Simulado 1-30
|
|
Title of test:
![]() Simulado 1-30 Description: Simulado 1-30 |



| New Comment |
|---|
NO RECORDS |
|
Case Study This is a case study. Case studies are not timed separately. You can use as much exam time as you would like to complete each case. However, there may be additional case studies and sections on this exam. You must manage your time to ensure that you are able to complete all questions included on this exam in the time provided. To answer the questions included in a case study, you will need to reference information that is provided in the case study. Case studies might contain exhibits and other resources that provide more information about the scenario that is described in the case study. Each question is independent of the other questions in this case study. At the end of this case study, a review screen will appear. This screen allows you to review your answers and to make changes before you move to the next section of the exam. After you begin a new section, you cannot return to this section. To start the case study To display the first question in this case study, click the Next button. Use the buttons in the left pane to explore the content of the case study before you answer the questions. Clicking these buttons displays information such as business requirements, existing environment, and problem statements. When you are ready to answer a question, click the Question button to return to the question. Overview Existing Environment Fabrikam, Inc. is a distribution company that has 500 employees and 100 contractors. Active Directory The network contains an Active Directory forest named fabrikam.com. The forest is synced to Microsoft Azure Active Directory (Azure AD). All the employees are assigned Microsoft 365 E3 licenses. The domain contains a user account for an employee named User10. Client Computers All the employees have computers that run Windows 10 Enterprise. All the computers are installed without Volume License Keys. Windows 10 license keys are never issued. All the employees register their computer to Azure AD when they first receive the computer. User10 has a computer named Computer10. All the contractors have their own computer that runs Windows 10. None of the computers are joined to Azure AD. Operational Procedures Fabrikam has the following operational procedures: Updates are deployed by using Windows Update for Business. When new contractors are hired, administrators must help the contactors configure the following settings on their computer: Security Policies The following security policies are enforced on all the client computers in the domain: All the computers are encrypted by using BitLocker Drive Encryption (BitLocker). BitLocker recovery information is stored in Active Directory and Azure AD. The local Administrators group on each computer contains an enabled account named LocalAdmin. The LocalAdmin account is managed by using Local Administrator Password Solution (LAPS). Problem Statements Fabrikam identifies the following issues: Employees in the finance department use an application named Application1. Application1 frequently crashes due to a memory error. When Application1 crashes, an event is written to the application log and an administrator runs a script to delete the temporary files and restart the application. When employees attempt to connect to the network from their home computer, they often cannot establish a VPN connection because of misconfigured VPN settings. An employee has a computer named Computer11. Computer11 has a hardware failure that prevents the computer from connecting to the network. User10 reports that Computer10 is not activated. Technical Requirements Fabrikam identifies the following technical requirements for managing the client computers: Provide employees with a configuration file to configure their VPN connection. Use the minimum amount of administrative effort to implement the technical requirements. Identify which employees’ computers are noncompliant with the Windows Update baseline of the company. Ensure that the service desk uses Quick Assist to take remote control of an employee’s desktop during support calls. Automate the configuration of the contractors’ computers. The solution must provide a configuration file that the contractors can open from a Microsoft SharePoint site to apply the required configurations. You need to implement a solution to configure the contractors’ computers. What should you do? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. Microsoft Deployment Toolkit (MDT). Windows AutoPilot. Windows Configuration Designer. Windows deployment Services (WDS). Case Study This is a case study. Case studies are not timed separately. You can use as much exam time as you would like to complete each case. However, there may be additional case studies and sections on this exam. You must manage your time to ensure that you are able to complete all questions included on this exam in the time provided. To answer the questions included in a case study, you will need to reference information that is provided in the case study. Case studies might contain exhibits and other resources that provide more information about the scenario that is described in the case study. Each question is independent of the other questions in this case study. At the end of this case study, a review screen will appear. This screen allows you to review your answers and to make changes before you move to the next section of the exam. After you begin a new section, you cannot return to this section. To start the case study To display the first question in this case study, click the Next button. Use the buttons in the left pane to explore the content of the case study before you answer the