option
Questions
ayuda
daypo
search.php

Simulado 61-90

COMMENTS STATISTICS RECORDS
TAKE THE TEST
Title of test:
Simulado 61-90

Description:
Simulado 61-90

Creation Date: 2021/06/02

Category: Others

Number of questions: 30

Rating:(1)
Share the Test:
Nuevo ComentarioNuevo Comentario
New Comment
NO RECORDS
Content:

You have a workgroup computer named Computer1 that runs Windows 10. Computer1 has the users accounts shown in the following table: --------------------------------------------------- Name .| Member of --------------------------------------------------- User1 .| Administrators --------------------------------------------------- User2 .| Users, Administrators --------------------------------------------------- User3 .| Users --------------------------------------------------- Computer1 has the local Group Policy shown in the following table. ----------------------------------------- Setting .| Value ----------------------------------------- Startup script .| ScriptA1 ----------------------------------------- Shutdown script .| ScriptA2 ----------------------------------------- Logon script .| ScriptA3 ----------------------------------------- Logoff script .| ScriptA4 ----------------------------------------- You create the Local Computer\Administrators policy shown in the following table. ------------------------------------- Setting .| Value ------------------------------------- Logon script .| ScriptB 1 ------------------------------------- Logoff script .| ScriptB2 ------------------------------------- You create the Local Computer\Non-Administrators policy shown in the following table. ------------------------------------- Setting .| Value ------------------------------------- Logon script .| ScriptC1 ------------------------------------- Logoff script .| ScriptC2 ------------------------------------- For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point. If User1 shuts down Computer1, script ScriptA2 will run. If User2 signs in to Computer1, scripts ScriptA3, ScriptB1, and ScriptC1 will run. If User3 signs out of Computer1, scripts ScriptC2 and ScriptA4 will run.

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. A user named User1 has a computer named Computer1 that runs Windows 10. Computer1 is joined to an Azure Active Directory (Azure AD) tenant named contoso.com. User1 joins Computer1 to contoso.com by using user1@contoso.com. Computer1 contains a folder named Folder1. Folder1 is in drive C and is shared as Share1. Share1 has the permission shown in the following table. ---------------------------------------------------------------------- Group .| Share permission ---------------------------------------------------------------------- Everyone Full .| control ---------------------------------------------------------------------- AzureAD\user1@contoso.com .| Owner ---------------------------------------------------------------------- A user named User2 has a computer named Computer2 that runs Windows 10. User2 joins Computer2 to contoso.com by using user2@contoso.com. User2 attempts to access Share1 and receives the following error message: “The username or password is incorrect.” You need to ensure that User2 can connect to Share1. Solution: You create a local group on Computer1 and add the Guest account to the group. You grant the group Modify access to Share1. Does this meet the goal?. Yes. No.

Your network contains an Active Directory domain. The domain contains 1,000 computers that run Windows 10. You need to prevent the computers of the research department from appearing in Network in File Explorer. What should you do?. Configure DNS to use an external provider. Modify the %systemroot%\system32\drivers\etc\Networks file. Turn off network discovery. Disable the Network List Service.

You have two computers named Computer1 and Computer2 that run Windows 10. The computers are in a workgroup. You perform the following configurations on Computer1: Create a user named User1. Add User1 to the Remote Desktop Users group. You perform the following configurations on Computer2: Create a user named User1 and specify the same user password as the one set on Computer1. Create a share named Share2 and grant User1 Full control access to Share2. Enable Remote Desktop. What are the effects of the configurations? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. Access Share2 without a prompt. Be prompted for credentials. Be denied access to Share2. ***********************. Sign in to Remote Desktop without a prompt. Be prompted for credentials and be able to sign in as User1. Be propmpted for credentials and be prevented from signing in as User1.

