Windows 10 70-698
Windows 10 70-698
Once you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
Note: This question is part of a series of questions that present the same scenario. Each question in the series conta ins a unique solution. Determine whether the
solution meets the stated goals.
The user of Computerl reports that previous versions of D:\Folder\Filel .doc are unavailable from the Previous Versions tab.
You need to ensure that the previous versions of the file are created.
A. Yes
B. No
- Note: I his question 1s part of a series of questions that present the same scenario. Each question 1n the series conta ins a unique solution. Determine whether the
solution meets the stated goals.
The user of Computerl reports that previous versions of D:\Folder\Filel .doc are unavailable from the Previous Versions tab.
You need to ensure that the previous versions of the file are created.
A. Yes
B. No
Explanation:
Once you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
Note: This question is part of a series of questions that present the same scenario. Each question in the series conta ins a unique solution. Determine whether the
solution meets the stated goals.
The user of Computerl reports that previous versions of D:\Folder\Filel .doc are unavailable from the Previous Versions tab.
You need to ensure that the previous versions of the file are created.
Solution: Create a backup of drive D by using Backup and Restore (Windows 7).
0 A. Yes
0 B. No
You have a computer named Computerl that runs Windows 10.
The user of Computerl reports that previous versions of D:\Folder\Filel .doc are unavailable from the Previous Versions tab.
You need to ensure that the previous versions of the file are created.
Solution: Create a backup of drive D by using Backup and Restore (Windows 7).
A. Yes
B. No
Explanation:
Creating a backup of drive D will only create a single one-off backup of the files; it will not previous versions of files are created.
http://www.pcworld.com/article/2974385/windows/how-to-use-windows-1Os-file-history-backup-feature. html
In this section, you will see one or more sets of questions with the same scenario and problem. Each question presents a unique solution to the problem, and you
must determine whether the solution meets the stated goals. Any of the solutions might solve the problem. It is also possible that none of the solutions solve the
problem.
Once you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
Note: This question is part of a series of questions that present the same scenario. Each question in the series conta ins a unique solution. Determine whether the
solution meets the stated goals.
The user of Computerl reports that previous versions of D:\Folder\Filel .doc are unavailable from the Previous Versions tab.
You need to ensure that the previous versions of the file are created.
0 A. Yes
0 B. No
N ote: I his quest ion 1s part of a series of questions th at present th e same scenario. Each question 1n the series contains a unique solution. Determine whether the
solution meets the stated goals.
The user of Computerl reports that previous versions of D:\Folder\Filel .doc are unavailable from the Previous Versions tab.
You need to ensure that the previous versions of the file are created.
A. Yes
B. No
Explanation:
https://support.microsoft.com/en-us/help/17128/windows-8-file-history
In this section, you will see one or more sets of questions with the same scenario and problem. Each question presents a unique solution to the problem, and you
must determine whether the solution meets the stated goals. Any of the solutions might solve the problem. It is also possible that none of the solutions solve the
problem.
Once you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
Note: This question is part of a series of questions that present the same scenario. Each question in the series conta ins a unique solution. Determine whether the
solution meets the stated goals.
Your network contains a single Active Directory domain named contoso.com. The domain contains two computers named Computerl and Computer2.
A user named Userl is a member of the local Adm inistrators group on Computerl and Computer2.
Userl fa ils to access the Event Viewer logs on Computer2 from Computerl . Userl can connect to Computer2 remotely by using Computer Management.
You need to ensure that Userl can use Event Viewer on Computerl to remotely view the Event Viewer logs on Computer2.
0 A. Yes
0 B. No
N ote: I his quest ion 1s part of a series of questions th at present th e same scenario. Each question 1n the series contains a unique solution. Determine whether the
solution meets the stated goals.
Your network contains a single Active Directory domain named contoso.com. The domain contains two computers named Computerl and Computer2.
A user named Userl is a member of the local Administrators group on Computerl and Computer2.
Userl fails to access the Event Viewer logs on Computer2 from Computerl . Userl can connect to Computer2 remotely by using Computer Management.
You need to ensure that Userl can use Event Viewer on Computerl to remotely view the Event Viewer logs on Computer2.
A. Yes
B. No
Explanation:
Once you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
Note: This question is part of a series of questions that present the same scenario. Each question in the series conta ins a unique solution. Determine whether the
solution meets the stated goals.
Your network contains a single Active Directory domain named contoso.com. The domain contains two computers named Computerl and Computer2.
A user named Userl is a member of the local Adm inistrators group on Computerl and Computer2.
Userl fa ils to access the Event Viewer logs on Computer2 from Computerl . Userl can connect to Computer2 remotely by using Computer Management.
You need to ensure that Userl can use Event Viewer on Computerl to remotely view the Event Viewer logs on Computer2.
0 A. Yes
0 B. No
N ote: I his quest ion 1s part of a series of questions th at present th e same scenario. Each question 1n the series contains a unique solution. Determine whether the
solution meets the stated goals.
Your network contains a single Active Directory domain named contoso.com. The domain contains two computers named Computerl and Computer2.
A user named Userl is a member of the local Administrators group on Computerl and Computer2.
Userl fails to access the Event Viewer logs on Computer2 from Computerl . Userl can connect to Computer2 remotely by using Computer Management.
You need to ensure that Userl can use Event Viewer on Computerl to remotely view the Event Viewer logs on Computer2.
A. Yes
B. No
Explanation:
Once you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
Note: This question is part of a series of questions that present the same scenario. Each question in the series conta ins a unique solution. Determine whether the
solution meets the stated goals.
Your network contains a single Active Directory domain named contoso.com. The domain contains two computers named Computerl and Computer2.
A user named Userl is a member of the local Adm inistrators group on Computerl and Computer2.
Userl fa ils to access the Event Viewer logs on Computer2 from Computerl . Userl can connect to Computer2 remotely by using Computer Management.
You need to ensure that Userl can use Event Viewer on Computerl to remotely view the Event Viewer logs on Computer2.
0 A. Yes
0 B. No
N ote: I his quest ion 1s part of a series of questions th at present th e same scenario. Each question 1n the series contains a unique solution. Determine whether the
solution meets the stated goals.
Your network contains a single Active Directory domain named contoso.com. The domain contains two computers named Computerl and Computer2.
A user named Userl is a member of the local Administrators group on Computerl and Computer2.
Userl fails to access the Event Viewer logs on Computer2 from Computerl . Userl can connect to Computer2 remotely by using Computer Management.
You need to ensure that Userl can use Event Viewer on Computerl to remotely view the Event Viewer logs on Computer2.
A. Yes
B. No
Explanation:
Once you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
Note: This question is part of a series of questions that present the same scenario. Each question in the series conta ins a unique solution. Determine whether the
solution meets the stated goals.
Your network contains a single Active Directory domain named contoso.com. The domain contains two computers named Computerl and Computer2.
A user named Userl is a member of the local Adm inistrators group on Computerl and Computer2.
Userl fa ils to access the Event Viewer logs on Computer2 from Computerl . Userl can connect to Computer2 remotely by using Computer Management.
You need to ensure that Userl can use Event Viewer on Computerl to remotely view the Event Viewer logs on Computer2.
0 A. Yes
0 B. No
N ote: I his quest ion 1s part of a series of questions th at present th e same scenario. Each question 1n the series contains a unique solution. Determine whether the
solution meets the stated goals.
Your network contains a single Active Directory domain named contoso.com. The domain contains two computers named Computerl and Computer2.
A user named Userl is a member of the local Administrators group on Computerl and Computer2.
Userl fails to access the Event Viewer logs on Computer2 from Computerl . Userl can connect to Computer2 remotely by using Computer Management.
You need to ensure that Userl can use Event Viewer on Computerl to remotely view the Event Viewer logs on Computer2.
A. Yes
B. No
Explanation:
https://msdn.microsoft.com/en-us/library/aa384372(v=vs.85).aspx
You have a computer that has a local printer.
Which two tools can you use to achieve the goal? Each correct answer presents a complete solution.
Explanation:
http://www.addictivetips.com/windows-tips/how-to-share-a-usb-printer-over-your-network-in-windows-10/
https://technet. m icrosoft.com/en-us/library/hh91 8366(v=wps. 630). aspx
A user has a laptop named Computerl that runs Windows 10 and has a 64-bit application named Appl installed.
App 1 fails to launch and generates an error message indicating that the application is not supported on this version of Windows.
A. Create a package that includes Appl by using the Windows Imaging and Configuration Designer (Windows ICD).
Explanation:
https://msdn.microsoft.com/en-us/library/windows/desktop/dd744763(v=vs.85).aspx
You have a laptop that has a high resolution display.
The Change the size of the text, apps, and other items setting is set to 175%.
When you start Appl, the visual elements are misaligned, and the application interface does not appear as expected.
You need to ensure that App 1 is displayed properly without affecting how other applications are displayed.
Explanation:
A user has a computer that runs Windows 10.
The user reports that it takes a very long time to start the computer.
You need to identify wh ich user applications cause the greatest delays when starting the computer.
A. Performance Monitor
B. System Configuration
C. Resource Monitor
D. Task Manager
Explanation:
You need to create a two-way mirror by using Storage Spaces. The solution must minimize data loss.
Explanation:
http://www.windowscentral.com/how-use-storage-spaces-windows-1 0
Your company is developing a Universal Windows Platform (UWP) app named App 1. Appl is not published in the Windows Store.
C. Set the AppX Deployment Service (AppXSVC) to Automatic and restart the computer.
Explanation:
https://msdn.microsoft.com/windows/uwp/get-started/enable-your-device-for-development
You purchase licenses for several apps from the Windows Store and you list the apps in your Windows Store for Business.
B. a web browser and a Microsoft Azure Active Directory (Azure AD) account
C. the Windows Store app and a Microsoft Azure Active Directory (Azure AD) account
Explanation:
The network contains five servers configured as shown in the following table:
Test_Server has a shared folder named ShareA. Only local users have permissions to ShareA.
The network contains a mainframe computer that is administered by using the Telnet protocol.
