Which key protector option should you use?
You are the network administrator for Contoso, Ltd. Many users have Windows 10 Enterprise laptops, and your
IT department configures all of them to use BitLocker on all fixed drives.
Many users carry sensitive corporate data on their USB drives.
You need to enable BitLocker for these USB drives.
Which key protector option should you use?
Which two Power Management Group Policy settings should…
HOTSPOT
You plan to use a Group Policy to configure the power settings of several laptops.
You need to ensure that the laptops meet the following requirements:
Enter hibernation mode when the lid is closed.
Enter sleep mode when the battery level is critical.
Which two Power Management Group Policy settings should you modify? To answer, select the appropriate
settings in the answer area.
Hot Area:
You need to ensure that the computer requires a user to…
HOTSPOT
You administer Windows 10 Enterprise computers in your company network. All computers include Windows
10 Enterprise compatible Trusted Platform Module (TPM).
You configure a computer that will run a credit card processing application.
You need to ensure that the computer requires a user to enter a PIN code when starting the computer.
Hot Area:
Which command should you run?
You administer Windows 10 Enterprise client computers in your company network.
A user reports that her Internet connection is slower than usual.
You need to identify the Process Identifiers (PIDs) of applications that are making connections to the Internet.
Which command should you run?
Which Windows PowerShell cmdlet should you run on each …
A company has 100 Windows 10 Enterprise client computers. The client computers are members of a
workgroup.
A custom application requires a Windows Firewall exception on each client computer.
You need to configure the exception on the client computers without affecting existing firewall settings.
Which Windows PowerShell cmdlet should you run on each client computer?
What command should you run on Computer1?
DRAG DROP
You have a line-of-business universal app named App1. You have an image of Windows 10 Enterprise named
Image1.
Image1 is mounted to the C:\\Folder1 folder on a Windows 10 Enterprise computer named Computer1. The
source for App1 is in the C\\:Folder2 folder.
You need to ensure that App1 is included in Image1.
What command should you run on Computer1? To answer, drag the appropriate values to the correct
locations. Each value may be used once, more than once, or not at all. You may need to drag the split bar
between panes or scroll to view content.
Select and Place:
Which policy setting should you configure for each requ…
DRAG DROP
You have a computer that runs Windows 10.
You need to meet the following requirements:
Users must use complex passwords.
Users must change their password every 180 days.
Users must be prompted to change their password seven days before the password expires.
Which policy setting should you configure for each requirement? To answer, drag the appropriate policy
settings to the correct requirements. Each policy setting may be used once, more than once, or not at all. You
may need to drag the split bar between panes or scroll to view content.
Select and Place:
You need to save the Windows Firewall with Advanced Sec…
You administer Windows 10 Enterprise client computers in your company network.
You change settings on a reference computer by using the Windows Firewall with Advanced Security tool. You
want to apply the same settings to other computers.
You need to save the Windows Firewall with Advanced Security configuration settings from the reference
computer. You also need to be able to import the configuration settings into a Group Policy object later.
What should you do?
Which certificate or certificates should you use?
DRAG DROP
You support desktop computers for a company named Fabrikam, Inc. The computers are members of the
Active Directory domain named fabrikam.com. Fabrikam works with a supplier named Contoso, Ltd.
Each company has a public key infrastructure (PKI), and no public certificate authorities (CAs) are used.
Fabrikam employees regularly use a Contoso website that is hosted on a server in the contoso.com domain.
The website requires SSL and mutual authentication.
You need to configure the computers to allow Fabrikam users to access the Contoso website without any
warning prompts. You also need to use the fewest certificates possible.
Which certificate or certificates should you use?
Select and Place:
How should you configure windows firewall?
DRAG DROP
A company has a main office located in Miami, and brach offices in Boston, Los Angeles and Portland. The
Office Networks are configured as described in the following table.
A management computer in the main office, named COMPUTER1, runs windows 8 and several third-party
management applications.
– Ensure that only users in the Boston office can connect to COMPUTER1 by using http.
– Ensure that only users in the Los Angeles office can connect COMPUTER1 by using https
– Ensure that only users in th Portland office can connect to COMPUTER1 by using FTP.
You are configuring access to COMPUTER1. How should you configure windows firewall?
Select and Place: