Q1. You support Windows 10 Enterprise computers.
Your company has started testing Application Virtualization (App-V) applications on several laptops. You discover that the App-V applications are available to users even when the laptops are offline.
You need to ensure that the App-V applications are available to users only when they are connected to the company network.
What should you do?
A. Change user permissions to the App-V applications.
B. Disable the Disconnected operation mode.
C. Configure mandatory profiles for laptop users.
D. Reset the App-V client FileSystem cache.
Answer: B
Q2. You have a computer named Computer1 that runs Windows 10 Enterprise.
You need to identify the locations that you can select as a File History drive.
What are two possible locations? Each correct answer presents a complete solution?
A. the operating system volume
B. an unformatted partition
C. a non-system volume
D. a network share
Answer: C,D
Q3. You manage Microsoft Intune for a company named Contoso. Intune client computers run Windows 10 Enterprise.
You notice that there are 25 mandatory updates listed in the Intune administration console.
You need to prevent users from receiving prompts to restart Windows following the installation of mandatory updates.
Which policy template should you use?
A. Microsoft Intune Agent Settings
B. Windows Configuration Policy
C. Microsoft Intune Center Settings
D. Windows Custom Policy (Windows 10 and Windows 10 Mobile)
Answer: A
Q4. HOTSPOT
You are setting up a Windows 10 Enterprise computer.
The computer’s network connections are shown in the Network connections exhibit. (Click the Exhibit button.)
The computer’s network settings are shown in the Network Settings exhibit. (Click the Exhibit button.)
Advanced TCP/IP settings are shown in the Advanced TCP/IP Settings exhibit. (Click the Exhibit button.)
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Answer:
Q5. You have a computer named Computer1 that runs Windows 10 Enterprise. Computer1 is a member of an Active Directory domain named contoso.com.
You have a line-of-business universal app named App1. App1 is developed internally.
You need to ensure that you can run App1 on Computer1. The solution must meet the following requirements:
. Minimize costs to deploy the app.
. Minimize the attack surface on Computer1.
What should you do?
A. Have App1 certified by the Windows Store.
B. Sign App1 with a certificate issued by a third-party certificate authority.
C. From the Update & Security setting on Computer1, enable the Sideload apps setting.
D. Run the Add-AppxProvisionedPackage cmdlet.
Answer: C
Q6. DRAG DROP
You plan to deploy a Microsoft Azure RemoteApp collection by using a custom template image. The image will contain Microsoft Word and Excel Office 365 ProPlus programs.
You need to install the Word and Excel programs. The solution must minimize the amount of Internet traffic used during installation.
Which four actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Answer:
Q7. You have a Windows 10 Enterprise computer.
The computer has a shared folder named C:\Marketing. The shared folder is on an NTFS volume.
The current NTFS and share permissions are configured as follows.
UserA is a member of both the Everyone group and the Marketing group. UserA must access C:\Marketing from across the network. You need to identify the effective permissions of UserA to the C:\Marketing folder.
What permission should you identify?
A. Full Control
B. Read and Execute
C. Read
D. Modify
Answer: D
Q8. A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 10 Enterprise. Some computers have a Trusted Platform Module (TPM) chip.
You need to configure a single Group Policy object (GPO) that will allow Windows BitLocker Drive Encryption on all client computers.
Which two actions should you perform? Each correct answer presents part of the solution.
A. Enable the Require additional authentication at startup policy setting.
B. Enable the Enforce drive encryption type on operating system drives policy setting.
C. Enable the option to allow BitLocker without a compatible TPM.
D. Configure the TPM validation profile to enable Platform Configuration Register indices (PCRs) 0, 2, 4, and 11.
Answer: A,C
Q9. HOTSPOT
You have an image of Windows 10 Enterprise named Image1. Image1 has version number
1.0.0.0 of a custom, line-of-business universal app named App1.
You deploy Image1 to Computer1 for a user named User1.
You need to update App1 to version 1.0.0.1 on Computer1 for User1 only.
What command should you run? To answer, select the appropriate options in the answer area.
Answer:
Q10. You use a Windows 8.1 tablet. The tablet receives Windows Update updates automatically from the Internet.
The tablet has Wi-Fi and is connected to a 3G mobile broadband Wi-Fi hot spot.
You need to minimize data usage while connected to this hot spot.
What should you do?
A. Turn on Airplane Mode.
B. Disable File and Print Sharing for mobile broadband connections.
C. Configure the interface metric of IP settings for Wi-Fi connection as 1.
D. Edit the Inbound Rule of Windows Firewall, and then disable Internet Control Message Protocol (ICMP) traffic.
E. Configure the broadband connection as a metered network.
Answer: E
Q11. You administer a Windows 10 Enterprise computer. The computer has File History turned on, and system protection turned on for drive C.
You accidentally delete a folder named Libraries\Customers by using the Shift+Delete keyboard shortcut.
You need to restore the most recent version of the folder to its original location.
Which approach should you use to restore the folder?
A. Recycle Bin
B. the latest restore point
C. File History
D. a manually selected restore point
Answer: C
Q12. A company has Windows 10 Enterprise client computers. The client computers are connected to a corporate private network. Users are currently unable to connect from their home computers to their work computers by using Remote Desktop.
You need to ensure that users can remotely connect to their office computers by using Remote Desktop. Users must not be able to access any other corporate network resource by using the local Windows installation from their home computers.
Which setting should you configure on the home computers?
A. Virtual Private Network connection
B. Remote Desktop local resources
C. DirectAccess connection
D. Remote Desktop Gateway IP address
Answer: D
Q13. Employees are permitted to bring personally owned portable Windows 10 Enterprise computers to the office. They are permitted to install corporate applications by using the management infrastructure agent and access corporate email by using the Mail app.
An employee’s personally owned portable computer is stolen.
You need to protect the corporate applications and email messages on the computer.
Which two actions should you perform? Each correct answer presents part of the solution.
A. Prevent the computer from connecting to the corporate wireless network.
B. Change the user’s password.
C. Disconnect the computer from the management infrastructure.
D. Initiate a remote wipe.
Answer: B,D
Q14. You have a Windows 10 Enterprise computer named Computer1. Computer1 has File History enabled.
You create a folder named Folder1 in the root of the C: drive.
You need to ensure that Folder1 is protected by File History.
What are two possible ways to achieve the goal? Each correct answer presents a complete solution.
A. From File Explorer, include Folder1 in an existing library.
B. Modify the Advanced settings from the File History Control Panel item.
C. From the Settings app, modify the Backup options.
D. From File Explorer, modify the system attribute of Folder1.
Answer: A,C
Q15. You manage a network that includes Windows 10 Enterprise computers. All of the computers on the network are members of an Active Directory domain.
The company recently proposed a new security policy that prevents users from synchronizing applications settings, browsing history, favorites, and passwords from the computers with their Microsoft accounts.
You need to enforce these security policy requirements on the computers.
What should you do?
A. On the Group Policy Object, configure the Accounts: Block Microsoft accounts Group Policy setting to Users can’t add Microsoft accounts.
B. On the Group Policy Object, configure the Accounts: Block Microsoft accounts Group Policy setting to Users can’t add or log on with Microsoft accounts.
C. From each computer, navigate to Change Sync Settings and set the Sync Your Settings options for Apps, Browser, and Passwords to Off.
D. From each computer, navigate to Change Sync Settings and set the Sync Your Setting s option to Off.
Answer: B