PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

How should you create the WinRE image?

You work as a desktop technician at ABC.com. The ABC.com network consists of an Active
Directory Domain Services (AD DS) domain named ABC.com.
The network includes client computers from different hardware manufacturers. All client
computers run Windows 8 Pro.
You currently have multiple bootable Windows Recovery Environment (WinRE) disks, each with
different drivers for the different hardware configurations.
You want to create a single bootable Windows Recovery Environment (WinRE) disk that can be
used on all different hardware configurations.
You use Deployment Image Servicing and Management (DISM) to mount a WinRE image file.
How should you create the WinRE image?

Which option should you select to configure the quarantined files retention period?

You work as a desktop technician at ABC.com.
You are configuring Windows Defender on a client computer running Windows 8 Pro.
You want to configure Windows Defender to remove quarantined files after 1 month.
You navigate to the Settings tab in Windows Defender.
Which option should you select to configure the quarantined files retention period?

Which three of the following actions should you perform?

You work as a desktop technician at ABC.com. The ABC.com network consists of an Active
Directory Domain Services (AD DS) domain named ABC.com. All servers run Windows Server
2012 and all client computers run Windows 8 Pro.
A server named ABC-Print01 runs the Print and Document Services role and hosts shared printers
for the client computers in the network.
A user named Jane uses a client computer named ABC-Sales03. ABC-Sales03 has a connection
to a shared printer on ABC-Print01.
Jane wants to configure the network printer to print a separator page with every print job that she
sends to the printer. She creates a separator page file.

You need to configure Jane’s network printer to use the separator page. Your configuration must
not affect other user’s using the network printer.
Which three of the following actions should you perform? (Choose three)

How can you ensure that all Windows 8 devices support Virtual Smart Cards?

You work as a desktop technician at ABC.com. The ABC.com network consists of an Active
Directory Domain Services (AD DS) domain named ABC.com. All servers run Windows Server
2012.
The company uses laptop computers that run Windows 8 Enterprise or Windows 8 Pro and tablet
computers that run Windows 8 Pro or Windows 8 RT.
You are evaluating the use of Virtual Smart Cards on all Window 8 devices.
How can you ensure that all Windows 8 devices support Virtual Smart Cards?

What permission does Mia have on the shared folder?

You work as a desktop technician at ABC.com. The ABC.com network consists of an Active
Directory Domain Services (AD DS) domain named ABC.com. All servers run Windows Server
2012 and all client computers run Windows 8 Pro.
All users in the Sales department are members of a global security group named Sales. A user
Sales named Jane uses a client computer named ABC-Sales03.
Jane creates a folder on her computer named C:\Sales. She configures the NTFS permissions to
grant Allow – Read permission to the Everyone group and Allow – Modify permission to the Sales
group.
Jane shares the C:\Sales folder and grants the Allow – Read share permission to the Everyone
group and the Allow – Full Control share permission to the Sales group.
A user named Mia is a member of the Sales group.
Mia accesses the \\ABC-Sales03\Sales folder over the network.
What permission does Mia have on the shared folder?

Which of the following are the minimum steps required to share the folder and grant the required access?

You work as a desktop technician at ABC.com. The ABC.com network consists of an Active
Directory Domain Services (AD DS) domain named ABC.com. All servers run Windows Server
2012 and all client computers run Windows 8 Pro.
A user Sales named Jane uses a client computer named ABC-Sales03.
Jane has a folder on her computer named C: \SalesTotals.
The NTFS permissions on the C: \SalesTotals are shown in the following table:

Group or User NamePermission
ABC\JaneFull Control
Jane wants to share the C: \SalesTotals folder and grant members of a global security group
named Managers read access to the folder.
Which of the following are the minimum steps required to share the folder and grant the required
access? (Choose all that apply).

What should you include in your solution?

You work as a desktop technician at ABC.com. The ABC.com network consists of an Active
Directory Domain Services (AD DS) domain named ABC.com. All servers run Windows Server
2008 R2 and all client computers run Windows 8 Pro.
All servers and client computers use IPv4 and have IPv6 disabled.
Sales users often work away from the office. The Sales users require access to internal network
resources when they are away from the office.
You need to recommend a solution for providing the required access.
What should you include in your solution?

Which two of the following actions should you perform?

You work as a desktop technician at ABC.com. The ABC.com network consists of an Active
Directory Domain Services (AD DS) domain named ABC.com. All client computers run Windows
8 Enterprise.
You store files on a Windows 8 Enterprise desktop computer named ABC-Data1.
You need to expand the hard disk capacity of ABC-Data1.
You install three new 4TB (terabyte) disks in ABC-Data1.
You want to configure the three new disks as a single 12TB volume. Your solution must maximize
the usable disk space.
Which two of the following actions should you perform? (Choose two).

Which of the following solutions would implement two-factor authentication?

You work as a desktop technician at ABC.com. The ABC.com network consists of an Active
Directory Domain Services (AD DS) domain named ABC.com. All servers run Windows Server
2012 and all client computers run Windows 8 Enterprise.
The company has asked for improved security when logging on to the network. A new company
security policy states that logging in to the network should use two-factor authentication.
Which of the following solutions would implement two-factor authentication?

How can you provide Clive with the Bitlocker recovery key to access his E: drive?

You work as a desktop technician at ABC.com. The ABC.com network consists of an Active
Directory Domain Services (AD DS) domain named ABC.com. All servers run Windows Server
2012 and all client computers run Windows 8 Enterprise.
All client computers are configured with a disk configured a drive E. On all client computers, drive
E: is encrypted with BitLocker Drive Encryption and the recovery passwords stored in Active
Directory.
A user named Clive works in the Sales department.
Clive reports that he has forgotten the BitLocker password and is unable to access drive E: on his
computer.
How can you provide Clive with the Bitlocker recovery key to access his E: drive?