The domain contains four client computers configured as shown in the following table:
The network contains a mainframe computer that is administered by using the Telnet protocol.
The domain contains four client computers configured as shown in the following table:
All of the client computers run the 64-bit version of Windows 10. User3 frequently accesses ShareA. Remote Desktop is enabled on Computer4.
0 B. Credential Manager
" C. Security Options in the Computer Configuration of the Local Computer Policy.
B. Credential Manager
Explanation:
The network contains five servers configured as shown in the following table:
Test_Server has a shared folder named ShareA. Only local users have permissions to ShareA.
The network contains a mainframe computer that is administered by using the Telnet protocol.
The domain contains four client computers configured as shown in the following table:
The network contains a mainframe computer that is administered by using the Telnet protocol.
The domain contains four client computers configured as shown in the follow ing table:
All of the client computers run the 64-bit version of Windows 10. User3 frequently accesses ShareA. Remote Desktop is enabled on Computer4.
0 B. Credential Manager
B. Credential Manager
C. Authorization Manager
Explanation:
http://www.digitalcitizen.life/credent ial-manager-where-windows-stores-passwords-other-login-details
Note: This question is part of a series of questions that use the same scenario. For your convenience, the scenario is repeated in each question. Each question
presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series.
The network contains five servers configured as shown in the following table:
Test_Server has a shared folder named ShareA. Only local users have permissions to ShareA.
The network contains a mainframe computer that is administered by using the Telnet protocol.
The domain contains four client computers configured as shown in the following table:
The network contains a mainframe computer that is administered by using the Telnet protocol.
The domain contains four client computers configured as shown in the follow ing table:
All of the client computers run the 64-bit version of Windows 10. User3 frequently accesses ShareA. Remote Desktop is enabled on Computer4.
Wh ich two Windows features should you install? Each correct answer presents part of the solution.
B. Embedded BootExperience
E. Hyper-V Hypervisor
Explanation:
https://technet.microsoft.com/en-us/itpro/windows/keep-secure/credential-guard
https://blogs. technet. m icrosoft.com/ash/2016/03/02/w indows-10-device-guard-and-credential-guard-demystified/
Note: This question is part of a series of questions that use the same scenario. For your convenience, the scenario is repeated in each question. Each question
presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series.
The network contains five servers configured as shown in the following table:
Test_Server has a shared folder named ShareA. Only local users have permissions to ShareA.
The network contains a mainframe computer that is administered by using the Telnet protocol.
The domain contains four client computers configured as shown in the following table:
The network contains a mainframe computer that is administered by using the Telnet protocol.
The domain contains four client computers configured as shown in the follow ing table:
All of the client computers run the 64-bit version of Windows 10. User3 frequently accesses ShareA. Remote Desktop is enabled on Computer4.
A. Run tlntadmn.exe
A user named Userl works from home and has a desktop computer that runs Windows 10 Pro. Userl has an application named App 1 that requires access to
server on the corporate network. Userl creates a VPN connection on the computer.
You need to ensure that when Userl opens App 1, App 1 can access the required data.
0 E. Run the New-NetFirewallRule cmdlet and specify the- Direction Outbound parameter.
E. Run the New-NetFirewallRule cmdlet and specify the- Direction Outbound parameter.
Explanation:
httne· //tor-hnot m j,.. ,-nc,n~ l"'nm /itnr-n /nn,Mor'eholl /u,inrin,ue /\lnnr,liont /~rfn ..,,nn,..nnnO-r\tinntrinnor-~nnli,..':llt inn
Note: This question is part of a series of questions that use the same set of answer choices. Each answer choice may be used once, more than once, or not at
all.
Your network contains a single Active Directory domain. The domain contains devices that run Windows 10 Enterprise.
@ E. Run the New-NetFirewallRule cmdlet and specify the- Direction Outbound parameter.
• E. Run the New-NetFirewallRule cmdlet and specify the- Direction Outbound parameter.
Explanation:
computers t e computers are in a wor group.
A computer named PC_Userl has shared folder named Sharel. Users are not prompted for credentials when they access Sharel.
You modify the permissions on Sharel so that the share is shared only to a user named Userl.
You need to ensure that when users from other computers in the workgroup access Sharel, they must authenticate by using the credentials of Userl .
0 E. Run the New-NetFirewallRule cmdlet and specify the- Direction Outbound parameter.
E. Run the New-NetFirewallRule cmdlet and specify the- Direction Outbound parameter.
Explanation:
Your network contains a single Active Directory domain. The domain contains a VPN server that supports all of the VPN protocols.
From a computer that runs Windows l O Pro, a user named Userl creates an SSTP VPN connection to a network named VPN l .
Userl successfully connects to the VPN server. When Userl roams between different Wi-Fi access points, the user loses the connection to the corporate
network and must manually re-establish the VPN connection.
You need to ensure that VPNl automatically maintains the connection wh ile the user roams between Wi-Fi access points.
0 E. Run the New-NetFirewallRule cmdlet and specify the- Direction Outbound parameter.
E. Run the New-NetFirewallRule cmdlet and specify the- Direction Outbound parameter.
Explanation:
https://technet.microsoft.com/en-us/library/dn296460(v=wps.630).aspx
You have a computer named Computerl that has storage configured as shown in the following table:
Pool2 is empty.
@ A . Add-Physica lDisk
0 B. Diskpart
Pooll contains a storage space named Spacel that is 300 GB.
Pool2 is empty.
@ A . Add-PhysicalDisk
0 B. Diskpart
0 C. New-VirtualDisk
0 D. Remove-Physical Disk
0 E. Resize-VirtualDisk
0 F. Set-StoragePool
0 G. Subst
0 H. Update-Disk
What should you use?
• A. Add-PhysicalDisk
B. Diskpart
C. New-VirtualDisk
D. Remove-PhysicalDisk
E. Resize-VirtualDisk
F. Set-StoragePool
G. Subst
H. Update-Disk
Explanation:
https://technet.microsoft.com/itpro/powershell/windows/storage/add-physicaldisk
Note: This question is part of a series of questions that use the same set of answer choices. Each answer choice may be used once, more than once, or not at
all.
You have a computer named Computerl that has storage configured as shown in the follow ing table:
Pool2 is empty.
You need to access each folder as a separate drive from Windows Explorer.
Pool3 contains a storage space named Space2 that is 100 GB.
Pool2 is empty.
You need to access each folder as a separate drive from Windows Explorer.
0 A . Add-Physica1Disk
0 B. Diskpart
0 C. New-Virtua1Disk
0 D. Remove-Physical Disk
0 E. Resize-Virtua1Disk
0 F. Set-StoragePool
0 G. Subst
0 H. Update-Disk
I VV J .........V ,v \.IVV .... YY ..... \,,l"VI J J VIV .... 1 VY \,,I .., ....,..,I.II 11,,1 ...... VI JV .... 11 VI 11 WW I I 1 ..... V'l'V ;,J .... ,...... IVI ....... - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
A . Add-Physica1Disk
B. Diskpart
C. New-VirtualDisk
D. Remove-PhysicalDisk
E. Resize-Virtua1Disk
F. Set-StoragePool
G. Subst
H. Update-Disk
Explanation:
http://www.howtogeek.com/howto/windows-vista/map-a-drive-letter-to-a-folder-the-easy-way-in-windows/
Note: This question is part of a series of questions that use the same set of answer choices. Each answer choice may be used once, more than once, or not at
all.
You have a computer named Computerl that has storage configured as shown in the follow ing table:
Pool2 is empty.
Pool2 is empty.
0 A . Add-Physica1Disk
0 B. Diskpart
0 C. New-Virtua1Disk
0 D. Remove-Physical Disk
0 E. Resize-Virtua1Disk
0 F. Set-StoragePool
0 G. Subst
0 H. Update-Disk
What should you use?
A . Add-Physica1Disk
B. Diskpart
C. New-VirtualDisk
D. Remove-Physica1Disk
E. Resize-Virtua1Disk
F. Set-StoragePool
G. Subst
H. Update-Disk
Explanation:
https://technet.microsoft.com/en-us/itpro/powershell/windows/storage/new-virtualdisk
Note: This question is part of a series of questions that use the same set of answer choices. Each answer choice may be used once, more than once, or not at
all.
You have a computer named Computerl that has storage configured as shown in the following table:
Pool2 is empty.
Pool2 is empty.
0 A . Add-PhysicalDisk
0 B. Diskpart
0 C. New-VirtualDisk
0 D. Remove-Physical Disk
0 E. Resize-VirtualDisk
0 F. Set-StoragePool
0 G. Subst
0 H. Update-Disk
What should you use first?
A . Add-Physica1Disk
B. Diskpart
C. New-VirtualDisk
D. Remove-Physica1Disk
E. Resize-Virtua1Disk
F. Set-StoragePool
G. Subst
H. Update-Disk
Explanation:
https://technet.microsoft.com/itpro/powershell/windows/storage/remove-physicaldisk
Note: This question is part of a series of questions that use the same set of answer choices. Each answer choice may be used once, more than once, or not at
all.
You have a computer that has a dual-boot configuration. Windows 10 Enterprise is installed on the local disk. Windows 10 Pro is installed in a VHDX file name,
Diskl. vhdx. Both of the installat ions are 64-bit versions.
You need to ensure that you can install an unsigned driver to Windows 10 Pro when the computer starts in Windows 10 Pro.
0 A . Add-Windowslmage
0 B. bcdboot.exe
0 c. bcdedit.exe
0 D. bootcfg.exe
0 E. bootim.exe
0 F. bootsect.exe
0 G. diskpart.exe
(") H . Exoand-Windowslmaae
all.
You have a computer that has a dual-boot configuration. Windows 10 Enterprise is installed on the local disk. Windows 10 Pro is installed in a VHDX file name,
Diskl. vhdx. Both of the installations are 64-bit versions.
You need to ensure that you can install an unsigned driver to Windows 10 Pro when the computer starts in Windows 10 Pro.
