Configuring Windows Devices
Question No: 71 – (Topic 9)
You administer Windows 10 Enterprise client computers in your company network.
You change settings on a reference computer by using the Windows Firewall with Advanced Security tool. You want to apply the same settings to other computers.
You need to save the Windows Firewall with Advanced Security configuration settings from the reference computer. You also need to be able to import the configuration settings into a Group Policy object later.
What should you do?
Open Local Group Policy Editor, select the Windows Firewall with Advanced Security node, and then select the Export Policy action.
Run the netsh advfirewall export c:\settings.wfwcommand.
Run the netsh firewall export c:\settings.xmlcommand.
Run the netsh advfirewall export c:\settings.xmlcommand
Question No: 72 – (Topic 9)
You have a computer that runs Windows 10.
You need to ensure that the next time the computer restarts, the computer starts in safe mode.
What should you use?
the System Configuration utility
the Restore-Computer cmdlet
the Bcdboot command
System in Control Panel
Answer: A Explanation:
Question No: 73 – (Topic 9)
Note: This question is part of a series of questions that use the same or similar answer choices. An answer choice may be correct for more than one question in the series. Each question is independent of the other questions in this series. Information and details in a question apply only to that question.
You have a laptop that is joined to an Active Directory domain. You establish a Wi-Fi connection to a customer’s Wi-Fi network.
You need to identify whether the current network location of the Wi-Fi connection is private or public.
Which Control Panel application should you use?
Phone and Modem
RemoteApp and Desktop Connections
Network and Sharing Center
Question No: 74 DRAG DROP – (Topic 9)
You support desktop computers for a company named Fabrikam, Inc. The computers are members of the Active Directory domain named fabrikam.com. Fabrikam works with a supplier named Contoso, Ltd.
Each company has a public key infrastructure (PKI), and no public certificate authorities (CAs) are used. Fabrikam employees regularly use a Contoso website that is hosted on a server in the contoso.com domain.
The website requires SSL and mutual authentication.
You need to configure the computers to allow Fabrikam users to access the Contoso website without any warning prompts. You also need to use the fewest certificates possible.
Which certificate or certificates should you use?
Question No: 75 – (Topic 9)
Note: This question is part of a series of questions that use the same or similar answer choices. An answer choice may be correct for more than one question in the series. Each question is independent of the other questions in this series. Information and details provided in a question apply only to that question.
You have a computer that runs Windows 10 and is used by 10 users. The computer is joined to an Active Directory domain. Each user has an Active Directory account.
You need to ensure that all of the users can access the files located in one another’s libraries.
What should you configure?
Encrypting File System (EFS) settings
Software restriction policies
Application control policies
Question No: 76 – (Topic 9)
Your network contains an Active Directory domain. The domain contains 100 Windows 10 client computers. All of the computers secure all connections to computers on the internal network by using IPSec.
The network contains a server that runs a legacy application. The server does NOT support IPSec.
You need to ensure that some of the Windows 8 computers can connect to the legacy server. The solution must ensure that all other connections are secured by using IPSec.
What should you do?
Modify the settings of the Domain Profile.
Create a connection security rule.
Create an inbound firewall rule.
Modify the settings of the Private Profile,
Answer: A Explanation:
A firewall profile is a way of grouping settings, such as firewall rules and connection security rules, which are applied to the computer depending on where the computer is connected. On computers running this version of Windows, there are three profiles for Windows Firewall with Advanced Security: Domain, Private, and Public.
The Domain profile is applied to a network adapter when it is connected to a network on which it can detect a domain controller of the domain to which the computer is joined.
Question No: 77 – (Topic 9)
You are a systems administrator for your company. The company has employees who work remotely by using a virtual private network (VPN) connection from their computers, which run Windows 8 Pro.
These employees use an application to access the company intranet database servers. The company recently decided to distribute the latest version of the application through using a public cloud.
Some users report that every time they try to download the application by using Internet Explorer, they receive a warning message that indicates the application could harm their computer.
You need to recommend a solution that prevents this warning message from appearing, without compromising the security protection of the computers. What should you do?
Publish the application through a public file transfer protocol (FTP) site.
Publish the application through an intranet web site.
Instruct employees to disable the SmartScreen Filter from within the Internet Explorer settings.
Publish the application to Windows Store.
Answer: B Explanation:
As the publication is to be published on the cloud, we should publish in through the Windows Store.
Question No: 78 DRAG DROP – (Topic 9)
You have a computer that runs Windows 10. You need to meet the following requirements:
鈥sers must use complex passwords.
鈥sers must change their password every 180 days.
鈥sers must be prompted to change their password seven days before the password expires.
Which policy setting should you configure for each requirement? To answer, drag the appropriate policy settings to the correct requirements. Each policy setting may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
Question No: 79 – (Topic 9)
All client computers in a company’s network environment run Windows 10 Enterprise. A client computer has drives that are configured as shown in the following table.
You are choosing a backup destination for drive C. You have the following requirements:
鈥nsure that the backup file is available if drive C: fails.
鈥nsure that the backup file can be accessed by other computers on the network.
鈥upport the storage of multiple versions of system image backups. You need to select a backup destination that meets the requirements.
Which destination should you select?
Question No: 80 – (Topic 9)
You support Windows 10 Enterprise computers in a workgroup.
You have configured a local AppLocker policy to prevent users from running versions of app.exe previous to v9.4. Users are still able to run app.exe.
You need to block users from running app.exe by using the minimum administrative effort. What should you do?
Change the Application Identity service startup mode to automatic and start the service.
Configure enforcement for Windows Installed rules.
Configure a Software Restriction Policy publisher rule.
Run the GPupdate /force command in an relevant command prompt.
Answer: A Explanation:
https://technet.microsoft.com/en-us/library/ee791779(v=ws.10).aspx https://technet.microsoft.com/en-us/itpro/windows/keep-secure/configure-the-application- identity-service
|Lowest Price Guarantee||Yes||No||No|
|Free VCE Simulator||Yes||No||No|