questions. Clicking these buttons displays information such as business requirements, existing environment, and problem statements. When you are ready to answer a question, click the Question button to return to the question. Overview Existing Environment Fabrikam, Inc. is a distribution company that has 500 employees and 100 contractors. Active Directory The network contains an Active Directory forest named fabrikam.com. The forest is synced to Microsoft Azure Active Directory (Azure AD). All the employees are assigned Microsoft 365 E3 licenses. The domain contains a user account for an employee named User10. Client Computers All the employees have computers that run Windows 10 Enterprise. All the computers are installed without Volume License Keys. Windows 10 license keys are never issued. All the employees register their computer to Azure AD when they first receive the computer. User10 has a computer named Computer10. All the contractors have their own computer that runs Windows 10. None of the computers are joined to Azure AD. Operational Procedures Fabrikam has the following operational procedures: Updates are deployed by using Windows Update for Business. When new contractors are hired, administrators must help the contactors configure the following settings on their computer: Security Policies The following security policies are enforced on all the client computers in the domain: All the computers are encrypted by using BitLocker Drive Encryption (BitLocker). BitLocker recovery information is stored in Active Directory and Azure AD. The local Administrators group on each computer contains an enabled account named LocalAdmin. The LocalAdmin account is managed by using Local Administrator Password Solution (LAPS). Problem Statements Fabrikam identifies the following issues: Employees in the finance department use an application named Application1. Application1 frequently crashes due to a memory error. When Application1 crashes, an event is written to the application log and an administrator runs a script to delete the temporary files and restart the application. When employees attempt to connect to the network from their home computer, they often cannot establish a VPN connection because of misconfigured VPN settings. An employee has a computer named Computer11. Computer11 has a hardware failure that prevents the computer from connecting to the network. User10 reports that Computer10 is not activated. Technical Requirements Fabrikam identifies the following technical requirements for managing the client computers: Provide employees with a configuration file to configure their VPN connection. Use the minimum amount of administrative effort to implement the technical requirements. Identify which employees’ computers are noncompliant with the Windows Update baseline of the company. Ensure that the service desk uses Quick Assist to take remote control of an employee’s desktop during support calls. Automate the configuration of the contractors’ computers. The solution must provide a configuration file that the contractors can open from a Microsoft SharePoint site to apply the required configurations. You need to ensure that User10 can activate Computer10. What should you do?. Request that a Windows 10 Enterprise license be assigned to User10, and then activate Computer10. From the Microsoft Deployment Toolkit (MDT), add a Volume License Key to a task sequence, and then redeploy Computer10. From System Properties on Computer10, enter a Volume License Key, and then activate Computer10. Request that User10 perform a local AutoPilot Reset on Computer10, and then activate Computer10. Case Study This is a case study. Case studies are not timed separately. You can use as much exam time as you would like to complete each case. However, there may be additional case studies and sections on this exam. You must manage your time to ensure that you are able to complete all questions included on this exam in the time provided. To answer the questions included in a case study, you will need to reference information that is provided in the case study. Case studies might contain exhibits and other resources that provide more information about the scenario that is described in the case study. Each question is independent of the other questions in this case study. At the end of this case study, a review screen will appear. This screen allows you to review your answers and to make changes before you move to the next section of the exam. After you begin a new section, you cannot return to this section. To start the case study To display the first question in this case study, click the Next button. Use the buttons in the left pane to explore the content of the case study before you answer the questions. Clicking these buttons displays information such as business requirements, existing environment, and problem statements. When you are ready to answer a question, click the Question button to return to the question. Overview Contoso, Ltd. is a consulting company that has a main office in Montreal and two branch offices in Seattle and New York. Contoso has IT, human resources (HR), and finance departments. Contoso recently opened a new branch office in San Diego. All the users in the San Diego office work from home. Existing environment Contoso uses Microsoft 365. The on-premises network contains an Active Directory domain named contoso.com. The domain is synced to Microsoft Azure Active Directory (Azure AD). All computers run Windows 10 Enterprise. You have four computers named Computer1, Computer2, Computer3, and ComputerA. ComputerA is in a workgroup on an isolated network segment and runs the Long Term Servicing Channel version of Windows 10. ComputerA connects to a manufacturing system and is business