0 A . Add-Windowslmage
0 B. bcdboot.exe
0 C. bcdedit.exe
0 D. bootcfg.exe
0 E. bootim.exe
0 F. bootsect.exe
0 G. diskpart.exe
0 H. Expand-Windowslmage
I "'"' ..........v ,v "I ,..,v, ..... ,11v, JVV VVI I 111..,,-.... .. \,,II I '"'' ,..,. ~ , ..... v VI I V""I ,v 'I" 9 IJIVVYV.., J v --.- ,v--......-r, .....--, - , .. -, .... -¥v1 ··1·.--..,v,-.... , ---.J,"\.l"l""' ";J"-n ·, --.. -. 1,·1t,;,1yyy-..,-----, ..., -- , ----, "'· ----------------------------------------------------·-···--------------···-···-··-
A . Add-Windowslmage
B. bcdboot.exe
C. bcdedit.exe
D. bootcfg.exe
E. bootim.exe
F. bootsect.exe
G. diskpart.exe
H. Expand-Windowslmage
Explanation:
Computerl has a virtual hard disk (VHD) named Diskl. vhdx. Diskl. vhdx has an NTFS partition, which is visible in File Explorer as drive E.
0 A . Add-Windowslmage
0 B. bcdboot.exe
0 C. bcdedit.exe
0 D. bootcfg.exe
0 E. bootim.exe
0 F. bootsect.exe
0 G. diskpart.exe
0 H. Expand-Windowslmage
I "-'V , 1........v ,v t,,'' "-'"'""''"-'11 TW HIV'-'•• .... , V ...,, , '-''""''",, Y t lV I'\ ,
A . Add-Windowslmage
B. bcdboot.exe
C. bcdedit.exe
D. bootcfg.exe
E. bootim.exe
F. bootsect.exe
G. diskpart.exe
H. Expand-Windowslmage
Explanation:
You have a computer that has a dual-boot configuration. Windows 10 Pro is installed on the local disk. Windows 10 Enterprise is installed in a VHDX file named
Disk1. vhdx.
You start the computer to Windows 10 Pro, and then you download a driver package.
You need to ensure that the next time the Windows 10 Enterprise installation starts, the driver is installed already.
0 A . Add-Windowslmage
0 B. bcdboot.exe
0 C. bcdedit.exe
@ D. bootcfg.exe
0 E. bootim.exe
0 F. bootsect.exe
0 G. diskpart.exe
0 H. Expand-Windowslmage
What should you run first?
A . Add-Windowslmage
B. bcdboot.exe
C. bcdedit.exe
• D. bootcfg.exe
E. bootim.exe
F. bootsect.exe
G. diskpart.exe
H. Expand-Windowslmage
Explanation:
You have a computer named Computerl that has a dual-boot configuration. Computerl has Windows 8.1 and Windows 10 installed.
You need to configure Computerl to use only 4 GB of RAM when the computer starts in Windows 10.
0 A. Add-Windowslmage
0 B. bcdboot.exe
0 C. bcdedit.exe
0 D. bootcfg.exe
0 E. bootim.exe
0 F. bootsect.exe
0 G. diskpart.exe
0 H. Expand-Windowslmage
What should you run?
A . Add-Windowslmage
B. bcdboot.exe
C. bcdedit.exe
D. bootcfg.exe
E. bootim.exe
F. bootsect.exe
G. diskpart.exe
H. Expand-Windowslmage
Explanation:
On a test computer named Computer_Testl, you pin several company-specific applications in a group named Contoso Apps, and then you export the Start
menu layout to a file named Contoso.xml.
• Ensure that you can share the c lipboard between Computer6 and the virtual machines running on Computer6.
• Add the Contoso Apps group to the Start menu of a computer named Computer7.
Explanation:
On a test computer named Computer_Testl, you pin several company-specific applications in a group named Contoso Apps, and then you export the Start
menu layout to a file named Contoso.xml.
0 A . a Wi-Fi adapter
0 B. a Bluetooth adapter
Q C. an HDM I port
0 D. a MiniDisplayPort connector
............................ J ,.. .... • ........................ ., ................. ,.. ....... ..... • .............................. ,.. ....... ..... • • ---·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·---·- ---·-·-··-···-···-·-
A. a Wi-Fi adapter
B. a Bluetooth adapter
C. an HDM I port
D. a MiniDisplayPort connector
Explanation:
https://www.microsoft.com/en-za/windows/windows-10-specificat ions#sysreqs
Note: This question is part of a series of questions that use the same scenario. For your convenience, the scenario is repeated in each question. Each question
presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series.
On a test computer named Computer_Testl, you pin several company-specific applications in a group named Contoso Apps, and then you export the Start
menu layout to a file named Contoso.xml.
0 A. NUMA spanning
0 D. RemoteFX
.............. .................................... .., ....................... ..,...,... ...... .. ......
-.; . ....... ........... ..... ..,...,....... ......... ...... ---·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·---·- - - - · - · - · · - · · · - · · · - · -
A. NUMA spanning
D. RemoteFX
Explanation:
https://technet.microsoft.com/en-us/windows-server-docs/compute/hyper-v/learn-more/use-local-resources-on-hyper-v-virtual-machine-with-vmconnect
Note: This question is part of a series of questions that use the same scenario. For your convenience, the scenario is repeated in each question. Each question
presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series.
On a test computer named Computer_Testl, you pin several company-specific applications in a group named Contoso Apps, and then you export the Start
menu layout to a file named Contoso.xml.
0 A. Toggle Keys
0 B. Sticky Keys
0 C. Filter Keys
0 D. Mouse Keys
.............. .................................... .., ....................... ..,...,... ...... .. ......
-.; . ....... ........... ..... ..,...,....... ......... ...... ---·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·-·---·- - - - · - · - · · - · · · - · · · - · -
A. Toggle Keys
B. Sticky Keys
C. Filter Keys
D. Mouse Keys
Explanation:
http://www.pcmech. com/article/how-to-manage-ease-of-access-features-in-windows-10/
HOTSPOT
You have a computer named Computerl that runs Windows 10.
You run the Get-VMHost I fl* cm diet on Computerl, and you receive the following output:
CompueerName COMPUTER!
Lo9icalProcessorCount 4
ResourceMeterin9Interval 01 : 00 :00
HostNumaStatus {COMPOTl:.Rll
NumaStaeus I}
IovSupport False
IovSupportReasons {SR- IOV is not supported on this version of Windows. }
InternalNet workAdapters {External networ k}
ExternalNetworkAdapters {External network_External}
SupportedVmVersio ns { S.O, 6.:, 7. 0}
SecureSootTemplates {MicrosoftWindows, Hicroso f tUEFICertificateAuthority}
Enable2nhancedSessionMode False
tibreChannelWwnn C003 FFOOOOFFFfOO
FibreChannelWwnnMaximum C003 ffA4 3B08ffff
f ibreChannelWwnnMinimum C003 ffA43B080000
MacAddressMax imum 001 55DCD:3FF
MacAddressMinimum OO!SSDCD:300
NumaSpanningEnabled True
VirtualHardDiskPath C: \ VMs
Virt ua lMa chinePath C: \ VMs
F'UllyQuali!iedDomainName NOR..'<GROOP
MemoryCapaciey 84995891:0
Name COMPOTERl
Max imumSt orageHigrations :
MaximumVir t ua lMachineMigra eions :
UseAnyNetworkForMigrat ion False
VirtualMachineMi9rationAut henticationType CredSS P
VirtualMachineHigrationEnabled False
Virtua l Machine.Higrac.ionPertorma nceOption TCPU
CimSession CimSes.sion :
IsDeleted False
"" . . ...
' ..,
E'ullyQua li f i e dDomainName liiORKGROOP
MemoryCa paci t y M9958 91:0
Namf! COMPUTER!
Max imumSto raqeHi qrat ions
Max imumVirt ua lMa chineMiqra tions
UseAnyNetworkf o rHigra tion Fa lse
VirtualMac h i n~igrationAuth~n tieationTypf! Cr•dSS P
Vi rtual Mach i n eMi9r a t ionEnabled fa lse
Vi rtua lMachineMiqratio n Performa nceOption TCPIP
CimSession CimSe ssion :
I sDf!'l f!t.f! d f"al.sf!'
Use the drop-down menus to select t he answer choice that completes each statement based on the information presented in the output.
Answor Area
Explanation:
*Box 1*
can perform a maximum of two concurrent
*Box 2*
can perform a maximum of two concurrent
How should you configure the provisioning package? To answer, select the appropriate options in the answer area.
Answor Aroa
Explanation:
*Box 1*
OU=OUl, DC=contoso, DC=com
*Box 2*
Station%RAND:3%
https://technet.microsoft.com/en-us/itpro/windows/deploy/provision-pcs-for-initial-deployment
You have a computer named Computerl.
You obtain a new driver for a device installed on Computerl. The driver package is stored in C:\Drivers and includes the following files:
• Driver.inf
• Driver.di!
• Driver.sys
• Driver.cat
0 A . Driver.sys
0 B. Driver. d II
0 C. Driver.cat
0 D. Driver.inf
You have a computer named Computerl.
You obtain a new driver for a device installed on Computerl. The driver package is stored in C:\Drivers and includes the following files:
• Driver.inf
• Driver.di!
• Driver.sys
• Driver.cat
A. Driver.sys
B. Driver.di!
C. Driver.cat
D. Driver.inf
Explanation:
You need to deploy Windows 10 Enterprise. The deployment must support Miracast, Bit Locker Drive Encryption (Bit Locker), and Windows Hello with facia l
recognition.
0 A. Computerl
0 B. Computer2
0 C. Computer3
0 D. Computer4
---·-·-·-·-·-·-·-·-·-·-·-·-
camera
Computer2 1.2 Yes Yes illuminated infrared
camera
Computer3 2.0 No Yes Webcam
Computer4 2.0 Yes No Webcam
You need to deploy Windows l OEnterprise. The deployment must support Miracast, Bit Locker Drive Encryption (Bit Locker), and Windows Hello with facia l
recognition.
A. Computerl
B. Computer2
C. Computer3
D. Computer4
Explanation:
Your network contains a single Active Directory domain that has a Key Management Service (KMS) host.