Your network contains an Active Directory domain. The domain contains a group named Group1. All the computers in the domain run Windows 10. Each computer contains a folder named C:\Documents that has the default NTFS permissions set. You add a folder named C:\Documents\Templates to each computer. You need to configure the NTFS permissions to meet the following requirements: All domain users must be able to open the files in the Templates folder. Only the members of Group1 must be allowed to edit the files in the Templates folder. How should you configure the NTFS settings on the Templates folder? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. Enable inheritance. Disable inheritance and remove permissions. Disable inheritance and copy explicit permissions. Allow Read&Execute. Deny Read&Execute. Allow Modify Deny Modify. Allow Read&Execute. Deny Read&Execute. Allow Modify. Deny Modify.

You deploy Windows 10 to 20 new laptops. The laptops will be used by users who work at customer sites. Each user will be assigned one laptop and one Android device. You need to recommend a solution to lock the laptop when the users leave their laptop for an extended period. Which two actions should you include in the recommendation? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point. Enable Bluetooth discovery. From the Settings app, configure the Dynamic lock settings. From Sign-in options, configure the Windows Hello settings. From the Settings app, configure the Lock screen settings. Pair the Android device and the laptop. From the Settings app, configure the Screen timeout settings.

You have a workgroup computer named Computer1 that runs Windows 10. Computer1 has the user accounts shown in the following table. ----------------------------------------------------------- Name .| Member of ----------------------------------------------------------- User1 .| Users ----------------------------------------------------------- User2 .| Guests ----------------------------------------------------------- User3 .| Users, Administrators ----------------------------------------------------------- User4 .| Users, Guests ----------------------------------------------------------- Administrator .| Administrators ----------------------------------------------------------- User3, User4, and Administrator sign in and sign out on Computer1. User1 and User2 have never signed in to Computer1. You are troubleshooting policy issues on Computer1. You sign in to Computer1 as Administrator. You add the Resultant Set of Policy (RsoP) snap-in to an MMC console. Which users will be able to sign in on Computer1?. User1, User3, and User4 only. Administrator only. User1, User2, User3, User4, and Administrator. User3, User4, and Administrator only.

You have a computer named Computer1 that runs Windows 10. Computer1 is in a workgroup. Computer1 contains the local users shown in the following table. ------------------------------------------------------------- Name .| Member of ------------------------------------------------------------- Administrator .| Administrators, Users ------------------------------------------------------------- User1 .| Users ------------------------------------------------------------- User2 .| Users ------------------------------------------------------------- Computer1 contains the folders shown in the following table. ------------------------------------------------------------- Name .| Path ------------------------------------------------------------- Folder1 .| D:\Folder1 ------------------------------------------------------------- Folder2 .| D:\Folder2 Folder3 E \Folder3 ------------------------------------------------------------- The Users group has Full control permissions to Folder1, Folder2, and Folder3. User1 encrypts two files named File1.docx and File2.docx in Folder1 by using EFS. Which users can move each file? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. User1 only. User1 and Administrator only. User1, User2, and Administrator. ********************. User1 only. User1 and Administrator only. User1, User2, and Administrator.

Your network contains an Active Directory domain. The domain contains a computer named Computer1 that runs Windows 10. Computer1 contains a folder named Folder1. You plan to share Folder1. Everyone will have Read share permissions, and administrators will have Full control share permission. You need to prevent the share from appearing when users browse the network. What should you do?. Enable access-based enumeration. Deny the List NTFS permissions on Folder1. Add Folder1 to a domain-based DFS namespace. Name the share Folder1$.

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. You have a computer that runs Windows 10. The computer contains a folder. The folder contains sensitive data. You need to log which user reads the contents of the folder and modifies and deletes files in the folder. Solution: From the properties of the folder, you configure the Auditing settings and from Audit Policy in the local Group Policy, you configure Audit object access. Does this meet the goal?. Yes. No.

You have a computer named Computer1 that runs Windows 10. On Computer1, you turn on File History. You need to protect a folder named D:\Folder1 by using File History. What should you do?. From File Explorer, modify the Security settings of D:\Folder1. From Backup and Restore (Windows 7), modify the backup settings. From the Settings app, configure the Backup settings. From File History in Control Panel, configure the Advanced settings.

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. You have a computer that runs Windows 10. The computer contains a folder. The folder contains sensitive data. You need to log which user reads the contents of the folder and modifies and deletes files in the folder. Solution: From the properties of the folder, you configure the Auditing settings and from the Audit Policy in the local Group Policy, you configure Audit system events. Does this meet the goal?. Yes. No.

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. You have a computer that runs Windows 10. The computer contains a folder named D:\Scripts. D:\Scripts contains several PowerShell scripts. You need to ensure that you can run the PowerShell scripts without specifying the full path to the scripts. The solution must persist between PowerShell sessions. Solution: At a command prompt, you run set.exe path=d:\scripts. Does this meet the goal?. Yes. No.

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. You have a computer that runs Windows 10. The computer contains a folder named D:\Scripts. D:\Scripts contains several PowerShell scripts. You need to ensure that you can run the PowerShell scripts without specifying the full path to the scripts. The solution must persist between PowerShell sessions. Solution: From a command prompt, you run set.exe PATHEXT=d:\scripts. Does this meet the goal?. Yes. No.

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. You have a computer that runs Windows 10. The computer contains a folder named D:\Scripts. D:\Scripts contains several PowerShell scripts. You need to ensure that you can run the PowerShell scripts without specifying the full path to the scripts. The solution must persist between PowerShell sessions. Solution: From PowerShell, you run $env:Path += ";d:\scripts\". Does this meet the goal?. Yes. No.

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. You have a workgroup computer that runs Windows 10. The computer contains the local user accounts shown in the following table. ----------------------------------------------- Name .| Member of ----------------------------------------------- Administrator .| Administrators ----------------------------------------------- User1 .| Administrators ----------------------------------------------- User2 .| Users ----------------------------------------------- User3 .| Users ----------------------------------------------- You need to configure the desktop background for User1 and User2 only. Solution: From the local computer policy, you configure the Filter Options settings for the computer policy. Does this meet the goal?. Yes. No.

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. You have a workgroup computer that runs Windows 10. The computer contains the local user accounts shown in the following table. ----------------------------------------------- Name .| Member of ----------------------------------------------- Administrator .| Administrators ----------------------------------------------- User1 .| Administrators ----------------------------------------------- User2 .| Users ----------------------------------------------- User3 .| Users ----------------------------------------------- You need to configure the desktop background for User1 and User2 only. Solution: You create a new local group to which you add User1 and User2. You create a local Group Policy Object (GPO) and configure the Desktop Wallpaper setting in the GPO. At a command prompt, you run the gpupdate.exe/Force command. Yes. No.

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. You have a workgroup computer that runs Windows 10. The computer contains the local user accounts shown in the following table. ----------------------------------------------- Name .| Member of ----------------------------------------------- Administrator .| Administrators ----------------------------------------------- User1 .| Administrators ----------------------------------------------- User2 .| Users ----------------------------------------------- User3 .| Users ----------------------------------------------- You need to configure the desktop background for User1 and User2 only. Solution: From the local computer policy, you configure the Filter Options settings for the user policy. At a command prompt, you run the gpupdate.exe/Target:user command. Does this meet the goal?. Yes. No.

Your network contains an Active Directory domain. The domain contains two computers named Computer1 and Computer2 that run Windows 10. You need to modify the registry of Computer1 by using Registry Editor from Computer2. Which two registry hives can you modify? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point. HKEY_CURRENT_USER. HKEY_LOCAL_MACHINE. HKEY_USERS. HKEY_CLASSES_ROOT. HKEY_CURRENT_CONFIG.

