamics. He manages a computer that runs Windows 10. The computer is used to test updates before those updates are rolled out to the other Windows 10 computers on the company's network.
Miguel installs a quality update and conflicts with a business-critical application running on the Windows 10 computer. He needs to remove the update from the test computer.
What is the action Miguel takes to accomplish this task?
Miguel executes the command, Remove-WindowsUpdate from a PowerShell window.
Miguel runs the command wusa /uninstall from an elevated command prompt.
Miguel performs a reinstall of the Windows operating system.
Miguel reverts the system state to a previously created restore point using System Restore.
Chris manages a network running on the cloud that uses Azure Active Directory. Many of the users on this network sign-in to their computers using Windows Hello for Business.
A user named Mike is assigned a new computer and needs to join this computer to Azure AD. When Mike tries to configure the sign-in options, he receives an error message that reads:
"Some settings are hidden or managed by your organization. Windows Hello isn't available on this device."
Chris is asked to help Mike configure the Windows Hello sign-in options. Chris checks the computer and verifies that all hardware components are working as expected.
Mike is very anxious to use the Windows Hello for Business facial recognition feature to sign in to his new computer.
What action should Chris take next to help resolve Mike's problem?
Upgrade the computer to Windows 10 Enterprise.
Purchase an infrared (IR) camera.
Enable UEFI Secure Boot.
Install a virtual TPM driver.
Which of the following is a benefit of joining Windows 10 devices to an Azure AD network?
to be able to access corporate apps and other resources
to be able to use Windows Hello for Business
all answers shown are correct
to allow users to sign on to their devices using a work account
to be able to manage the devices from the cloud
Bonnie manages a workgroup containing three computers at Maple Ridge Bed and Breakfast. All the computers in the workgroup run Windows 10. The workgroup is used to provide guests at the B&B with access to the Internet. Bonnie needs to ensure that all users are signed into these computers automatically as MapleGuest. In addition, an application named SecureAccess.exe must be started for the user when they sign-in.
What actions should Bonnie take to address those two needs?
Use MSConfig to ensure that all users automatically sign-in as MapleGuest.
Use the Registry Editor to ensure that the SecureAccess.exe application is started for all user sign-ins.
Use BCDEdit to ensure that all users automatically sign-in as MapleGuest.
Use MSConfig to ensure that the SecureAccess.exe application is started for all user sign-ins.
Use the Registry Editor to ensure that all users automatically sign-in as MapleGuest.Use Group Policy preferences to ensure that the SecureAccess.exe application is started for all user sign-ins.
Use Group Policy preferences to ensure that all users automatically sign-in as MapleGuest. Use BCDEdit to ensure that the SecureAccess.exe application is started for all user sign-ins.
You manage the computers used in your company's accounting department. You are afraid that one of these computers has been attacked and that sensitive data files stored in a confidential folder have been modified or deleted. You need to enable logging on the attacked computer so that you can find out which uses have been reading and editing the contents of the folder.
You perform the following actions:
From the properties of the folder, you configure the Auditing settings.
From the Audit Policy in the local Group Policy, you configure Audit directory service access.
Do these actions allow you to meet the goal
No
Yes
A user reports that her computer seems to be running much slower than it did 90 days ago. You discover that there have been several changes made to the computer which runs Windows 10.
You decide to use Performance Monitor to track hard page faults. You want to start analyzing hard page faults as you know they can result in system-wide delays. Which object and counter would you use in Performance Monitor to track this information?
Paging File \ % Usage
Paging File \ % Usage Peak
Memory \ Pages/sec
Memory \ CacheBytes
What is the name of the answer file used to help automate unattended installations of Windows 10?
Sysprep.exe
Unattend.xml
Unattend.txt
Setup.exe
Norman manages a computer running Windows 10. This computer is joined to a workgroup.
Norman runs the following PowerShell commands on the Windows 10 workstation.
New-LocalUser GeneJ NoPassword
Add-LocalGroupMember User Member GeneJ
What change will these two commands make to the Windows 10 workstation?
GeneJ will be able to sign-in to the Windows 10 workstation without a password.
GeneJ cannot sign-in to the Windows 10 workstation until he is assigned additional user rights.
GeneJ cannot sign-in to the Windows 10 workstation until an administrator sets a password for Gene's account.
GeneJ will be able to sign-in to the Windows 10 workstation and will be prompted to set a new password at the first sign-in.
You have a computer that is running Windows 7 Professional. You want to install Windows 10 and start from scratch, keeping none of the preferences set in Windows 7 Professional. Which of the following installation options should you choose?
Upgrade
New
Promotion
Clean Install
Jules manages 35 computers. All computers run Windows 10 and are members of a workgroup. Jules has been asked to create a local user named LocalAdmin on all of the computers in the workgroup. LocalAdmin should be added to the Remote Management Users group.
What action should Jules take to complete this task as efficiently as possible?
Create and import a user profile for LocalAdmin on all workgroup computers.
Create a Group Policy Object (GPO) that contains the Local User Group Policy preference.
Create a PowerShell script that runs two cmdlets; New-ADUser cmdlet and Set-AdGroup cmdlet.
Create a provisioning package in Windows Configuration Designer. Then, run the provisioning package on each computer.
Allen manages a computer running Windows 10 Professional. This computer contains the directory tree illustrated here:
True or False: Yvonne can delete all files in Folder_B.
False
True
True or False: REGEDIT and REGEDT32 are now the same application.
False
True
You have a Windows 10 machine that multiple users access. All users have the rights to use USB removable devices, but you need to deny one user access to USB removable devices. How do you accomplish this?
Create a removable storage access policy through an LGPO.
Deny all users from using USB devices
Deny the one user from using the machine.
Set a USB rule on Hardware Manager
Ben is the administrator for Green Valley Credit Union. The credit union uses an Active Directory domain, synced to Azure AD. All computers run Windows 10 Enterprise.
Among the computers that Ben manages, there are five computers joined together in a workgroup and isolated from the remainder of the network. These machines control part of the ATM system used by the credit union. These computers run the Long-Term Servicing Channel version of Windows 10.
The company currently uses Windows Update for Business to manage the update process. Ben needs to defer quality update installations on the five workgroup computers for as long as possible. What is the maximum length of time that Ben can defer the updates for the five specialized computers?
14 Days
10 Years
180 Days
15 Years
90 Days
Which of the following specifies the order in which Group Policy objects are applied?
Local computer, site, domain, OU
Domain, OU, local computer, site
OU, domain, site, local computer
Local computer, domain, site, OU
You work as an administrator for a company. You have a computer that runs Windows 10 Enterprise.
You need to configure your computer to use the proxy server proxy.contoso.com:8080 for HTTP connections.
What should you do starting from the Windows 10 desktop?
(This question has to be solved in a lab environment. Click on Solution to see a valid example solution. Answer "True" if you can solve the
problem, otherwise select "False".)
True
False
Azure Active Directory Join is available for which Windows devices?
Windows XP and later
Windows 7 and later
Windows 8.1 and later
Windows 10 only
Explore all questions with a free account