0 A. ospp. vbs/act
0 B. slmgr.vbs/dli
0 C. slmgr.vbs/ato
0 D. ospp.vbs/dstatus
Your network contains a single Active Directory domain that has a Key Management Service (KMS) host.
A. ospp.vbs/ act
B. slmgr.vbs/dli
C. slmgr.vbs/ato
D. ospp.vbs/ dstatus
Explanation:
From Computerl, you need to view the installed devices and their associated drivers on Computer2.
Explanation:
Explanation:
You need to ensure that a file named Policyl .docx appears on the desktop of Computerl for all users who use the computer. The solution must minimize the
number of copies of Policyl .docx.
Explanation:
~.-tt,nQ
PIN C ompl«•ly
RC'fflotf' Pusc>orl
< >
f>ctC"nd~ 'llond.>rd
.) SC'tt•ng( •)
Use the drop-down menus to select t he answer choice that completes each statement based on the information presented in t he graphic.
Answer Area
tirtcend<"d /\ !>111ncwr d
) Sffl1n 9(~)
Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.
Answer Area
~
To sign in to the computer, the user (answer choice].
must always enter a PIN
" " . . . . PON.,. """w"e "'""" ......,.
must always use a naraware security aev1ce
Answer Area
Fxolanation:
You have a computer that runs the 32-bit version of Windows 7 Professional with Service Pack 1.
Which two editions of Windows 10 can you upgrade the computer to? Each correct answer presents a complete solution.
Explanation:
What are two possible ways to achieve the goal? Each correct answer presents a complete solution.
B. Start the computers from Windows PE, and then run setup.exe from a network share that contains the Windows 10 installation source fi les.
C. While signed in to Windows 8.1 Pro, run setup.exe from a network share that contains the Windows 10 installation source files.
D. Start the computers from a bootable USB drive that contains the Windows 10 source files.
Explanation:
httpJ/www.laptopmag.com/articles/how-to-upgrade-windows-10
You have a computer named Computerl that runs the 64-bit version of Windows 10 Pro.
You obtain a new driver for a device installed on Computerl . The driver is not digitally signed.
B. From User Configuration in Group Policy, configure the Driver Installation settings.
D. From Computer Configuration in Group Policy, configure the Driver Installation settings.
Explanation:
httpJ/en.code-bude.net/2015/08/19/how-to-install-unsigned-drivers-in-windows-10/
You have 10 computers that run Windows 1O Pro.
You need to configure the computers to receive updates as part of Current Branch for Business.
D. Clear the Give me updates for other Microsoft products when I update check box.
Explanation:
httpJ/windowsitpro.com/windows·10/configure-machine-use-current·branch·business-windows·10
HOTSPOT
You have the following output from Windows PowerShell:
Name Spooler
Requ1redServ1ces ( RPCSS , http}
CanPauseAndContinue false
CanShutDown Fa lse
CanStop Fa lse
D1splayName Print Spooler
DependentServices (fax}
MachineName
ServiceName Spooler
ServicesDependedOn ( RPCSS , http}
ServiceHa.ndle SafeServiceHandle
Sta tus St oppe d
Service Type Win3:0wnProcess, InteractiveProcess
St.art.Type Disabled
Site
Conta ine r
What command should you run first? To answer, select the appropriate options in the answer area.
Answer Area
MachineName
s~rvic~Na.m~ Spool~r
ServicesDependedOn {RPCSS , http)
ServiceHandle SafeServiceHandl e
St.at.us S t opped
S~rvic~Typ~ Win3:0wnProc~ss, Int~ractiv~Proc~ss
S~artType Disabled
Sit e
Container
What command should you run first? To answer, select the appropriate options in the answer area.
A nsw er Area
Restart-Service $True
Resume-Service -CanShutdowm $False
Set-Service -Force
:;tart-:;erv1ce -StartupType Automatic
-l;tatus :;tart
I
You need to start the service.
What command should you run first? To answer, select the appropriate options in the answer area.
Answer Area
I
-Name Spooler
Restart-Service $True
Resume-Service -CanShutdowm $False
Set-Service -Force
Start-Service -:sranup 1ype Automatic
~ -Status Stan
I
Explanation:
The StartType of the service is disabled. This needs to be set to Manual or Automatic before you can start the service.
You have computers that run Windows 10.
You need to identify both active malware instances and past malware instances from the last three months.
A. Get-EventSubscriber
B. Get-MpThreatCatalog
C. Get-WindowsErrorReporting
D. Get-MpThreatDetection
Explanation:
https://technet.microsoft.com/en-us/library/dn433290.aspx
I.: LAOII I " ", "(~ I
'l,.J MAIII
-~ lt~f 5 1 of 122
- ,lnl1 ecwo1 RS~or 1ca1rn.-s111g1e AC u~ErDtr e
On a domain controller, an administrator creates a custom Microsoft Management Console (MMC) that uses the Active Directory Users and Computer snap-in.
The domain contains a computer named Computerl that runs Windows 10. You use the computer to perform management tasks. You copy the custom MMC
to the computer.
You need to ensure that you can use MMC and all of the features of the MMC.
Explanation:
Computerl has two volumes named C and D. Volume C is formatted NTFS and volume Dis formatted exFAT.
You need to ensure that you can recover files stored in D:\Data.
B. File History
C. wbadm in.exe
Explanation:
I.: LAOII I "", ~..,.. ,
'l,.J MAIII
-~ Item 53 of 12
You have a computer named Computerl that has a 1-TB volume named E.
You need to receive a notification when volume E has less than 100 GB of free space.
A. Event Viewer
B. Disk Cleanup
C. Performance Monitor
D. System Configuration
E. Resource Monitor
Explanation:
HOTSPOT
You have a Windows Server Update Services (WSUS) server.
You need to configure a computer to receive updates from WSUS. The solution must ensure that the updates are installed only on Sunday at 20:00.
Which two settings should you configure? To answer, select the appropriate settings in the answer area.
...... _
JTu... _ ,,,_*''""'" ........- .....·--·- ...
... _ _. , _
11,., ..,..r,,,......,
•;.,. , onh9!"...i
--
"""
-
'l'l<>_o-__,,_,_,..,,-•,.._,.,,_.-,._-~.,,-- No1~-,_..., ,-
1 ......_.......-~,, ......................... ........ 1,,., .........,. ' .....
10--fo·· ..--,-.......... ...... ~........... .....
'"· ••• '"''°""' -..i" ,,..,,.,,. ·'-''°'' ..,......,,,, ,i,,,. "'T~~,1 ...
l~n--"""'"°'~...'J
,...,_ •lg-'-'.-"',_.,._..,,,_,__.,..,..,ro.,.
••oA,~,,,_...,
N,,t<.onf ~•,I
""•
-
LAOII I "", '-C~._
'l,.J MAIII
Item 54 of 12
....... -·
n= .,,_.,,,
.., ..... r
...........,_ ...,
.,.,, ..... . - ,
...... <....,_ .....,
---
----
,..., ,,..,r~
...............,....,..
............._...
n,,,,_,,_....,....•_._..._.,._
IIT
AII--• _.,,,_t•-·
..... _ _ _ _.,.,_........ _ ..,..,__ '"'""''-
........ .........
....,,,o.,I,_,,.
11.......,.....
~-•--4
-,
,11.11--11, ........... " "' _ ... . . . . -..... - ,.....
1, .....- - . - -....................,- - ~·-
... ·-·" _.. -.,.......................
1•1.. -0-_ ......-._,.., _ ,,,,_,.., ...-,...........-.. ""'<""'~
"'"'<""'_....
,._.~1
--
...........
IO~te-(,,. .._ _._11..__,
··-· ~- ,_ .,..,.,..,,_...!I
.... "'"' ........ "lt,.....
,.............,.......
ltn_ ,_.,..., ....... •....,
"'" ''"'
,i,.,
~
_
,;,., .......,,......,
..... ....,_...
"''V"'"''..
....... ,.....
............,- ..., .........., ~
--
·--h. --
I.: LAOII I "", ~..,..,
'l,.J MAIII
-~ Item 55 of 12
From File Explorer, you attempt to open Data.docx, but you discover that the file is corrupt.
A. File History
Explanation:
I.: LAOII I "", ~..,U
'l,.J MAIII
-~ Item 56 of 12
You need to ensure that you can recover previous versions of the fi les in D:\Photos.
Explanation:
https://support.microsoft.com/en-us/help/17128/windows-8-file-history
I.: LAOlll"",'-C"'' 'l,.J MAIII
-~ Item 57 of 12
You receive a SMART alert that the hard disk drive will fail soon.
You need to create a backup that you can use to restore the operating system and the user documents to a replacement drive.
A. vssadmin.exe
B. wbadmin.exe
C. Start-WBBackup
D. Start-OBBackup
Explanation:
A user reports that a computer was slower than expect during the last week.
You need to identify any application fai lures that occurred during the last week.
A. Performance Monitor
B. Task Manager
C. Resource Monitor
D. Reliability Monitor
Explanation:
You have a computer named Computerl that runs Windows 10. Computerl has a printer named Printerl installed.
You need to configure the settings of Printerl remotely from another computer.
Explanation:
HOTSPOT
You run the Get-Service cmdlet and you receive the fol lowing output:
Name Service !
RequiredServices (}
CanPauseAndContinue f al.se
CanShutDown False
Ca nSt op False
Di.!play'Name Service!
DependentServices (Service:}
MachineName
Se rvice Name Service !
Serv1ce.9Depended0n (}
ServiceHandle
Status Seopped
Service Type Win3:ShareProcess
StartType Manual
Site
Container
Name Service::
RequiredServices (Service!}
CanPauseAndContinue f alse
Ca nShueDown False
CanS eop False
D1splayName Service:
DependentServices (Service3}
Ma chine Name
ServiceName Service:
ServicesDependedOn (Service!}
ServiceHandle
Status Seopped
Service Type Win3:ShareProcess
StartType Au tom.a tic
Si-e
ServiceHandle
Status Seo pped
Se rvice Type Win3:ShareProcess
StartType Manual
S i te
Container
You need to identify what occurs when the status of the services changes.