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. You have a computer that runs Windows 10. The computer contains a folder. The folder contains sensitive data. You need to log which user reads the contents of the folder and modifies and deletes files in the folder. Solution: From the properties of the folder, you configure the Auditing settings and from the Audit Policy in the local Group Policy, you configure Audit directory service access. Does this meet the goal?. Yes. No.

You have 100 computers that run Windows 10 and are members of an Active Directory domain. Two support technicians named Tech1 and Tech2 will be responsible for monitoring the performance of the computers. You need to configure the computers to meet the following requirements: Ensure that Tech1 can create and manage Data Collector Sets (DCSs). Ensure that Tech2 can start and stop the DCSs. Use the principle of least privilege. To which group should you add each technician? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. Event Log Readers. Performance Log Users. Performance Monitor Users. Remote Management Users.

You have a workgroup computer named Computer1 that runs Windows 10 and has the users shown in the following table. ------------------------------------------------ Name .| Member of ------------------------------------------------ User1 .| Administrators ------------------------------------------------ User2 .| Power Users, Users ------------------------------------------------ User3 .| Backup Operators, Users ------------------------------------------------ User4 .| Users ------------------------------------------------ You plan to add a key named Key1 to the following three registry branches: HKEY_CURRENT_CONFIG\Software HKEY_LOCAL_MACHINES\Software HKEY_CURRENT_USER\Software You need to identify which users can add Key1. What user or users should you identify for each branch? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. User1 only. User1 and User2 only. User1 and User3 only. User1, User2, User3, and User4.

You have a workgroup computer named Computer1 that runs Windows 10 and has the users shown in the following table. --------------------------------------------------- Name .| Member of --------------------------------------------------- User1 .| Administrators --------------------------------------------------- User2 .| Power Users. Users --------------------------------------------------- User3 .| Backup Operators, Users --------------------------------------------------- User4 .| Users --------------------------------------------------- You plan to add a key named Key1 to the following three registry branches: HKEY_CURRENT_CONFIG\Software HKEY_LOCAL_MACHINES\Software HKEY_CURRENT_USER\Software You need to identify which users can add Key1. What user or users should you identify for each branch? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. User1 only. User1 and User2 only. User1 and User3 only. User1, User2, User3, and User4.

You have a workgroup computer named Computer1 that runs Windows 10 and has the users shown in the following table. ------------------------------------ Name .| Member of ------------------------------------ User1 .| Administrators ------------------------------------ User2 .| Users ------------------------------------ You have a file named File1.reg that contains the following content. Windows Registry Editor Version 5.00 [HKEY CURRENT USER\System\Keyl] [HKEY LOCAL MACHINE\System\Key2] You need to identify what occurs when User1 and User2 double-click File1.reg. What should you identify? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. No change is made to registry. Only Keyl is added to the registry. Only Key2 is added to the registry. Key1 and Key2 are added to the registry.

You have a computer named Computer1 that runs Windows10. Computer1 is in a workgroup. Computer1 contains the users shown in the following table. -------------------------------------- Name .| Member of -------------------------------------- User1 .| Group1 -------------------------------------- User2 .| Group1 -------------------------------------- User3 .| Group1 -------------------------------------- User4 .| Users -------------------------------------- Admin1 .| Administrators -------------------------------------- You need to apply the same Group Policy settings to only User1, User2 and User3. The solution must use a minimum number of local Group Policy objects (GPOs). How many local GPOs should you create?. 1. 2. 3.

You have a workgroup computer that runs Windows 10. You need to set the minimum password length to 12 characters. What should you use?. Local Group Policy Editor. User Accounts in Control Panel. System Protection in System Properties. Sign-in options in the Settings app.

Your network contains an Active Directory domain named adatum.com. The domain contains the users shown in the following table. ---------------------------------------- Name .| Member of ---------------------------------------- User1 .| Group1, Group3 ---------------------------------------- User2 .| Group1, Group2 ---------------------------------------- User3 .| Group2, Group3 ---------------------------------------- The domain contains a computer named Computer1 that runs Windows10. Computer1 has a file named File1.txt that has the permissions shown in the exhibit. (Click the Exhibit tab.) ======= IMAGEM ======= For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point. User1 can modify File1.txt. User2 can modify File1.txt. User3 can read Filel.txt.

