Which of the following roles have extended roles in Microsoft Exchange Online?
You work as a senior Office 365 administrator at ABC.com. The ABC.com network consists of a
single domain named ABC.com.
You are running a training exercise for junior administrators. You are currently discussing Office
365 admin roles.
Which of the following roles have extended roles in Microsoft Exchange Online? (Choose all that
apply.)
Which of the following is the cmdlet being discussed?
You work as a senior Office 365 administrator at ABC.com. The ABC.com network consists of a
single domain named ABC.com.
You are running a training exercise for junior administrators. You are currently discussing an
Azure Cmdlet that allows for Rights Management to log all requests served on behalf of your
tenant to your storage account.
Which of the following is the cmdlet being discussed?
Which of the following is the cmdlet being discussed?
You work as a senior Office 365 administrator at ABC.com. The ABC.com network consists of a
single domain named ABC.com.
You are running a training exercise for junior administrators. You are currently discussing cmdlet
allows you to view the present Rights Management setup for your tenant.
Which of the following is the cmdlet being discussed?
Which of the following are Operating Systems required to perform this task?
You are employed as an Office 365 administrator at ABC.com. ABC.com network has an Active
Directory Domain Services domain, named ABC.com.
You have been instructed to make sure that you are able to analyze mail protection reports. To
achieve this, you have to make sure that the required components are installed on your
workstation.
Which of the following are Operating Systems required to perform this task?
Which four of the following actions should you perform to deploy an image of the reference computer to the rem
You work as a desktop technician at ABC.com. The ABC.com network consists of an Active
Directory Domain Services (AD DS) domain named ABC.com.
You are in the process of replacing the current client computers with new laptop computers
running Windows 8.
The company has purchased 30 new laptops with identical hardware and no operating system
installed.
You need to install Windows 8 and corporate applications on the new laptops.
You install Windows 8 on one of the new laptop then install and configure the corporate
applications. You want to use this laptop as a reference computer.
Which four of the following actions should you perform to deploy an image of the reference
computer to the remaining new laptops? (Choose four).
Which of the following would be the best solution?
You work as a desktop technician at ABC.com. The ABC.com network consists of an Active
Directory Domain Services (AD DS) domain named ABC.com. The client computers run either
Windows 7 Enterprise or Windows 8 Enterprise.
Company users use a custom application named CorpApp. The application is installed on every
client computer in the network. The application creates unique files that store settings for each
user when the user uses the application.
Users often log in to different client computers.
You need to recommend a solution that would enable a user to log in to any client computer and
retrieve their settings file so that the application does not need to be configured whenever a user
logs into a different computer.
The solution must enable users to reverse any changes to the settings files if required.
Which of the following would be the best solution?
Which of the following actions should you perform?
You work as a desktop technician at ABC.com. The ABC.com network consists of an Active
Directory Domain Services (AD DS) domain named ABC.com. All client computers run Windows
8 Enterprise.
You have a Windows 8 Enterprise client computer named AdminClient1.
You want to install a second instance of Windows 8 Enterprise named Win8Test on AdminClient1.
You plan to create a virtual hard disk (VHD) for the Windows 8 installation and configure a dualboot system by using a native boot VHD.
Which of the following actions should you perform? (Choose all that apply)
How should you configure the tablets to connect to the WDS server and download the Windows 8 Enterprise image?
You work as a desktop technician at ABC.com. The ABC.com network consists of an Active
Directory Domain Services (AD DS) domain named ABC.com. All servers run Windows Server
2012 and all client computers run Windows 8 Enterprise.
The company uses Windows Deployment Services to deploy operating systems. The WDS server
has a Windows 8 Enterprise image configured for deployment to client computers.
The company has purchased 30 new tablet computers with Windows 8 Professional installed.
You want to use WDS to deploy Windows 8 Enterprise to the new tablets.
How should you configure the tablets to connect to the WDS server and download the Windows 8
Enterprise image?
What should you do to block third-party Web browsers on Client1 without affecting other applications?
You work as a desktop technician at ABC.com. The ABC.com network consists of an Active
Directory Domain Services (AD DS) domain named ABC.com. All servers run Windows Server
2012 and all client computers run Windows 8 Enterprise.
A Windows 8 Enterprise computer named Client1 is used by multiple users.
You discover that several third-party Web browsers have been installed on Client1. You want to
restrict Client1 to running only Microsoft Internet Explorer for Web browsing to comply with
company security policy.
You open the Local Group Policy Editor on Client1.
What should you do to block third-party Web browsers on Client1 without affecting other
applications?
You need to disable AppLocker
You work as a desktop technician at ABC.com. The ABC.com network consists of an Active
Directory Domain Services (AD DS) domain named ABC.com. All servers run Windows Server
2012 and all client computers run Windows 8 Enterprise.
A Windows 8 Enterprise computer named Client1 has AppLocker policies in place to restrict
access to applications. You have been asked to disable AppLocker on Client1.
You log in to Client1 and open the Local Group Policy Editor. You then delete all the AppLocker
rules, disable the Application Identity service then run the gpupdate /force command to refresh the
policy.
You discover that the AppLocker rules are still be applied. You need to disable AppLocker.
What should you do?