You have a computer named Computer5 that runs Windows 10 that is used to share documents in a workgroup
HOTSPOT You have a computer named Computer5 that runs Windows 10 that is used to share documents in a workgroup. You create three users named User-a, User-b, User-c. The users plan to access Computer5 from the network only. You have a folder named Data. The Advanced Security Settings for the...
What are two possible ways to achieve this goal?
Your company uses Microsoft Deployment Toolkit (MDT) to deploy Windows 10 to new computers. The company purchases 1,000 new computers. You need to ensure that the Hyper-V feature is enabled on the computers during the deployment. What are two possible ways to achieve this goal? Each correct answer presents a...
Which Windows 10 deployment method should you use?
Testlet 2 Case Study This is a case study. Case studies are not timed separately. You can use as much exam times as you would like to complete each case. However, there may be additional studies and sections on this exam. You must manage your time to ensure that you...
What is the effect of the configuration?
HOTSPOT You deploy Windows 10 to a new computer named Computer1. You sign in to Computer1 and create a user named User1. You create a file named LayoutModification.xml in the C:UsersDefaultAppDataLocalMicrosoftWindows Shellfolder. LayoutModification.xml contains the following markup. What is the effect of the configuration? To answer, select the appropriate options...
Which Windows Defender firewall rule is a possible cause of the issue?
You are a network administrator at your company. The company uses an application that checks for network connectivity to a server by sending a ping request to the IPv6 address of the server. If the server replies, the application loads. A user cannot open the application. You manually send the...
What should you do?
You need to meet the technical requirements for EFS on Computer A. What should you do? A. Run certutil.exe, and then add a certificate to the local computer certificate store. B. Run cipher.exe, and then add a certificate to the local computer certificate store. C. Run cipher.exe, and then add...
When accessing Share1, which two actions can be performed by User1 but not by User2?
Your network contains an Active Directory domain named contoso.com. The domain contains named Computer1 that runs Windows 10. On Computer1, you create an NTFS folder and assign Full control permissions to Everyone. You share the folder as Share1 and assign the permissions shown in the following table. When accessing Share1,...
You have a computer that runs Windows 10. The computer contains a folder named C:ISOs that is shared in ISOs
HOTSPOT You have a computer that runs Windows 10. The computer contains a folder named C:ISOs that is shared in ISOs. You run several commands on the computer as shown in the following exhibit. Use the drop-down menus to select the answer choice that completes each statement based on the...
What should you instruct the employee to do from the desktop computer?
An employee reports that she must perform a BitLocker recovery on her laptop. The employee does not have her BitLocker recovery key but does have a Windows 10 desktop computer. What should you instruct the employee to do from the desktop computer?A . Run the manage-bde.exe Cstatus commandB . From...
What should you use?
You have a computer named Computer1 that runs Windows 10. You need to prevent standard users from changing the wireless network settings on Computer1. The solution must allow administrators to modify the wireless network settings. What should you use?A . Windows Configuration DesignerB . MSConfigC . Local Group Policy EditorD...