critical. All the other computers are joined to the domain and run the Semi-Annual Channel version of Windows 10. In the domain, you create four groups named Group1, Group2, Group3, and Group4. Computer2 has the local Group Policy settings shown in the following table. -------------------------------------------------------------------------------------------- | Policy | Security Setting | -------------------------------------------------------------------------------------------- | Access this computer fromthe network | Group1 | -------------------------------------------------------------------------------------------- | Deny access to this computer from the network | Group2 | -------------------------------------------------------------------------------------------- | Allow log on through Remote Desktop Services | Group3 | -------------------------------------------------------------------------------------------- | Denny log on through Remote desktop Services | Group4 | -------------------------------------------------------------------------------------------- The computers are updated by using Windows Update for Business. The domain has the users shown in the following table. ------------------------------------------------------------------------ | Name | Mamber of | ------------------------------------------------------------------------ | User1 | Domain Admin, Domain Users | ------------------------------------------------------------------------ | User2 | Administrators, Domain Users | ------------------------------------------------------------------------ | User3 | Account Operators, Domain Users | ------------------------------------------------------------------------ | User4 | Domain Users | ------------------------------------------------------------------------ | User5 | Domain Users, Guests | ------------------------------------------------------------------------ | User6 | Group2, Group3, Domain Users | ------------------------------------------------------------------------ Computer1 has the local users shown in the following table. --------------------------------------------------------------------- | Name | Mamber of | --------------------------------------------------------------------- | User11 | Administrators | --------------------------------------------------------------------- | User12 | Users | --------------------------------------------------------------------- | User13 | Guests | --------------------------------------------------------------------- Requirements Planned Changes Contoso plans to purchase computers preinstalled with Windows 10 Pro for all the San Diego office users. Technical requirements Contoso identifies the following technical requirements: The computers in the San Diego office must be upgraded automatically to Windows 10 Enterprise and must be joined to Azure AD the first time a user starts each new computer. End users must not be required to accept the End User License Agreement (EULA). Helpdesk users must be able to troubleshoot Group Policy object (GPO) processing on the Windows 10 computers. The helpdesk users must be able to identify which Group Policies are applied to the computers. Users in the HR department must be able to view the list of files in a folder named D:\Reports on Computer3. ComputerA must be configured to have an Encrypting File System (EFS) recovery agent. Quality update installations must be deferred as long as possible on ComputerA. Users in the IT department must use dynamic lock on their primary device. User6 must be able to connect to Computer2 by using Remote Desktop. The principle of least privilege must be used whenever possible. Administrative effort must be minimized whenever possible. Kiosk (assigned access) must be configured on Computer1. You need to meet the technical requirements for the San Diego office computers. Which Windows 10 deployment method should you use? Which Windows 10 deployment method should you use?. wipe and load refresh. in-place upgrade. provisioning packages. Windows Autopilot. Case Study This is a case study. Case studies are not timed separately. You can use as much exam time as you would like to complete each case. However, there may be additional case studies and sections on this exam. You must manage your time to ensure that you are able to complete all questions included on this exam in the time provided. To answer the questions included in a case study, you will need to reference information that is provided in the case study. Case studies might contain exhibits and other resources that provide more information about the scenario that is described in the case study. Each question is independent of the other questions in this case study. At the end of this case study, a review screen will appear. This screen allows you to review your answers and to make changes before you move to the next section of the exam. After you begin a new section, you cannot return to this section. To start the case study To display the first question in this case study, click the Next button. Use the buttons in the left pane to explore the content of the case study before you answer the questions. Clicking these buttons displays information such as business requirements, existing environment, and problem statements. When you are ready to answer a question, click the Question button to return to the question. Overview Contoso, Ltd. is a consulting company that has a main office in Montreal and two branch offices in Seattle and New York. Contoso has IT, human resources (HR), and finance departments. Contoso recently opened a new branch office in San Diego. All the users in the San Diego office work from home. Existing environment Contoso uses Microsoft 365. The on-premises network contains