What should you identify? To answer, select the appropriate options in the answer area.
Answ e r Area
What should you identify? To answer, select the appropriate options in the answer area.
Answe r Area
I stans
Explanation:
https://msdn.microsoft.com/en-us/library/system.serviceprocess.servicecontroller.servicesdependedon(v=vs. 11 O).aspx
I.: LAOII I " ", '-CV I
w I ~ RESET I 'W MARI
-~ Item 61 of 12
HOTSPOT
You configure the Group Policy settings on a computer that runs Windows 10 as shown in the following graphic:
1.ea1• .~.... D X
... , ¥law Hlllp
• • itlll! ,J} • rm T
c........-
EnoblNI No
5s
Use the drop-down menus to select the answer choice that completes each statement based on the information graphic.
Answer Area
Ca C1 Stnndan:t
s
Use the drop-down menus to select the answer choice that completes each statement based on the information graphic.
Answer Area
be unavailable
have updates installed
oe ava11ao1e to aamm1strators on1y
will be uodated
cannot be launched
never receive upaates
I.: LAOII I " ", '-CV I
'l,.J MAIII
-~ Item 61 of 12
will be uodated
cannot be launched
never receive upaates
.._
Explanation:
https://technet.microsoft.com/en-us/itpro/windows/manage/stop-employees-from-using-the-windows-store
htt.n_c::JLwww_ window~~C.IU"itv orol33P.3Mfu-QR6.d;:,;1&l5cA.;:,D.4p_;,C.,3;:,lb£?1t11co-~.om;:u.ir-=!mWnlo;:,cb;mrun_~ll-0Ymd;:,tp<;:___
I.: LAOII I "", '-CUL
'l,.J MAIII
-~ Item 62 of 12
Your network contains a single Active Directory domain. The domain contains a computer that runs Windows 10.
B. From the Settings app, configure the Advanced options for Windows Update.
Explanation:
You have a computer named Computerl that has the following stored credentials:
• A Windows credential for accessing a shared folder on a workgroup computer
• A Windows credential for accessing Remote Deskt op
• A Windows credential for accessing an HTTP URL
• A web credential for accessing an HTTPS URL
• A web credential for accessing an HTTP URL
Which two passwords can be viewed in c lear text from Credential Manager on Computerl?
Which two passwords can be viewed in clear text from Credential Manager on Computerl?
Explanation:
Only web credentials can be displayed. Windows credentials can never be displayed.
I.: LAOII I "", ~U.-.
'l,.J MAIII
-~ Item 64 of 12
You have a computer named Computerl that is configured to install updates from Windows Server Update Services (WSUS).
B. Click Check online for updates from Microsoft Updates, and then check for updates.
c. Clear the defer upgrades check box, and then check for updates.
D. From Windows PowerShell, run the Get-WindowsUpdatel og cmdlet, and then run the Update- Module cmdlet.
Explanation:
I.: LAOII I "", ~U..,
'l,.J MAIII
-~ Item 65 of 12
A user named Userl is a member of two groups named Groupl and Group2.
The file permissions for E:\Data\Doc 1.docx are confi gured as shown in the exhibit. (Click the Exhibit button.)
Name E:\01ta\Doc1.doa
For addruon.l information,. double-cltdt I permission entry. To modify a p,e,rniss1on enuy, ~ ect the entry and cld: Edtt (l'f w a• able).
Pennis.s1on cntnes:
Add
LAOII I "", ~U..,
I:~ Item 65 of 122
'l,.J MAIII
11.:.ll Allow
Princtpal
Group2 (AOAllJM\ Group2)
Domain Adm.ns (AOAl\JM\()om&m Ad1T11ns)
Access
Write
full controt
lnhented from
E:\Oito\
E.\O.!a\
ll Allow Groupl (ADAlUM\ Group1 ) Full contrd E. \o.ta\
Add JI ,,ew
01wble inhtntanct
0 B. Remove Userl from Group2 and instruct the user to sign out, and then sign back in.
0 C. Grant Userl Full control access to the E:\Data\Doc l .docx file, disable inheritance for the file, and then convert the inherited permissions to explicit
permissions for the file.
I Add
01uble inhtntanct
B. Remove Userl from Group2 and instruct the user to sign out, and then sign back in.
C. Grant Userl Full control access to the E:\Data\Docl .docx fi le, disable inheritance for the fi le, and then convert the inherited permissions to explicit
permissions for the fi le.
Explanation:
Computerl connects to a wireless network named WiFil and a wireless network named WiFi2. WiFil has poor signal and the connection drops frequently. WiFi'.i
is available only during certain times of the day. WiFi2 has a stronger signal that is more reliable than WiFil.
You need to configure Computerl to use WiFi2 whenever possible. WiFil should be used when WiFi2 is unavailable.
Which three settings should you configure? Each correct answer presents part of the solution.
D A. From the properties of WiFi2, select Connect even if the network is not broadcasting its name (SSI D)
D B. From the properties of WiFil, select Connect automatically when this network is in range.
D D. From the properties of WiFi2, select Connect automatically when this network is in range.
D E. From the properties of WiFil, select Look for other wireless networks while connected to this network.
D F. From the properties of WiFi2, select Look for other wireless networks while connected to this network.
I.: LAOII I "", ~uu 'l,.J MAIII
-~ Item 66 of 12
Computerl connects to a wireless network named WiFil and a wireless network named WiFi2. WiFil has poor signal and the connection drops frequently. WiFi:;
is available only during certain times of the day. WiFi2 has a stronger signal that is more reliable than WiFi l .
You need to configure Computerl to use WiFi2 whenever possible. WiFil should be used when WiFi2 is unavailable.
Which three settings should you configure? Each correct answer presents part of the solution.
A. From the properties of WiFi2, select Connect even if the network is not broadcasting its name (SSI D)
B. From the properties of WiFil , select Connect automatically when this network is in range.
D. From the properties of WiFi2, select Connect automatically when this network is in range.
E. From the properties of WiFil , select Look for other wireless networks while connected to this network.
F. From the properties of WiFi2, select Look for other wireless networks while connected to this network.
Explanation:
You have a computer named Computerl that runs Windows 10.
On Computerl. C:\Folderl has the permissions configured as shown in the following table.
You share C:\Folderl as Folderl and you grant access to the Everyone group.
ShareS1:;a1:;e Online
Availabilit;yType NonClustered
ShareType FileSystemDirectory
FolderEnumerat;ionMode AccessBased
Cachl.ngMode Manual
Smblnsi:;ance Default
CAI'imeoui:; 0
ConcurrentOserLimit 0
EncryptData False
Name Folder!
Path C: \ Folderl
ShareState Online
AvailabilityType No nClustered
ShareType FileSystemDirecto ry
Fo lderEnumeratio nMo de AccessBased
CachingMo de Manual
Smblnstance Default
CATimeo ut 0
ConcurrentUserLimit 0
EncryptData False
Name Fo lder!
Path C : \ Fo lderl
Scoped False
Scope Name : ,,_
SecurityDescripto r O: BAG:DUD : (A;; Ox l: Ooa9;; ; WD)
0 A. Userl cannot see the Folderl share on the network and cannot connect to Folderl.
0 B. Userl can see the Folderl share on the network and can connect to Folderl .
0 C. Userl cannot see the Folderl share on the network but can connect to Folderl.
0 D. Userl can see the Folderl share on the network but cannot connect to Folderl.
ConcurrentUserLimit 0
EncryptData Fa lse
Name Fo lder!
Path C: \ Fo lderl
Scoped False
Scope Name : "'
SecurityDescripto r O:BAG:DUD : (A;; Ox l: OOa9;; ; WD)
A. Userl cannot see the Folderl share on the network and cannot connect to Folderl .
B. Userl can see the Folderl share on the network and can connect to Folderl .
C. Userl cannot see the Folderl share on the network but can connect to Folderl .
D. Userl can see the Folderl share on the network but cannot connect to Folderl .
Explanation:
https://technet.microsoft.com/en-us/library/jj635727(v=wps.630).aspx
Your company uses a Window Store for Business that contains an app named Appl.
You have three computers that are prevented from accessing the Internet.
What are two possible ways to achieve the goal? Each correct answer presents a complete solution.
D E. an answer file created by using Windows System Image Manager (Windows SIM)
You have three computers that are prevented from accessing the Internet.
What are two possible ways to achieve the goal? Each correct answer presents a complete solution.
D. an AppX package deployed by using Deployment Image Servicing and Management (DISM)
E. an answer file created by using Windows System Image Manager (Windows SIM)
Explanation:
The domain contains two computers named Computerl and Computer2 and a domain controller named DCl.
On Computerl. you run the net user Userl command and you receive the following output:
User the drop-down menu to select the answer choice that completes each statement based on the information presented in the output.
Answer Area
Answer Area
A user named Userl is a member of the local Administrators group on Computerl and Computer2.
Userl fails to remotely manage the devices on Computer2 by using Device Manager on Computerl .
Userl can connect to Computer2 remotely by using Computer Management.
You need to ensure that Userl can disable a device on Computer2 remotely.
Solution: You enable Remote Desktop on Computer2, and you instruct Userl to use Remote Desktop.
A. Yes
B. No
Explanation:
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution. Determine whether the
solution meets the stated goals.
A user named Userl is a member of the local Administrators group on Computerl and Computer2.
Userl fails to remotely manage the devices on Computer2 by using Device Manager on Computerl .
Userl can connect to Computer2 remotely by using Computer Management.
You need to ensure that Userl can disable a device on Computer2 remotely.
Solution: You start the Plug and play and Remote Registry services on Computer2.
0 A . Yes
0 B. No
solution meets the stated goals.
A user named Userl is a member of the local Administrators group on Computerl and Computer2.
Userl fails to remotely manage the devices on Computer2 by using Device Manager on Computerl .
Userl can connect to Computer2 remotely by using Computer Management.
You need to ensure that Userl can disable a device on Computer2 remotely.
