Which certificate or certificates should you use?
DRAG DROP You support desktop computers for a company named Fabrikam, Inc. The computers are members of the Active Directory domain named fabrikam.com. Fabrikam works with a supplier named Contoso, Ltd. Each company has a public key infrastructure (PKI), and no public certificate authorities (CAs) are used. Fabrikam employees regularly...
What should you do?
You are a systems administrator for your company. The company has employees who work remotely by using a virtual private network (VPN) connection from their computers, which run Windows 8 Pro. These employees use an application to access the company intranet database servers. The company recently decided to distribute the...
What should you do?
A company has Windows 10 Enterprise computers in an Active Directory Domain Services (AD DS) domain. A computer named COMPUTER1 has a shared printer named PRINTER1 installed and has Remote Desktop enabled. A user named Intern is a member of a security group named Sales. The Sales group is a...
What command should you run on Computer1?
DRAG DROP You have a line-of-business universal app named App1. You have an image of Windows 10 Enterprise named Image1. Image1 is mounted to the C:Folder1 folder on a Windows 10 Enterprise computer named Computer1. The source for App1 is in the C:Folder2 folder. You need to ensure that App1...
What should you do?
You manage a network that includes Windows 10 Enterprise computers. All of the computers on the network are members of an Active Directory domain. The company recently proposed a new security policy that prevents users from synchronizing applications settings, browsing history, favorites, and passwords from the computers with their Microsoft...
Which actions should you perform on each computer?
Topic 7, Manage remote access DRAG DROP You have a desktop computer and a tablet that both run Windows 10 Enterprise. The desktop computer is located at your workplace and is a member of an Active Directory domain. The network contains an Application Virtualization (App-V) infrastructure. Several App-V applications are...
What should you do?
You support Windows 10 Enterprise computers that are members of an Active Directory domain. Recently, several domain user accounts have been configured with super-mandatory user profiles. A user reports that she has lost all of her personal data after a computer restart. You need to configure the user’s computer to...
Which two actions should you perform?
You support Windows 10 Enterprise laptops. Microsoft BitLocker Administration and Monitoring (MBAM) is deployed on your network on a server named SERVER1. Company policy requires that laptops with MBAM client installed prompt users to enable BitLocker within 2 hours of being started. You need to make changes to the Configure...
In which order should you perform the actions?
DRAG DROP You administer computers that run Windows 10 Enterprise. The computers on your network are produced by various manufacturers and often require custom drivers. You need to design a recovery solution that allows the repair of any of the computers by using a Windows Recovery Environment (WinRE). In which...
Which three actions should you perform in sequence?
DRAG DROP Your network contains an Active Directory domain and 100 Windows 10 Enterprise client computers. All software is deployed by using Microsoft Application Virtualization (App-V) 5.0. Users are NOT configured as local administrators. Your company purchases a subscription to Microsoft Office 365 that includes Office 365 ProPlus. You need...