an Active Directory domain named contoso.com. The domain is synced to Microsoft Azure Active Directory (Azure AD). All computers run Windows 10 Enterprise. You have four computers named Computer1, Computer2, Computer3, and ComputerA. ComputerA is in a workgroup on an isolated network segment and runs the Long Term Servicing Channel version of Windows 10. ComputerA connects to a manufacturing system and is business critical. All the other computers are joined to the domain and run the Semi-Annual Channel version of Windows 10. In the domain, you create four groups named Group1, Group2, Group3, and Group4. Computer2 has the local Group Policy settings shown in the following table. -------------------------------------------------------------------------------------------- | Policy | Security Setting | -------------------------------------------------------------------------------------------- | Access this computer fromthe network | Group1 | -------------------------------------------------------------------------------------------- | Deny access to this computer from the network | Group2 | -------------------------------------------------------------------------------------------- | Allow log on through Remote Desktop Services | Group3 | -------------------------------------------------------------------------------------------- | Denny log on through Remote desktop Services | Group4 | -------------------------------------------------------------------------------------------- The computers are updated by using Windows Update for Business. The domain has the users shown in the following table. ------------------------------------------------------------------------ | Name | Mamber of | ------------------------------------------------------------------------ | User1 | Domain Admin, Domain Users | ------------------------------------------------------------------------ | User2 | Administrators, Domain Users | ------------------------------------------------------------------------ | User3 | Account Operators, Domain Users | ------------------------------------------------------------------------ | User4 | Domain Users | ------------------------------------------------------------------------ | User5 | Domain Users, Guests | ------------------------------------------------------------------------ | User6 | Group2, Group3, Domain Users | ------------------------------------------------------------------------ Computer1 has the local users shown in the following table. --------------------------------------------------------------------- | Name | Mamber of | --------------------------------------------------------------------- | User11 | Administrators | --------------------------------------------------------------------- | User12 | Users | --------------------------------------------------------------------- | User13 | Guests | --------------------------------------------------------------------- Requirements Planned Changes Contoso plans to purchase computers preinstalled with Windows 10 Pro for all the San Diego office users. Technical requirements Contoso identifies the following technical requirements: The computers in the San Diego office must be upgraded automatically to Windows 10 Enterprise and must be joined to Azure AD the first time a user starts each new computer. End users must not be required to accept the End User License Agreement (EULA). Helpdesk users must be able to troubleshoot Group Policy object (GPO) processing on the Windows 10 computers. The helpdesk users must be able to identify which Group Policies are applied to the computers. Users in the HR department must be able to view the list of files in a folder named D:\Reports on Computer3. ComputerA must be configured to have an Encrypting File System (EFS) recovery agent. Quality update installations must be deferred as long as possible on ComputerA. Users in the IT department must use dynamic lock on their primary device. User6 must be able to connect to Computer2 by using Remote Desktop. The principle of least privilege must be used whenever possible. Administrative effort must be minimized whenever possible. Kiosk (assigned access) must be configured on Computer1. You need to meet the technical requirement for Computer1. What should you do? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. User1. User2. User3. User11. User12. ********. User4. User5. User12. User13. Your company has an isolated network used for testing. The network contains 20 computers that run Windows 10. The computers are in a workgroup. During testing, the computers must remain in the workgroup. You discover that none of the computers are activated. You need to recommend a solution to activate the computers without connecting the network to the Internet. What should you include in the recommendation?. Volume Activation Management Tool (VAMT). Key Management Service (KMS). Active Directory-based activation. The Get-WindowsDeveloperLicense cmdlet. You plan to deploy Windows 10 to 100 secure computers. You need to select a version of Windows 10 that meets the following requirements: Uses Microsoft Edge as the default browser Minimizes the attack surface on the computer Supports joining Microsoft Azure Active Directory (Azure AD) Only allows the installation of applications from the Microsoft Store What is the best version to achieve the goal? More than one answer choice may achieve the goal. Select the BEST answer. Windows 10 Pro in S mode. Windows 10 Home in S mode. Windows 10 Pro. Windows 10 Enterprise. You have a computer named Computer1 that runs Windows 8.1. Computer1 has a local user named User1 who has a customized profile. On Computer1, you perform a clean installation of Windows 10 without formatting the drives. You need to migrate the settings of User1 from Windows 8.1 to Windows 10. Which two actions should you perform? To answer, drag the appropriate actions to the correct targets. Each action may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content. NOTE: Each correct selection is worth one point. Run scanstate.exe and specify the C:\users subfolder. Run loadstate.exe and specify the C:\users subfolder. Run scanstate.exe and specify the C:\Windows.old subfolder. Run loadstate.exe and specify the C:\Windows.old subfolder. Run usmutil.exe and specify the C:\users subfolder. Run usmutil.exe and specify the C:\Windows.old subfolder. Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. You have a computer named Computer1 that runs Windows 10. A service named Application1 is configured as shown in the exhibit. You discover that a user used the Service1 account to sign in to Computer1 and deleted some files. You need to ensure that the identity used by Application1 cannot be used by a user to sign in to the desktop on Computer1. The solution must use the principle of least privilege. Solution: On Computer1, you configure Application1 to sign in as the LocalSystem account and select the Allow service to interact with desktop check box. You delete the Service1 account. Does this meet the goal?. Yes. No. Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. You have a computer named Computer1 that runs Windows 10. A service named Application1 is configured as shown in the exhibit. You discover that a user used the Service1 account to sign in to Computer1 and deleted some files. You need to ensure that the identity used by Application1 cannot be used by a user to sign in to the desktop on Computer1. The solution must use the principle of least privilege. Solution: On Computer1, you assign Service1 the Deny log on locally user right. Does this meet the goal?. Yes. No. Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. You have a computer named Computer1 that runs Windows 10. A service named Application1 is configured as shown in the exhibit. You discover that a user used the Service1 account to sign in to Computer1 and deleted some files. You need to ensure that the identity used by Application1 cannot be used by a user to sign in to sign in to the desktop on Computer1. The solution must use the principle of least privilege. Solution: On Computer1, you assign Service1 the Deny log on as a service user right. Does this meet the goal?. Yes. No. You have a Microsoft Azure Active Directory (Azure AD) tenant. Some users sign in to their computer by using Windows Hello for Business. A user named User1 purchases a new computer and joins the computer to Azure AD. User1 is not able to use Windows Hello for Business on his computer. User1 sign-in options are shown on the exhibit. You open Device Manager and confirm that all the hardware works correctly. You need to ensure that User1 can use Windows Hello for Business facial recognition to sign in to the computer. What should you do first?. Purchase an infrared (IR) camera. Upgrade the computer to Windows 10 Enterprise. Enable UEFI Secure Boot. Install a virtual TPM driver. Your company uses Microsoft Deployment Toolkit (MDT) to deploy Windows 10 to new computers. The company purchases 1,000 new computers. You need to ensure that the Hyper-V feature is enabled on the computers during the deployment. What are two possible ways to achieve this goal? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point. Add a task sequence step that adds a provisioning package. In a Group Policy object (GPO), from Computer Configuration, configure Application Control Policies. Add a custom command to the Unattend.xml file. Add a configuration setting to Windows Deployment Services (WDS). Add a task sequence step that runs dism.exe. Your network contains an Active Directory domain that is synced to a Microsoft Azure Active Directory (Azure AD) tenant. Your company purchases a Microsoft 365 subscription. You need to migrate the Documents folder of users to Microsoft OneDrive for Business. What should you configure?. OneDrive Group Policy settings. Roaming user profiles. Enterprise State Roaming. Folder Redirection Group Policy settings. Your network contains an Active Directory domain. The domain contains a user named User1. User1 creates a Microsoft account. User1 needs to sign in to cloud resources by using the Microsoft account without being prompted for credentials. Which settings should User1 configure?. User Accounts in Control Panel. Email & app accounts in the Settings app. Users in Computer Management. Users in Active Directory Users and Computers. Your network contains an Active Directory domain named adatum.com that uses Key Management Service (KMS) for activation. You deploy a computer that runs Windows 10 to the domain. The computer fails to activate. You suspect that the activation server has an issue. You need to identify which server hosts KMS. How should you complete the command? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. Get-Hot. nslookup.exe. slmgr.vbs. ***********************. A. SOA. SRV. WKS. You deploy Windows 10 to a new computer named Computer1. You sign in to Computer1 and create a user named User1. You create a file named LayoutModification.xml in the C:\Users\Default\AppData\Local\Microsoft\Windows\Shell\folder. LayoutModification.xml contains the following markup. ******************************** <?xml version- "1.0" encoding- "utf-8"?