Solution: You start the Plug and play and Remote Registry services on Computer2.
A. Yes
B. No
Explanation:
Your network contains a single Active Directory domain named contoso.com. The domain contains two computers named Computerl and Computer2.
A user named Userl is a member of the local Administrators group on Computerl and Computer2.
Userl fails to remotely manage the devices on Computer2 by using Device Manager on Computerl .
Userl can connect to Computer2 remotely by using Computer Management.
You need to ensure that Userl can disable a device on Computer2 remotely.
Solution: You enable the Allow remote access to the Plug and Play interface Group Policy setting on Computer2.
A . Yes
B. No
Explanation:
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution. Determine whether the
solution meets the stated goals.
While performing maintenance on a computer, you open Indexing Options, and then you c lick Pause.
Solution: From the Start menu, you click Power and then you click Restart.
A. Yes
B. No
Explanation:
While performing maintenance on a computer, you open Indexing Options, and then you c lick Pause.
Solution: From the Services console, you restart the Storage Service service.
A. Yes
B. No
Explanation:
While performing maintenance on a computer, you open Indexing Options, and then you c lick Pause.
Solution: From the Services console, you restart the Windows Search service.
A. Yes
B. No
Explanation:
While performing maintenance on a computer, you open Indexing Options, and then you c lick Pause.
Solution: You sign out of Windows, and the you sign back in.
A. Yes
B. No
Explanation:
You have a computer named Computerl that has storage confi gured as shown in the follow ing table.
Pooll contains a storage space named Spacel that is 300 GB. Pool3 contains a storage space named Space2 that is 100 GB. Pool2 is empty.
0 A. Add·Physica1Disk
0 B. Diskpart
I Disk7 1100GB I Pool3
Disks 100GB Pool3
Pooll contains a storage space named Spacel that is 300 GB. Pool3 contains a storage space named Space2 that is 100 GB. Pool2 is empty.
0 A . Add-Physica1Disk
0 B. Diskpart
0 C. New-VirtualDisk
0 D. Remove-Physical Disk
0 E. Resize-Virtua1Disk
0 F. Set-StoragePool
0 G. Subst Update-Disk
0 H. Update-Disk
A . Add-Physica1Disk
B. Diskpart
C. New-Virtua1Disk
D. Remove-Physica1Disk
E. Resize-Virtua1Disk
F. Set-StoragePool
G. Subst Update-Disk
H. Update-Disk
Explanation:
References:
https://docs.microsoft.com/en-us/windows-server/storage/storage-spaces/resize-volumes
Note: This question is part of a series of questions that use the same set of answer choices. Each answer choice may be used once, more than once, or not at
all.
You have a computer named Computerl that has storage configured as shown in the following table.
Pooll contains a storage space named Spacel that is 300 GB. You discover that Disk2 experiences physical errors.
You need to ensure that all of the data in Spacel is stored on other disks in the storage pool only.
0 A. Add-Physica1Disk
..Q_e. Diskoatt
I Disk7
Disks
1100 GB
100GB
I Pool3
Pool3
Pooll contains a storage space named Space1 that is 300 GB. You discover that Oisk2 experiences physical errors.
You need to ensure that all of the data in Spacel is stored on other disks in the storage pool only.
0 A . Add-PhysicalDisk
0 B. Diskpart
0 C. New-VirtualDisk
0 D. Remove-Physical Disk
0 E. Resize-VirtualDisk
0 F. Set-StoragePool
0 G. Subst
0 H. Update-Disk
What should you use?
A . Add-Physica1Disk
B. Diskpart
C. New-VirtualDisk
D. Remove-Physica1Disk
E. Resize-Virtua1Disk
F. Set-StoragePool
G. Subst
H. Update-Disk
Explanation:
https://t~c~bo_et.microsoft.com/itpro/powershell/windows/storage/rgmQy~physical~
Note: This question is part of a series of questions that use the same set of answer choices. Each answer choice may be used once, more than once, or not at
all.
You have a computer named Computerl that has storage configured as shown in the following table.
Pooll contains a storage space named Spacel that is 300 GB. Pool3 contains a storage space named Space2 that is 100 GB. Pool2 is empty. Disks fails.
You add a new disk named Disk9 to Pool3. You need to remove Disks from Pool3.
0 A. Add-PhysicalDisk
I Disk? 1 100GB Pool3
Disk8 100GB Pool3
Pooll contains a storage space named Spacel that is 300 GB. Pool3 contains a storage space named Space2 that is 100 GB. Pool2 is empty. Disks fails.
You add a new disk named Disk9 to Pool3. You need to remove Disks from Pool3.
0 A . Add-PhysicalDisk
0 B. Diskpart
0 C. New-VirtualDisk
0 D. Remove-Physical Disk
0 E. Resize-VirtualDisk
0 F. Set-StoragePool
0 G. Subst
0 H. Update-Disk
What should you use?
A . Add-Physica1Disk
B. Diskpart
C. New-VirtualDisk
D. Remove-Physica1Disk
E. Resize-Virtua1Disk
F. Set-StoragePool
G. Subst
H. Update-Disk
Explanation:
Computerl has a virtual hard disk (VHD) named Diskl. vhdx. Diskl. vhdx has an NTFS partition, which is visible in File Explorer as drive E.
0 A . Add-Windowslmage
0 B. bcdboot.exe
0 C. bcdedit.exe
0 D. bootcfg.exe
0 E. bootim.exe
0 F. bootsect.exe
0 G. diskpart.exe
0 H. Expand-Windowslmage
What should you run?
A . Add-Windowslmage
B. bcdboot.exe
C. bcdedit.exe
D. bootcfg.exe
E. bootim.exe
F. bootsect.exe
G. diskpart.exe
H. Expand-Windowslmage
Explanation:
https://technet.microsoft.com/en-us/itpro/powershell/windows/dism/expand-windowsimage
a.
Your network contains a single Active Directory domain. The domain contains a VPN server that supports all of the VPN protocols.
You have mobile devices that run Windows 10 and have VPN connections to the VPN server.
You need to ensure that when users work remotely and connect to the VPN, only traffic for the corporate network is sent through the VPN server.
Explanation:
https://technet.microsoft.com/itpro/powershell/windows/vpnclient/set-vpnconnection
A user connects to a wireless network and receives the following message:
"Do you want to allow your PC to be discoverable by other PCs and devices on this network?"
The user clicks No. The user is unable to browse to the shared folders of other computers on the network by using File Explorer.
You need to ensure that the user can browse to the other computers.
0 E. Run the New-NetFirewallRule cmdlet and specify the -Direction Outbound parameter.
E. Run the New-NetFirewallRule cmdlet and specify the -Direction Outbound parameter.
Explanation:
https://technet.microsoft.com/itpro/powershell/windows/netconnection/set-netconnectionprofile
https://www.itechtics.com/change-network-type-windows-10/
Note: This question is part of a series of questions that use the same set of answer choices. Each answer choice may be used once, more than once, or not at
all.
Your network contains a single Active Directory domain. The domain contains computers that run Windows 10 Enterprise.
When Userl works remotely, the user fails to access shared folders on the corporate network.
When User 2 and User3 work remotely, they successfully connect to the shared folders on the corporate network.
You need to ensure that Userl can connect to the shared folders w ithout user interaction.
When Userl works remotely, the user fails to access shared folders on the corporate network.
When User 2 and User3 work remotely, they successfully connect to the shared folders on the corporate network.
You need to ensure that Userl can connect to the shared folders w ithout user interaction.
0 E. Run the New-NetFirewallRule cmdlet and specify the -Direction Outbound parameter.
E. Run the New-NetFirewallRule cmdlet and specify the -Direction Outbound parameter.
Explanation:
https://technet.microsoft.com/itpro/powershell/windows/vpnclient/add-vpnconnectiontriggerapplication
Note: This question is part of a series of questions that use the same scenario. For your convenience, the scenario is repeated in each question. Each question
presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series.
Your network contains a single Active Directory domain named adatum.com. The network contains five servers configured as shown in the following table.
Test_Server has a shared folder named ShareA. Only local users have permissions to ShareA.
The network contains a mainframe computer that is administered by using the Telnet protocol.
The domain contains four client computers configured as shown in the following table:
All of the client computers run the 64-bit version of Windows 10. User3 frequent ly accesses ShareA. Remote Desktop is enabled on Computer4.
Q A. BCD Edit
0 B. Device Manager
0 C. Bootcfg
0 D. System Properties
• Configure User Account control (UAC) on Computer3 to prompt administrators for credentials when elevated privileges are required.
• Ensure that Userl can view and interact with a desktop session of User3.
• Ensure that User2 can use Telnet to manage the mainframe.
• Ensure that User4 can use Remote Desktop to access Computer4 remotely.
A. BCD Edit
B. Device Manager
C. Bootcfg
D. System Properties
Explanation:
http://www.drivethelife.com/windows-drivers/how-to-disable-driver-signature-enforcement-on-windows-1 0-8-7-xp-vista.htm I
Note: This question is part of a series of questions that use the same scenario. For your convenience, the scenario is repeated in each question. Each question
presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series.
Your network contains a single Active Directory domain named adatum.com. The network contains five servers configured as shown in the following table.
Test_Server has a shared folder named ShareA. Only local users have permissions to ShareA.
The network contains a mainframe computer that is administered by using the Telnet protocol.
The domain contains four client computers configured as shown in the following table:
All of the client computers run the 64-bit version of Windows 10. User3 frequent ly accesses ShareA. Remote Desktop is enabled on Computer4.
0 B. Remote Desktop
0 C. Remote Assistance
B. Remote Desktop
C. Remote Assistance
Explanation:
http://www.technig.com/set-up-windows-remote-assistance/
Note: This question is part of a series of questions that use the same scenario. For your convenience, the scenario is repeated in each question. Each question
presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series.
Your network contains a single Active Directory domain named adatum.com. The network contains five servers configured as shown in the following table.
Test_Server has a shared folder named ShareA. Only local users have permissions to ShareA.
