PrepAway - Latest Free Exam Questions & Answers

Author: admin

What should you configure?

Note: This question is part of a series of questions that use the same or similar answer choices. An answer
choice may be correct for more than one question in the series. Each question is independent of the other
questions in this series. Information and details provided in a question apply only to that question.
You have an application named App1 installed on a computer named Computer1. Computer1 runs Windows
10. App1 saves data to %UserProfile%\\App1\\Data.
You need to ensure that you can recover the App1 data if Computer1 fails.
What should you configure?

What should you configure?

Note: This question is part of a series of questions that use the same or similar answer choices. An answer
choice may be correct for more than one question in the series. Each question is independent of the other
questions in this series. Information and details provided in a question apply only to that question.
A user successfully accesses \\\\server1\\Sources\\App1\\. The user cannot access \\\\server1\\Sources\\App2\\.
You need to ensure that the user can access \\\\server1\\Sources\\App2\\.
What should you configure?

What should you configure?

Note: This question is part of a series of questions that use the same or similar answer choices. An answer
choice may be correct for more than one question in the series. Each question is independent of the other
questions in this series. Information and details provided in a question apply only to that question.
You have a computer that runs Windows 10 and is used by 10 users. The computer is joined to an Active
Directory domain. All of the users are members of the Administrators group. Each user has an Active Directory
account.
You have a Microsoft Word document that contains confidential information.
You need to ensure that you are the only user who can open the document.
What should you configure?

Which two actions should you perform?

You support Windows 10 Enterprise laptops. Microsoft BitLocker Administration and Monitoring (MBAM) is
deployed on your network on a server named SERVER1.
Company policy requires that laptops with MBAM client installed prompt users to enable BitLocker within 2
hours of being started.
You need to make changes to the Configure MBAM Services Group Policy settings.
Which two actions should you perform? Each correct answer presents part of the solution.

Which type of report should you use for each requirement?

DRAG DROP
You have a Microsoft Intune subscription.
You need to identify devices based on the following requirements:
Devices that are jailbroken or rooted
Devices that are remote wiped or deleted.
Devices that have blacklisted applications installed.
Which type of report should you use for each requirement? To answer, drag the appropriate reports to the
correct requirements. Each report may be used once, more than once, are not at all. You may need to drag the
split bar between panes or scroll to view content.
Select and Place:

What should you identify?

HOTSPOT
You plan to deploy a Microsoft Azure RemoteApp hybrid collection.
You plan to use a custom template image named Image1 to deploy the hybrid collection.
You need to identify the role and feature that must be enabled in the image to support the deployment of the
hybrid collection.
What should you identify? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:

Hot Area:

HOTSPOT
You have an Active Directory domain named contoso.com. You have a server that runs Windows Server 2012
R2 and that is a Remote Desktop server.
The RD Web Access Web application settings are shown in the following graphic.

Use the drop-down menus to select the answer choice that completes each statement based on the information
presented in the graphic.
Note: Each correct selection is worth one point.
Hot Area:


Page 564 of 1,478« First...102030...562563564565566...570580590...Last »