Your network contains an Active Directory domain that contains the objects shown in the following table. ------------------------------------------------------------------------- Name .| Type .| Member of ------------------------------------------------------------------------- User1 .| User .| Group1 ------------------------------------------------------------------------- User2 .| User .| Group2 ------------------------------------------------------------------------- Group1 .| Global group .| None ------------------------------------------------------------------------- Group2 .| Domain local group .| None ------------------------------------------------------------------------- Computer1 .| Computer .| Groupl ------------------------------------------------------------------------- Computer2 .| Computer .| Groupl ------------------------------------------------------------------------- Computer1 contains the shared folders shown in the following table. --------------------------------------------------------------------------------------------------------------------- Name .| NTFS permission .| Share permission .| Folder enumeration mode --------------------------------------------------------------------------------------------------------------------- Share1 .| Group1 Write .| Group1: Full control .| Access -based --------------------------------------------------------------------------------------------------------------------- Share2$ .| Group2: Full control .| Group2: Read .| Unrestricted --------------------------------------------------------------------------------------------------------------------- The computers have the network configurations shown in the following table. ------------------------------------------------------------------------------------------------------------------------------------------------------------------------- Name .| Network Discovery .| Windows Defender Firewall ------------------------------------------------------------------------------------------------------------------------------------------------------------------------- Computer1 .| On .| Incoming connections: Block all connections to apps that are not on the list of allowed apps ------------------------------------------------------------------------------------------------------------------------------------------------------------------------- Computer2 .| Off .| Incoming connections: Block all connections to apps that are not on the list of allowed apps ------------------------------------------------------------------------------------------------------------------------------------------------------------------------- For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point. Statements Yes No Sharel is listed if Userl connects to \\Computed from Computer2. Sharel is listed if User2 connects to \\Computed from Computer2. Share2$ is listed if User2 connects to \\Computed from Computer2.

Your network contains an Active Directory domain. The domain contains a computer named Computer1 that runs Windows 10. The domain contains the users shown in the following table. ---------------------------------------- Name .| Member of ---------------------------------------- User1 .| Group1 ---------------------------------------- User2 .| Group1, Group2 ---------------------------------------- Computer1 contains the shared folders shown in the following table. ------------------------------------------------------------------------------ Name .| Path .| Access-based enumeration ------------------------------------------------------------------------------ Share1$ .| D:\Folder1 .| Disabled ------------------------------------------------------------------------------ Share2 .| D:\Folder2 .| Enabled ------------------------------------------------------------------------------ The shared folders have the permissions shown in the following table. --------------------------------------------------------------------------------------------------------------------- Name .| Security permission .| Sharing permission --------------------------------------------------------------------------------------------------------------------- Share1$ .| Group1: Read Group2: Full control .| Everyone: Read Group2: Full control --------------------------------------------------------------------------------------------------------------------- Share2 .| Group2: Full control .| Everyone: Read Group2: Full control --------------------------------------------------------------------------------------------------------------------- For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point. Statements Yes No When Userl connects to \\Computed, Sharel $ is visible. When User2 connects to \\Computed ISharel$, the contents of D:\Folderl are accessible. When Userl connects to \ \Computed IShare2, the contents of a Wolder2 are accessible.

You customize the Start menu on a computer that runs Windows 10 as shown in the following exhibit. You need to add Remote Desktop Connection to Group1 and remove Group3 from the Start menu. Which two actions should you perform from the Start menu customizations? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point. Unlock Group1. Remove Command Prompt from Group1. Delete Group3. Add Remote Desktop Connection to Group1. Rename Group3 as Group1.

Report abuse