The network contains a mainframe computer that is administered by using the Telnet protocol.
The domain contains four client computers configured as shown in the following table:
All of the client computers run the 64-bit version of Windows 10. User3 frequent ly accesses ShareA. Remote Desktop is enabled on Computer4.
0 B. Telnet
0 C. PsExec
0 D. Remote Desktop
• Ensure that Userl can view and interact with a desktop session of User3.
• Ensure that User2 can use Telnet to manage the mainframe.
• Ensure that User4 can use Remote Desktop to access Computer4 remotely.
B. Telnet
C. PsExec
D. Remote Desktop
Explanation:
Explanation:
https://msdn.microsoft.com/en-us/powershell/scripting/core-powershell/running-remote-commands
Note: This question is part of a series of questions that use the same scenario. For your convenience, the scenario is repeated in each question. Each question
presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series.
Your network contains a single Active Directory domain named adatum.com. The network contains five servers configured as shown in the following table.
Test_Server has a shared folder named ShareA. Only local users have permissions to ShareA.
The network contains a mainframe computer that is administered by using the Telnet protocol.
The domain contains four client computers configured as shown in the following table:
All of the client computers run the 64-bit version of Windows 10. User3 frequent ly accesses ShareA. Remote Desktop is enabled on Computer4.
IE nd ofrepeated scenario
You need to meet the requ irement of User4.
What should you do?
Explanation:
You have a Key Management Service (KMS} host and an administrative workstation named Computerl .
From Computerl. you need to validate the activation status on a computer named Computer2.
A. Get-RDLicenseConfiguration computer2
Explanation:
http://www.howtogeek.com/245445/how-to-use-slmgr-to-change-remove-or-extend-your-windows-license/
You have two computers named Computerl and Computer2 that run Windows 10. On Computerl . you create a provisioning package named Packagel.
A. Packagel .icdproj.xml
B. Customizations.xml
C. Packagel.ppkg
D. Packagel .cat
Explanation:
https://msdn.microsoft.com/en-us/windows/hardware/commercialize/manufacture/ desktop/dism-provisioning-package-command-line-options
You have a computer named Computerl that has the Hyper-V feature enabled.
You have two virtual machines named VM 1 and VM2 hosted on Computerl . VM 1 can communicate with VM2 and Computerl. VM 1 fa ils to connect to the
Internet- Computerl can connect to the Internet.
C. Create an external virtual switch and configure VMl to use the switch.
Explanation:
http://www.technig.com/connect-hyper-v-machines-to-internet/
A user named Userl has a computer that runs Windows 10.
Userl reports that Cortana displays news topics that the user wants to suppress.
A . Reminders
Explanation:
Your network contains a single Active Directory domain named contoso.com. All computers are members of the domain and run the 64-bit version of Windows
10 Enterprise. On a test computer named Computer_Test l, you pin several company-specific applications in a group named Contoso Apps, and then you export
the start menu layout to a file named contoso.xml. You install Client Hyper-Von a computer named Computer6.
Explanation:
0 B. Trusted Boot
0 D. Secure Boot
• Enable Secure Boot on a computer named Computer3.
• Connect a computer named Computer4 to a projector by using Miracast.
• Ensure that a user named Userl can use keyboard shortcuts by pressing one key at a time.
• Ensure that you can share the c lipboard between Computer6 and the virtual machines running on Computer6.
• Add the Contoso Apps group to the Start menu of a computer named Computer7.
B. Trusted Boot
D. Secure Boot
Explanation:
https://www.microsoft.com/en-us/windows/windows-10-specificat ions
Your network contains a single Active Directory domain named contoso.com. All computers are members of the domain and run the 64-bit version of Windows
10 Enterprise. On a test computer named Computer_Testl, you pin several company-specific applications in a group named Contoso Apps, and then you export
the start menu layout to a file named contoso.xml. You install Client Hyper-Von a computer named Computer6.
Explanation:
https://www.microsoft.com/en-us/windows/windows-10-specificat ions
a.
You purchase a new USB drive. You apply a custom image of Windows to the USB drive.
You plan to modify the BIOS setting on a computer so that the computer can start from the USB drive.
You need to ensure that you can start the computer by using the USB drive.
0 A . Add-Windows Image
0 B. bcdboot.exe
0 C. bcdedit.exe
0 D. bootcfg.exe
0 E. bootim.exe
0 F. bootsect.exe
0 G. diskpart.exe
0 H. Expand-Windows Image
You need to ensure that you can start the computer by using the USB drive.
A. Add-Windows Image
B. bcdboot.exe
C. bcdedit.exe
D. bootcfg.exe
E. bootim.exe
F. bootsect.exe
G. diskpart.exe
H. Expand-Windows Image
Explanation:
Note: This question 1s part of a series of questions that use the same set of answer choices. Each answer choice may be used once, more than once, or not at
all.
You have a computer named Computerl. Computerl has a virtual hard disk (VHD} named Diskl .vhdx. Windows is installed on Diskl .vhdx. Diskl .vhdx is visible
in File Explorer as drive E.
You need to configure Computerl to start from Diskl .vhdx. Hardware virtualization must not be available when Computerl starts from Diskl .vhdx.
0 A . Add-Windows Image
0 B. bcdboot.exe
0 C. bcdedit.exe
0 D. bootcfg.exe
0 E. bootim.exe
0 F. bootsect.exe
0 G. diskpart.exe
0 H. Expand-Windows Image
A . Add-Windows Image
B. bcdboot.exe
C. bcdedit.exe
D. bootcfg.exe
E. bootim.exe
F. bootsect.exe
G. diskpart.exe
H. Expand-Windows Image
Explanation:
https://msdn.microsoft.com/en-us/windows/hardware/commercialize/manufacture/desktop/boot-to-vhd-native-boot-add-a-virtual-hard-disk-to-the-boot-
menu
Note: This question is part of a series of questions that use the same set of answer choices. Each answer choice may be used once, more than once, or not at
all.
You have a computer named Computerl that has a virtual hard disk (VHD) named Diskl .vhdx.
You plan to configure Computerl for dual boot from Diskl .vhdx.
A. Add-Windows Image
B. bcdboot.exe
C. bcdedit.exe
D. bootcfg.exe
E. bootim.exe
F. bootsect.exe
G. diskpart.exe
U Cv~ , a , , J ~
You have a custom Microsoft Management Console (MMC) named Console 1 that contains several snapins.
Users use Consolel to manage specific computer settings. Users report that every time they close Consolel, they are prompted to save the MMC.
A . From the Details settings of the MMC fi le, modify the Authors property.
B. From the File menu, click Add/ Remove Snap-in. and then c lick Edit Extensions.
C. From the File menu, click Options and then modify the console mode.
D. From the Security settings of the MMC fi le, modify the permissions.
Explanation:
Which two users can add a Microsoft account to their Windows account, and then sign in to Computerl by using the Microsoft account?
D A. Userl
D B. User2
D C. User3
D D. Use!A_
User name Membership of
Computerl\Userl Guests
Computerl\User2 Users
Users
Computerl\User3
Administrators
Contoso\User4 Domain Users
Domain Users
Contoso \UserS
Domain Adm ins
Which two users can add a Microsoft account to their Windows account, and then sign in to Computerl by using the Microsoft account?
D A. Userl
0 B. User2
D C. User3
D D. User4
D E. User5
Contoso\User4 Domain Users
Domain Users
Contoso \Users
Domain Admins
Which two users can add a Microsoft account to their Windows account, and then sign in to Computerl by using the Microsoft account?
A. Userl
B. User2
C. User3
D. User4
E. Users
Explanation:
The Security settings for Printerl are configured as shown in the Security exhibit. (Click the Security button.)
You run the Get-PrintJob cmdlet and you receive the following output.
JobStatus Norma l
Caption
Descriptio n
ElementNa.me
Instance ID
CommunicationStatus
DetailedStatus
HealthState
InstallDate
Name
OperatingStatus
Operationa l Status
Pr imaryS'tat us
Status
StatusDescriptions
Co mpute rName
DataType RAW
Document.Name Untit led - Notepad
Id 5
J o bTi me 0
Paoes Pr inted 0
Position : 1
PrinterNa.me Printer!
Pr iority 70
Size 4715:
C1mSystemPropert1es Microsoft . Management.Infrastructure.C1..?11SystemProperties
0 Always availabl•
@Available from 10&
...._·_
0____
0 --=~=I To
OK L Cancel L
X
Add ...
OK L Cancel L
·- .c,gt:n.1-.:rprwua ~ ~
Manage docunents 0 D
Special permissions
l l
"" J
OK Cancel
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Answer Area
Yes No
Statements
If a new print job is sent to Printer! the new print job will be printed before 0
the print job that is in the queue already.
0
A domain user named Userl can cancel a print job in the print queue.
,,.,......... ........ .- - ~ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -- - - -
OK
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
If a new print job is sent to Printer! the new print job will be printed before
the print job that is in the queue ah·eady.
0
A domain user named Userl can cancel a print job in the print queue.
You have a computer named Computerl that runs Windows 10.
B. From a command prompt, run the dj oin command and specify the /psite parameter.
Explanation:
http://henkhoogendoorn.blogspot.co.za/2016/04/ enroll-in-to-device-management-in.html
You are evaluating a third-party antivirus application on a computer.
You attempt to uninstall the application, but the application fails to uninstall.
You need to remove the antivirus application from the computer. The solution must preserve user data and installed applications.
Explanation:
https://support.microsoft.com/en-za/help/12415/windows-l 0-recovery-options
You have a computer named Computerl that runs Windows 10. Device Manager on Computerl is configured as shown in the exhibit. (Click the Exhibit button.)
Ja Device Manager - 0 X
File Action View Help
V ,~ Computer1
a Computer
> _ Dislc drives
> Display adapters
> - DVD/ CD-ROM drives
> Floppy dislc drives
> ,i Floppy drive controllers
> ~ Human Interface Devices
> IDE ATA/ATAPI controllers
> Keyboards
> @ M ice and other pointing devices
> Monitors
(I Network adapters
v ij Ports (COM & LPT)
g Communications Port (COMl)
ij Communic.ations Port (COM2)
:;:::;i Print ueues
____________________________________________________________
,,
i Communications Port (COMl)
ij Communications Port (COM2)
riJ Print queues
>C Processors
I Software devices
Q- Storage controllers
System devices
> i Universal Serial Bus controllers
You need to ensure that you can use Communications Port (COM l ).