> <LayoutModificationTemplate xmins= "http://schemas.microsoft.com/Start/2014/LayoutModification" xmlns:defaultlayout="http://schemas.microsoft.com/Start/2014/PullDefaultLayout" xmlns:start= "http://schemas.microsoft.com/Start/2014/StartLayout" xmins:taskbar= "http://schemas.microsoft.com/Start/2014/TaskbarLayout" Version- "1"> <CustomTaskbarLayoutCollection> <defaultLayout:TaskbarLayout> <taskbar:TaskbarPinList> <taskbar:DesktopApp DesktopApplicationLinkPath= "%ALLUSERSPROFI LE%\Microsoft\Windows \Start Menu\Programs\Accessories\Paint.lnk" I> </taskbar: TaskbarPinList> </defaultlayout:TaskbarLayout> </CustomTaskbarLayoutCollection> </LayoutModificationTemplate> ******************************** What is the effect of the configuration? To answer, select the appropriate options in the answer area. Default apps only. Default apps and Microsoft Paint. Microsoft Paint only. **************************************************. Default apps only. Default apps and Microsoft Paint. Microsoft Paint only. You have an Azure Active Directory (Azure AD) tenant named contoso.com. You have a workgroup computer named Computer1 that runs Windows 10. You need to add Computer1 to contoso.com. What should you use?. Computer Management. dsregcmd.exe. the Settings app. netdom.exe. You have a computer that runs Windows 10. You need to configure a picture password. What should you do?. From Control Panel, configure the User Accounts settings. From the Settings app, configure the Sign-in options. From the Local Group Policy Editor, configure the Account Policies settings. From Windows PowerShell, run the Set-LocalUser cmdlet and specify the InputObject parameter. You have a workgroup computer named Computer1 that runs Windows 10. You need to configure Windows Hello for sign-in to Computer1 by using a physical security key. What should you use?. a USB 3.0 device that supports BitLocker Drive Encryption (BitLocker). a USB device that supports FIDO2. a USB 3.0 device that has a certificate from a trusted certification authority (CA). a USB device that supports RSA SecurID. Your network contains an Active Directory domain. The domain contains a computer named Computer1 that runs Windows 10. The domain contains the users shown in the following table. ------------------------------------------------------------- | Name | Member of | ------------------------------------------------------------- | User1 | Domain Users | ------------------------------------------------------------- | User2 | Domain Users, Guests | ------------------------------------------------------------- | User3 | Domain Users, Administrators | ------------------------------------------------------------- Computer1 has the local users shown in the following table. ---------------------------------------------- | Name | Member of | ---------------------------------------------- | User4 | Users | ---------------------------------------------- | User5 | Administrators | ---------------------------------------------- All users have Microsoft accounts. Which two users can be configured to sign in by using their Microsoft account? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point. User1. User2. User3. User4. User5. You have the source files shown in the following table. -------------------------------------------------------------------------------------------- | Source | Location | -------------------------------------------------------------------------------------------- | Custom Windows 10 image | D:\Folder1\Image1.wim | -------------------------------------------------------------------------------------------- | Windows 10 language pack DVD | E:\ | -------------------------------------------------------------------------------------------- You mount an image from Image1.wim to a folder named C:\Mount. You need to add the French language pack to the mounted image. How should you complete the command? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. Add-WindowsCapabdity. Add-WindowsFeature. Dism.exe. Setup.exe. *******************************. C:\Mount. C:\Mountn\Windows. C:\Windows. D:\Folder1\Image1.wim. Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. Your network contains an Active Directory domain. The domain contains a computer named Computer1 that runs Windows 8.1. Computer1 has apps that are compatible with Windows 10. You need to perform a Windows 10 in-place upgrade on Computer1. Solution: You copy the Windows 10 installation media to a network share. From Windows 8.1 on Computer1, you run setup.exe from the network share. Does this meet the goal?. Yes. No. Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. Your network contains an Active Directory domain. The domain contains a computer named Computer1 that runs Windows 8.1. Computer1 has apps that are compatible with Windows 10. You need to perform a Windows 10 in-place upgrade on Computer1. Solution: You copy the Windows 10 installation media to a Microsoft Deployment Toolkit (MDT) deployment share. You create a task sequence, and then you run the MDT deployment wizard on Computer1. Does this meet the goal?. Yes. No. Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. Your network contains an Active Directory domain. The domain contains a computer named Computer1 that runs Windows 8.1. Computer1 has apps that are compatible with Windows 10. You need to perform a Windows 10 in-place upgrade on Computer1. Solution: You add Windows 10 startup and install images to a Windows Deployment Services (WDS) server. You start Computer1 by using WDS and PXE, and then you initiate the Windows 10 installation. Does this meet the goal?. Yes. No. Your company deploys Windows 10 Enterprise to all computers. All the computers are joined to Microsoft Azure Active Directory (Azure AD). The company purchases a new computer for a new user and creates an Azure AD account for the user. The user signs in to the computer by using the Azure AD account. The user discovers the activation error shown in the following exhibit. You need to activate Windows 10 Enterprise on the computer. What should you do?. In Azure AD, assign a Windows 10 Enterprise license to the user. At the command prompt, run slmgr /ltc. Reinstall Windows as Windows 10 Enterprise. At the command prompt, run slmgr /ato. You have a computer named Computer1 that runs Windows 10. Several users have signed in to Computer1 and have a profile. You create a taskbar modification file named LayoutModification.xml. You need to ensure that LayoutModification.xml will apply to all users who sign in to Computer1. To which folder should you copy LayoutModification.xml?. C:\Users\Public\Public Desktop. C:\Windows\ShellExperiences. C:\Users\Default\AppData\Local\Microsoft\Windows\Shell\. C:\Windows\System32\Configuration. Your company uses a Key Management Service (KMS) to activate computers that run Windows 10. A user works remotely and establishes a VPN connection once a month. The computer of the user fails to be activated. Which command should you run on the computer to initiate activation? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. phoneactivate.exe. RMActivate.exe. setup.exe. slmgr.vbs. **************************************. /ato. /pkey. /quiet. /rearm. You have a server named Server1 and computers that run Windows 8.1. Server1 has the Microsoft Deployment Toolkit (MDT) installed. You plan to upgrade the Windows 8.1 computers to Windows 10 by using the MDT deployment wizard. You need to create a deployment share on Server1. What should you do on Server1, and what are the minimum components you should add to the MDT deployment share? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. Import the Deployment Image Servicing and Management (DISM) PowerShell module. Import the WindowsAutopilotIntune Windows PowerShell module. Install the Windows Assessment and Deployment Kit (Windows ADK). Install the Windows Deployment Services server role. **********************************************. Windows 10 image and package only. Windows 10 image and task sequence only. Windows 10 image only. Windows 10 image, task sequence, and package. Case Study This is a case study. Case studies are not timed separately. You can use as much exam time as you would like to complete each case. However, there may be additional case studies and sections on this exam. You must manage your time to ensure that you are able to complete all questions included on this exam in the time provided. To answer the questions included in a case study, you will need to reference information that is provided in the case study. Case studies might contain exhibits and other resources that provide more information about the scenario that is described in the case study. Each question is independent of the other questions in this case study. At the end of this case study, a review screen will appear. This screen allows you to review your answers and to make changes before you move to the next section of the exam. After you begin a new section, you cannot return to this section. To start the case study To display the first question in this case study, click the Next button. Use the buttons in the left pane to explore the content of the case study before you answer the questions. Clicking these buttons displays information such as business requirements, existing environment, and problem statements. When you are ready to answer a question, click the Question button to return to the question. Overview Existing Environment Fabrikam, Inc. is a distribution company that has 500 employees and 100 contractors. Active Directory The network contains an Active Directory forest named fabrikam.com. The forest is synced to Microsoft Azure Active Directory (Azure AD). All the employees are assigned Microsoft 365 E3 licenses. The domain contains a user account for an employee named User10. Client Computers All the employees have computers that run Windows 10 Enterprise. All the computers are installed without Volume License Keys. Windows 10 license keys are never issued. All the employees register their computer to Azure AD when they first receive the computer. User10 has a computer named Computer10. All the contractors have their own computer that runs Windows 10. None of the computers are joined to Azure AD. Operational Procedures Fabrikam has the following operational procedures: Updates are deployed by using Windows Update for Business. When new contractors are hired, administrators must help the contactors configure the following settings on their computer: Security Policies The following security policies are enforced on all the client computers in the domain: All the computers are encrypted by using BitLocker Drive Encryption (BitLocker). BitLocker recovery information is stored in Active Directory and Azure AD. The local Administrators group on each computer contains an enabled account named LocalAdmin. The LocalAdmin account is managed by using Local Administrator Password Solution (LAPS). Problem Statements Fabrikam identifies the following issues: Employees in the finance department use an application named Application1. Application1 frequently crashes due to a memory error. When Application1 crashes, an event is written to the application log and an administrator runs a script to delete the temporary files and restart the application. When employees attempt to connect to the network from their home computer, they often cannot establish a VPN connection because of misconfigured VPN settings. An employee has a computer named Computer11. Computer11 has a hardware failure that prevents the computer from connecting to the network. User10 reports that Computer10 is not activated. Technical Requirements Fabrikam identifies the following technical requirements for managing the client computers: Provide employees with a configuration file to configure