Weekend Special - 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: av54zq84

Exact2Pass Menu

Question # 4

You have a computer named Computer1 that runs Windows 10.

On Computer1, you turn on File History.

You need to protect a folder named D:\Folder1 by using File History.

What should you do?

A.

From File Explorer, modify the General settings of D:\Folder1

B.

From File Settings app, configure the Backup settings

C.

From the Settings app, configure the Recovery settings

D.

From File History in Control Panel, configure the Select drive settings

Full Access
Question # 5

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

Your network contains an Active Directory domain. The domain contains a computer named Computer1 that runs Windows 8.1.

Computer1 has apps that are compatible with Windows 10.

You need to perform a Windows 10 in-place upgrade on Computer1.

Solution: You add Windows 10 startup and install images to a Windows Deployment Services (WDS) server. You start Computer1 by using WDS and PXE, and then you initiate the Windows 10 installation.

Does this meet the goal?

A.

Yes

B.

No

Full Access
Question # 6

You have a workgroup computer named Computer1 that runs Windows 10.

You need to configure Windows Hello for sign-in to Computer1 by using a physical security key.

What should you use?

A.

a USB 3.0 device that supports BitLocker Drive Encryption (BitLocker)

B.

a USB device that supports FIDO2

C.

a USB 3.0 device that has a certificate from a trusted certification authority (CA)

D.

a USB device that supports RSA SecurID

Full Access
Question # 7

Your network contains an Active Directory domain. The domain contains 1,000 computers that run Windows 10.

You configure Microsoft Edge settings by using domain and local Group Policy Objects (GPOs).

You need to generate a report that contains all the Microsoft Edge policy settings applied to a computer.

What should you do?

A.

From PowerShell. run the Gec-GPO cmdlet.

B.

From PowerShell. run the Gec-GPOReporc cmdlet.

C.

From Microsoft Edge, open edge://policy.

D.

From the Start menu, select Group Policy Object Editor

Full Access
Question # 8

You need to meet the technical requirement for User6.

What should you do?

A.

Add User6 to the Remote Desktop Users group in the domain.

B.

Remove User6 from Group2 in the domain.

C.

Add User6 to the Remote Desktop Users group on Computer2.

D.

And User6 to the Administrators group on Computer2.

Full Access
Question # 9

You have a file named Reg1.reg that contains the following content.

What is the effect of importing the file?

A.

A key named command will be renamed as notepad.exe.

B.

In a key named Notepad, the command value will be set to @="notepad.exe".

C.

In a key named command, the default value will be set to notepad.exe.

Full Access
Question # 10

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

A user named User2 has a computer named Computer2 that runs Windows 10. User2 joins Computer2 to contoso.com by using user2@contoso.com.

Computer1 contains a folder named Folder1. Folder1 is in drive C and is shared as Share1. Share1 has the permission shown in the following table.

A user named User2 has a computer named Computer2 that runs Windows 10. User2 joins Computer2 to contoso.com by using user2@contoso.com.

User2 attempts to access Share1 and receives the following error message: “The username or password is incorrect.”

You need to ensure that User2 can connect to Share1.

Solution: You create a local user account on Computer1 and instruct User2 to use the local account to connect to Share1.

Does this meet the goal?

A.

Yes

B.

No

Full Access
Question # 11

Your network contains an Active Directory domain. The domain contains 100 computers that run Windows 10.

You need to create a Start menu layout file. The solution must meet the following requirements:

  • Contain an app group named Contoso Apps that has several pinned items. Contoso Apps must be locked from user modification.
  • Ensure that users can customize other parts of the Start screen.
  • Minimize administrative effort.

Which four actions should you perform in sequence? To answer, move the appropriate commands from the list of commands to the answer area and arrange them in the correct order.

Full Access
Question # 12

You need to configure Delivery Optimization to meet the technical requirements.

Which download mode should you use?

A.

Simple (99)

B.

Group (2)

C.

Internet (3)

D.

HTTP Only (0)

E.

Bypass (100)

Full Access
Question # 13

Which users can sign in to Computer2 by using Remote Desktop?

A.

Admin1 only

B.

User 1 only

C.

Admin1 and User2 only

D.

Admin1, User1, User2, and User3

E.

User2 only

Full Access
Question # 14

You implement the planned changes for Computer1.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Full Access
Question # 15

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Full Access
Question # 16

You need to recommend a solution to monitor update deployments.

What should you include in the recommendation?

A.

Windows Server Update (WSUS)

B.

the Update Management solution in Azure Automation

C.

the Update Compliance solution in Azure Log Analytics

D.

the Azure Security Center

Full Access
Question # 17

An employee reports that she must perform a BitLocker recovery on her laptop. The employee does not have her BitLocker recovery key but does have a Windows 10 desktop computer.

What should you instruct the employee to do from the desktop computer?

A.

Run the manage-bde.exe –status command

B.

From BitLocker Recovery Password Viewer, view the computer object of the laptop

C.

Go to https://account.activedirectory.windowsazure.com and view the user account profile

D.

Run the Enable-BitLockerAutoUnlock cmdlet

Full Access
Question # 18

You need to take remote control of an employee’s computer to troubleshoot an issue.

What should you send to the employee to initiate a remote session?

A.

a numeric security code

B.

a connection file

C.

an Easy Connect request

D.

a password

Full Access
Question # 19

You need to ensure that User10 can activate Computer10.

What should you do?

A.

Request that a Windows 10 Enterprise license be assigned to User10, and then activate Computer10.

B.

From the Microsoft Deployment Toolkit (MDT), add a Volume License Key to a task sequence, and then

redeploy Computer10.

C.

From System Properties on Computer10, enter a Volume License Key, and then activate Computer10.

D.

Request that User10 perform a local AutoPilot Reset on Computer10, and then activate Computer10.

Full Access
Question # 20

You need to reduce the amount of time it takes to restart Application1 when the application crashes.

What should you include in the solution? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 21

You need to recommend a solution to configure the employee VPN connections.

What should you include in the recommendation?

A.

Remote Access Management Console

B.

Group Policy Management Console (GPMC)

C.

Connection Manager Administration Kit (CMAK)

D.

Microsoft Intune

Full Access
Question # 22

You need to sign in as LocalAdmin on Computer11.

What should you do first?

A.

From the LAPS UI tool, view the administrator account password for the computer object of Computer11.

B.

From Local Security Policy, edit the policy password settings on Computer11.

C.

From the LAPS UI tool, reset the administrator account password for the computer object of Computer11.

D.

From Microsoft Intune, edit the policy password settings on Computer11.

Full Access
Question # 23

You need to implement a solution to configure the contractors’ computers.

What should you do? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 24

You need to meet the technical requirements for the helpdesk users.

What should you do? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 25

You need to meet the technical requirements for the San Diego office computers. Which Windows 10 deployment method should you use?

A.

wipe and load refresh

B.

Windows Autopilot

C.

provisioning Packages

D.

in-place upgrade

Full Access
Question # 26

You need to meet the technical requirement for Computer1.

What should you do? To answer, select the appropriate options in the answer area.

Full Access
Question # 27

You need to meet the technical requirements for the HR department users.

Which permissions should you assign to the HR department users for the D:\Reports folder? To answer, select the appropriate permissions in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 28

You need to meet the technical requirement for the IT department users.

What should you do first?

A.

Issue computer certificates

B.

Distribute USB keys to the IT department users.

C.

Enable screen saver and configure a timeout.

D.

Turn on Bluetooth.

Full Access
Question # 29

You have 10 computers that run Windows 10 and have BitLocker Drive Encryption (BitLocker) enabled.

You plan to update the firmware of the computers.

You need to ensure that you are not prompted for the BitLocker recovery key on the next restart. The drive must be protected by BitLocker on subsequent restarts.

Which cmdlet should you run?

A.

Unlock-BitLocker

B.

Disable-BitLocker

C.

Add-BitLockerKeyProtector

D.

Suspend-BitLocker

Full Access
Question # 30

Your network contains an Active Directory domain. The domain contains a computer named Computer1 that runs Windows 10.

You need to ensure that Computer1 will respond to ping requests.

How should you configure Windows Defender Firewall on Computer1? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 31

You sign in to a computer that runs Windows 10 Pro.

You need to ensure that after a restart, the computer starts automatically in Safe Mode with Networking.

What should you use to configure the restart options?

A.

bootcfg

B.

BCDEdit

C.

Windows System Image Manager (Windows SIM)

D.

bootrec

Full Access
Question # 32

You have a workgroup computer named Computer1 that runs Windows 10. Computer1 has the user accounts shown in the following table.

User3, User4, and Administrator sign in and sign out on Computer1. User1 and User2 have never signed in to Computer1.

You are troubleshooting policy issues on Computer1. You sign in to Computer1 as Administrator.

You add the Resultant Set of Policy (RsoP) snap-in to an MMC console.

Which users will be able to sign in on Computer1?

A.

User1, User3, and User4 only

B.

Administrator only

C.

Use1, User2, User3, User4, and Administrator

D.

User3, User4, and Administrator only

Full Access