Q1. Note: This question is part of a series of questions that use the same scenario. For your
convenience, the scenario is repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario exactly the same in each question in this series.
Your network contains a single Active Directory domain named contoso.com. All computers are members of the domain and run the 64-bit version of Windows 10 Enterprise. On a test computer named Computer_Test1, you pin several company-specific applications in a group named Contoso Apps, and then you export the start menu layout to a file named contoso.xml. You install Client Hyper-V on a computer named Computer6.
You identity the following requirements:
Which hardware component is required for Computer1?
A. Trusted Platform Module (TPM)
B. Trusted Boot
C. Second Level Address Translation (SLAT)
D. Secure Boot
Answer: C
Explanation:
https://www.microsoft.com/en-us/windows/windows-10-specifications
Q2. Note: This question is part of a series of questions that use the same scenario. For your convenience, the scenario is repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series.
Your network contains a single Active Directory domain named contoso.com. All computers are members of the domain and run the 64-bit version of Windows 10 Enterprise.
On a test computer named Computer_Test1, you pin several company-specific applications in a group named Contoso Apps, and then you export the Start menu layout to a file named Contoso.xml.
You install Client Hyper-V on a computer named Computer6. You identify the following requirements:
You need to meet the requirement of User1.
Which Ease of Access setting should you configure?
A. Toggle Keys
B. Sticky Keys
C. Filter Keys
D. Mouse Keys
Answer: B
Explanation:
http://www.pcmech.com/article/how-to-manage-ease-of-access-features-in-windows-10/
Q3. You have a Key Management Service (KMS) host and an administrative workstation named Computer1.
From Computer1, you need to validate the activation status on a computer named Computer2.
What should you run?
A. Get-RDLicenseConfiguration computer2
B. slmgr.vbs computcr2 /dlv
C. winrs.exe -r:Computer2 netdom.exe
D. ospp.vbs /tokact:computer2
Answer: B
Explanation:
http://www.howtogeek.com/245445/how-to-use-slmgr-to-change-remove-or-extend-your- windows-license/
Q4. In this section, you will see one or more sets of questions with the same scenario and problem. Each question presents a unique solution to the problem, and you must determine whether the solution meets the stated goals. Any of the solutions might solve the problem. It is also possible that none of the solutions solve the problem.
Once you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution. Determine whether the solution meets the stated goals.
You have a computer named Computer1 that runs Windows 10. File History is turned on.
The user of Computer1 reports that previous versions of D:\Folder\File1.doc are unavailable from the Previous Versions tab.
You need to ensure that the previous versions of the file are created.
Solution: Create a backup of drive D by using Backup and Restore (Windows 7). Does this meet the goal?
A. Yes
B. No
Answer: A
Explanation:
http://www.howtogeek.com/209080/how-to-restore-previous-versions-of-a-file-on-any- operating-system/
Q5. HOTSPOT
Your network contains a single Active Directory domain named contoso.com. In contoso.com, you create an organizational unit (OU) named OU1.
You need to use a provisioning package to perform the following:
How should you configure the provisioning package? To answer, select the appropriate options in the answer area.
Answer:
Explanation:
*Box 1*
OU=OU1, DC=contoso, DC=com
*Box 2* Station%RAND:3%
https://technet.microsoft.com/en-us/itpro/windows/deploy/provision-pcs-for-initial- deployment
Q6. You purchase licenses for several apps from the Windows Store and you list the apps in your Windows Store for Business.
You need to tell users how to install the apps. What should you instruct the users to use?
A. the Windows Store app and a Microsoft account
B. a web browser and a Microsoft Azure Active Directory (Azure AD) account
C. the Windows Store app and a Microsoft Azure Active Directory (Azure AD) account
D. a web browser and a Microsoft account
Answer: C
Explanation:
https://technet.microsoft.com/en-us/itpro/windows/manage/distribute-apps-from-your- private-store
Q7. Note: This question is part of a series of questions that use the same scenario. For your convenience, the scenario is repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series.
Your network contains a single Active Directory domain named adatum.com. The network contains five servers configured as shown in the following table:
All of the servers run Windows Server 2012 R2.
Test_Server has a shared folder named ShareA. Only local users have permissions to ShareA.
The network contains a mainframe computer that is administered by using the Telnet protocol.
The domain contains four client computers configured as shown in the following table:
All of the client computers run the 64-bit version of Windows. User3 frequently accesses ShareA. Remote Desktop is enabled on Computer4.
Your company identifies the following requirements:
On Test_Server, you reset the password for User3. You need to ensure that User3 can access ShareA.
Which tool should you instruct User3 to use on Computer3?
A. the Get-Credential cmdlet
B. Credential Manager
C. Authorization Manager
D. Active Directory Users and Computers
Answer: B
Explanation:
http://www.digitalcitizen.life/credential-manager-where-windows-stores-passwords-other- login-details
Q8. You have computers that run Windows 10.
You need to identify both active malware instances and past malware instances from the last three months.
Which command should you run?
A. Get-EventSubscriber
B. Get-MpThreatCatalog
C. Get-WindowsErrorReporting
D. Get-MpThreatDetection
Answer: D
Explanation:
https://technet.microsoft.com/en-us/library/dn433290.aspx
Q9. HOTSPOT
You have a computer named Computer1 that has a shared folder named Share1. Share1 has the permissions configured as shown in the following table:
You need to ensure that User1 can change files in Share1. User1 must be prevented from deleting files created by other users.
How should you configure the permissions? To answer, select the appropriate options In the answer area.
Answer:
Explanation:
Box1: NTFS
Box2: Modify
Q10. HOTSPOT
You configure a Group Policy on a computer that runs Windows 10 Enterprise as shown in the following graphic:
Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.
Answer:
Explanation:
*Box 1*
must always use a PIN
*Box 2*
Trusted Platform Module (TPM) chip https://redmondmag.com/articles/2021/05/01/active-directory.aspx