Which three actions should you perform in sequence?

DRAG DROP You work for a small company that uses Windows 10 computers. The computers are joined to a homegroup. You want to share an existing folder named Research. It is located in the Documents folder. You need to give users the ability to change the files in this folder....

September 8, 2018 No Comments READ MORE +

Which term is used to refer to installing apps directly to a device without going through the Windows Store?

Which term is used to refer to installing apps directly to a device without going through the Windows Store?A . SQL InjectionB . BranchCacheC . DLL HijackD . SideloadingView AnswerAnswer: D Explanation: When you side load an app, you deploy a signed app package to a device. You maintain the...

September 4, 2018 No Comments READ MORE +

You have a standalone computer that runs Windows 10 Enterprise. The computer is configured to automatically back up files by using File History. The user of the computer uses the OneDrive desktop app to sync files

HOTSPOT You have a standalone computer that runs Windows 10 Enterprise. The computer is configured to automatically back up files by using File History. The user of the computer uses the OneDrive desktop app to sync files. The Previous Versions settings from the local group policy of the computer are...

September 4, 2018 No Comments READ MORE +

Which certificate or certificates should you use?

DRAG DROP You support desktop computers for a company named Fabrikam, Inc. The computers are members of the Active Directory domain named fabrikam.com. Fabrikam works with a supplier named Contoso, Ltd. Each company has a public key infrastructure (PKI), and no public certificate authorities (CAs) are used. Fabrikam employees regularly...

September 4, 2018 No Comments READ MORE +

What should you do?

Your network contains an Active Directory domain. The domain contains 100 Windows 10 client computers. All of the computers secure all connections to computers on the internal network by using IPSec. The network contains a server that runs a legacy application. The server does NOT support IPSec. You need to...

September 3, 2018 No Comments READ MORE +

What should you identify?

HOTSPOT You manage a Microsoft Azure RemoteApp deployment. The deployment consists of a cloud collection named CloudCollection1 and a hybrid collection named HybridCollection1. Both collections reside in a subscription named Subscription1. Subscription1 contains two Active Directory instances named AzureAD1 and AzureAD2. AzureAD1 is the associated directory of Subcsription1. AzureAD1 is...

September 2, 2018 No Comments READ MORE +

What should you configure?

Note: This question is part of a series of questions that use the same or similar answer choices. An answer choice may be correct for more than one question in the series. Each question is independent of the other questions in this series. Information and details provided in a question...

September 2, 2018 No Comments READ MORE +

What should you do?

You are a systems administrator of a small branch office. Computers in the office are joined to a Windows 10 HomeGroup. The HomeGroup includes one shared printer and several shared folders. You join a new computer to the HomeGroup and try to access the HomeGroup shared folders. You discover that...

September 1, 2018 No Comments READ MORE +

What should you do?

You have a Microsoft Intune subscription. You need to uninstall the Intune agent from a computer. What should you do?A . From the Groups node in the Microsoft Intune administration portal, click Delete.B . From the computer, run the provisioningutil.exe command.C . From the computer, run the cltui.exe command.D ....

September 1, 2018 No Comments READ MORE +

You administer Windows 10 Enterprise computers in your company network. All computers include Windows 10 Enterprise compatible Trusted Platform Module (TPM)

HOTSPOT You administer Windows 10 Enterprise computers in your company network. All computers include Windows 10 Enterprise compatible Trusted Platform Module (TPM). You configure a computer that will run a credit card processing application. You need to ensure that the computer requires a user to enter a PIN code when...

August 31, 2018 No Comments READ MORE +