0 B. Attach a device to Communications Port {COM l ), and then c lick Scan for hardware changes.
0 D. Modify the IRQ and the 1/ 0 Range for Communications Port {CO Ml).
;, ~~rrrol<?r~~
> i Universal Serial Bus controllers
You need to ensure that you can use Communications Port (COM l ).
B. Attach a device to Communications Port {COM 1), and then click Scan for hardware changes.
D. Modify the IRQ and the 1/ 0 Range for Communications Port {CO Ml ).
Explanation:
You need to confi gure the I PSec tunnels to use 256-bit encrypt ion keys.
A. 3DES
B. DES
C. RSA
D. AES
Explanation:
You need to create a dynamic volume on each computer that maximizes write performance with data fault tolerance.
A. Striped Volume
B. RAID 5 Volume
C. Spanned Volume
D. Mirrored Volume
Explanation:
Do you know how many more bits there are in an 1Pv4 address compared to an 1Pv6 address?
A. 4 times more
B. 6 t imes more
C. Twice as many
D. 8 t imes more
Explanation:
https://techlog360.com/ipv4-vs-ipv6/
You have a computer named Computerl that runs Windows 10. Computerl uses the Current Branch servicing option.
Microsoft releases an upgrade to the Current Branch. The upgrade is installed on Computerl.
Explanation:
You fail to access the Settings app on Computerl due to the virus.
You need to restart the computer and ensure that Computerl displays the advanced startup options when the computer restarts.
What are two possible ways to achieve the goal? Each correct answer presents a complete solution.
D B. From System Configuration select safe boot select minimal, and then click Restart from the Start menu.
D C. From system Configuration, select selective startup, and then click Restart from the start menu.
D E. From Power on the start menu, hold the SHIFT key while you click Restart.
You need to restart the computer and ensure that Computerl displays the advanced startup options when the computer restarts.
What are two possible ways to achieve the goal? Each correct answer presents a complete solution.
A. From Windows PowerShell, run Restart -Computer Computerl - Wait - For PowerShell.
B. From System Configuration select safe boot select minimal, and then click Restart from the Start menu.
C. From system Configuration, select selective startup, and then click Restart from the start menu.
E. From Power on the start menu, hold the SHIFT key while you click Restart.
Explanation:
Printerl is located at the office and Printer2 is located at the home of Userl .
Userl frequently reports that when attempting to print, the default printer is set to Printer2.
Explanation:
At home, Userl connects to the home network by using an Ethernet connection. Userl reports that he sometimes exceeds his Internet data limit.
You need to prevent the laptop from downloading Windows updates automatically.
Explanation:
You need to prevent Appl from starting when the computer starts.
A . System Configuration
c. Computer Management
D. Task Manager
Explanation:
The director wants to ensure that only certain designated wireless laptops can connect to the new network to prevent misuse.
C. UseWEP
D. UseWPA
Explanation:
http://www.belkin.com/PYRAMID/Advancedlnfo/F5D7633uk4A/1nterfaces/Ul2/English/wireless_mac_ctrl.html\
You are using sysprep to prepare a system for imaging.
You want to reset the security ID {SID) and clear the event logs.
A. / generalize
B. /oobe
C. /audit
D. /unattend
Explanation:
https://msdn.microsoft.com/en-us/windows/hardware/commercialize/manufacture/desktop/sysprep-command-line-options
HOTSPOT
You have a computer named Computerl that has a shared folder named Sharel . Sharel has the permissions configured as shown in the following table:
You need to ensure that Userl can change files in Share1. Userl must be prevented from deleting files created by other users.
How should you configure the permissions? To answer, select the appropriate options In the answer area.
What command should you run? To answer, select the appropriate options in the answer area.
Answer Area
Dism /Image:
-------------
C:\Mount
T /Add-ProvisioningPackage /Packagepath:C:\Folderl\
---------I
Custom.appx
T
C:\Mount\Windows Custom.exe
C:\Mou nt\Windows\Provisioning Custom.msi
Custom.msu
Custom.ppkg
-
Custom.xml
Note: Each correct selection is worth one point.
Dism / Image: _ _ _ _ _ _ _ _ _ _ _ _
• _., !______•_I
/Add-ProvisioningPackage /Packagepath:C:\Folderl\ ..
C:\Mount CUstom.appx -
C:\Mount\Windows CUstom.exe
C:\Mount\Windows\Prmisioning Custom.msi -
Custom.msu
Custom.ppkg
CUstom.xml
J
Explanation:
https://blogs.msdn.microsoft.com/beanexpert/2015/09/10/add-a-provisioning-package-in-an-offline-image-using-dism/
HOTSPOT
A user fails to connect a mouse to a computer.
Use the drop-down menus to select the answer choice that completes each statement based on the information presented in output:
~~=~:~=~~:~:h~:lt~o::,~_M
_o=or J
Unknown Blue t oot h De vice Ide nt i f ication Service
Unknown Blue tooth Dell BT Travel Mouse
Onk:nown Blue tooth Microsoft Bluetooth LE Enumerator
Erro r Blue t oot h Ineel(R) Wireles s Blueeooeh(R)
Unknown Blue t oot h Micro s o ft Bluetoot h £numerator
Use the drop-down menus to select the answer choice that completes each statement based on the information presented in output:
Which installation option should you use for each computer? To answer, select the appropriate options in the answer area.
Computer! :
Custom
Upgrade
Which installation option should you use for each computer? To answer, select the appropriate options in the answer area.
Computer!:
Custom
Upgrade
Computer2:
Custom
Upgrade _J
Computer3:
Custom
Upgrade
Your answer is incorrect.
Correct answer:
Computer!: T
Custom
I Upgrade
Computer2: T
Custom
Upgrade I
Computer3: T
Custom
Upgrade
Note: This question is part of a series of questions that use the same scenario. For your conven ience, the scenario is repeated in each question. Each question
presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series.
The network contains five servers configured as shown in the following table:
Test_Server has a shared folder named ShareA. Only local users have permissions to ShareA.
The network contains a mainframe computer that is administered by using the Telnet protocol.
- it1'C;'""'OOrnu 111 corrt'urrr.:rrc:,orc;-nrnL--c:ornpacc1 a c:;01111901 cu a.:> a110••• • 111 c11c.or1~ C l ' C T1 .
All of the client computers run the 64-bit version of Windows 10. User3 frequent ly accesses ShareA. Remote Desktop is enabled on Computer4.
0 A. Hyper-V Hypervisor
A. Hyper-V Hypervisor
Explanation:
References: https://technet.microsoft.com/en-us/itpro/windows/keep-secure/credential-guard
https://blogs. tech net.microsoft.com/ash/2016/03/02/windows-l 0-device-guard-and-credent ial-guard-demystified/
HOTSPOT
You have three computers configured as shown in the following table.
Which installation option should you use for each computer? To answer, select the appropriate options in the answer area.
Computer!:
Custom
NOTE: Each correct select ion is worth one point.
Computer!:
Custom
Upgrade
Computer2:
Custom
Upgrade _J
Computer3:
Custom
•
Upgrade
Computer!:
Custom
.
I
I Upgrade I
Computer2:
Custom
.
I Upgrade I
Compurer3: .
I Custom
Upgrade
Note: This question is part of a series of questions that use the same set of answer choices. Each answer choice may be used once, more than once, or not at
all.
You have a computer named Computerl that has storage configured as shown in the following table.
0 A. Add·Physica1Disk
Disks 100GB Pool3
0 A . Add-Physica1Disk
0 B. Diskpart
0 C. New-Virtua1Disk
0 D. Remove-Physical Disk
0 E. Resize-Virtua1Disk
0 F. Set-StoragePool
0 G. Subst
0 H. Update-Disk
What should you use?
A. Add-Physica1Disk
B. Diskpart
C. New-VirtualDisk
D. Remove-PhysicalDisk
E. Resi ze-Virtua1Disk
F. Set-StoragePool
G. Subst
H. Update-Disk
Explanation:
References: https://docs.microsoft.com/en-us/windows-server/storage/storage-spaces/resize-volumes
Note: This question is part of a series of questions that use the same scenario. For your convenience, the scenario is repeated in each question. Each question
presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series.
Your network contains a single Active Directory domain named adatum.com. The network contains five servers configured as shown in the following table.
Test_Server has a shared folder named ShareA. Only local users have permissions to ShareA.
The network contains a mainframe computer that is administered by using the Telnet protocol.
The domain contains four client computers configured as shown in the following table:
The domain contains four client computers configured as shown in the following table:
All of the client computers run the 64-bit version of Windows. User3 frequently accesses ShareA. Remote Desktop is enabled on Computer4.
• Configure User Account Control (UAC) on Computer3 to prompt administrators for credentials when elevated privileges are required.
• Ensure that Userl can view and interact w ith a desktop session of User3.
• Ensure that User2 can use Telnet to manage the mainframe.
• Ensure that User4 can use Remote Desktop to access Computer4 remotely.
You have a computer named Computerl that has storage configured as shown in the following table.
Disks fails.
Disks fails.
0 A . Add-PhysicalDisk
0 B. Diskpart
0 C. New-VirtualDisk
0 D. Remove-Physical Disk
0 E. Resize-VirtualDisk
0 F. Set-StoragePool
0 G. Subst
0 H. Update-Disk
You need to remove DiskB from Pool3.
A. Add-PhysicalDisk
B. Diskpart
C. New-VirtualDisk
D. Remove-Physica1Disk
E. Resize-VirtualDisk
F. Set-StoragePool
G. Subst
H. Update-Disk
References: https://technet. microsoft. com/en-us/library /dn782852(v=ws. 11). aspx#BKM K_Step6Rem oveO Id Disk