their VPN connection. Use the minimum amount of administrative effort to implement the technical requirements. Identify which employees’ computers are noncompliant with the Windows Update baseline of the company. Ensure that the service desk uses Quick Assist to take remote control of an employee’s desktop during support calls. Automate the configuration of the contractors’ computers. The solution must provide a configuration file that the contractors can open from a Microsoft SharePoint site to apply the required configurations. You need to sign in as LocalAdmin on Computer11. What should you do first?. From the LAPS UI tool, view the administrator account password for the computer object of Computer11. From Windows Configuration Designer, create a configuration package that sets the password of the LocalAdmin account on Computer11. Use a Group Policy object (GPO) to set the local administrator password. From Microsoft Intune, set the password of the LocalAdmin account on Computer11. Case Study This is a case study. Case studies are not timed separately. You can use as much exam time as you would like to complete each case. However, there may be additional case studies and sections on this exam. You must manage your time to ensure that you are able to complete all questions included on this exam in the time provided. To answer the questions included in a case study, you will need to reference information that is provided in the case study. Case studies might contain exhibits and other resources that provide more information about the scenario that is described in the case study. Each question is independent of the other questions in this case study. At the end of this case study, a review screen will appear. This screen allows you to review your answers and to make changes before you move to the next section of the exam. After you begin a new section, you cannot return to this section. To start the case study To display the first question in this case study, click the Next button. Use the buttons in the left pane to explore the content of the case study before you answer the questions. Clicking these buttons displays information such as business requirements, existing environment, and problem statements. When you are ready to answer a question, click the Question button to return to the question. Overview Existing Environment Fabrikam, Inc. is a distribution company that has 500 employees and 100 contractors. Active Directory The network contains an Active Directory forest named fabrikam.com. The forest is synced to Microsoft Azure Active Directory (Azure AD). All the employees are assigned Microsoft 365 E3 licenses. The domain contains a user account for an employee named User10. Client Computers All the employees have computers that run Windows 10 Enterprise. All the computers are installed without Volume License Keys. Windows 10 license keys are never issued. All the employees register their computer to Azure AD when they first receive the computer. User10 has a computer named Computer10. All the contractors have their own computer that runs Windows 10. None of the computers are joined to Azure AD. Operational Procedures Fabrikam has the following operational procedures: Updates are deployed by using Windows Update for Business. When new contractors are hired, administrators must help the contactors configure the following settings on their computer: Security Policies The following security policies are enforced on all the client computers in the domain: All the computers are encrypted by using BitLocker Drive Encryption (BitLocker). BitLocker recovery information is stored in Active Directory and Azure AD. The local Administrators group on each computer contains an enabled account named LocalAdmin. The LocalAdmin account is managed by using Local Administrator Password Solution (LAPS). Problem Statements Fabrikam identifies the following issues: Employees in the finance department use an application named Application1. Application1 frequently crashes due to a memory error. When Application1 crashes, an event is written to the application log and an administrator runs a script to delete the temporary files and restart the application. When employees attempt to connect to the network from their home computer, they often cannot establish a VPN connection because of misconfigured VPN settings. An employee has a computer named Computer11. Computer11 has a hardware failure that prevents the computer from connecting to the network. User10 reports that Computer10 is not activated. Technical Requirements Fabrikam identifies the following technical requirements for managing the client computers: Provide employees with a configuration file to configure their VPN connection. Use the minimum amount of administrative effort to implement the technical requirements. Identify which employees’ computers are noncompliant with the Windows Update baseline of the company. Ensure that the service desk uses Quick Assist to take remote control of an employee’s desktop during support calls. Automate the configuration of the contractors’ computers. The solution must provide a configuration file that the contractors can open from a Microsoft SharePoint site to apply the required configurations. An employee reports that she must perform a BitLocker recovery on her laptop. The employee does not have her BitLocker recovery key but does have a Windows 10 desktop computer. What should you instruct the employee to do from the desktop computer?. Run the manage-bde.exe –status command. From BitLocker Recovery Password Viewer, view the computer object of the laptop. Go to https://account.activedirectory.windowsazure.com and view the user account profile. Run the Enable-BitLockerAutoUnlock cmdlet. |




