How should you deploy ABC-App4?
Your role of Systems Administrator at ABC.com includes the management of the Windows Server
2012 servers and the Windows 8 client computers. The network network consists of an Active
Directory Domain Services (AD DS) domain named ABC.com. All users log on to their client
devices using domain user accounts.
The company plans to issue new tablet devices that run Windows 8 Enterprise. You will configure
the tablets for external access to the corporate network using DirectAccess.
Company users use an application named ABC-App4. You need to choose a deployment method
for ABC-App4. The SSD (solid state drive) space used on the tablets by ABC-App4 must be
minimized and the application must be isolated from other applications running on the tablets.
ABC-App4 must run without requiring a connection to the company server infrastructure.
How should you deploy ABC-App4?
Which setting should you configure in the Windows Intune Agent Policy?
Your role of Systems Administrator at ABC.com includes the management of the Windows Server
2012 servers and the Windows 8 Enterprise client computers. The network network consists of an
Active Directory Domain Services (AD DS) domain named ABC.com. All users log on to their
client devices using domain user accounts.
The client computers have antimalware applications from various vendors installed. The company
wants to standardize on a single antimalware solution.
The company has recently purchased a Windows Intune subscription.
You want to deploy Intune Endpoint Protection on the client computers and ensure it runs on all
computers. You plan to deploy a Windows Intune Agent Policy.
Which setting should you configure in the Windows Intune Agent Policy?
How can you ensure that all critical updates are automatically approved and made available to the computers?
Your role of Systems Administrator at ABC.com includes the management of the Windows 8
laptops and tablets.
You will use a recently purchased Windows Intune subscription to manage the Windows 8
devices. All Windows 8 devices have been added to device groups in Windows Intune.
You want to deploy Windows Updates to all the Windows 8 devices by using Windows Intune.
You log in to the Windows Intune portal and create a new automatic approval rule for Windows
Updates. You select the option to apply all critical updates and you select the All Computers
group to apply the updates to.
You discover that some critical updates currently in the system have not been approved and made
available to the computers.
How can you ensure that all critical updates are automatically approved and made available to the
computers?
How can you reduce the time it takes for Mia to launch App-V applications?
You work as a desktop technician at ABC.com. The ABC.com network consists of an Active
Directory Domain Services (AD DS) domain named ABC.com. All servers run Windows Server
2012 and all client computers run Windows 8 Enterprise.
The company has an Application Virtualization (App-V) infrastructure. All client computers have
the App-V client installed and run multiple App-V applications.
All users in the Sales department have roaming profiles. A new user named Mia works in the
Sales department.
Mia reports that it takes a long time open App-V applications on her computer. You confirm that
locally installed applications launch quickly on Mia’s computer.
How can you reduce the time it takes for Mia to launch App-V applications?
What should you do next?
You work as a desktop technician at ABC.com. The ABC.com network consists of an Active
Directory Domain Services (AD DS) domain named ABC.com. All servers run Windows Server
2012 and all client computers run Windows 8 Enterprise.
You will use a recently purchased Windows Intune subscription to manage the Windows 8
devices.
Computers in the Research department often contain sensitive information. You want to monitor
file and program activity on computers in the Research department. You add the Research
department computers to a Windows Intune device group named ResearchPCs.
What should you do next?
Which two of the following actions should you perform?
You have two computers at home. One is a laptop computer and one is a tablet computer. Both
devices run Windows 8 Pro.
The laptop is named Win8Lap and is a member of a workgroup named HOME. The tablet is
named Win8Tab and is a member of a HomeGroup.
You log in to Win8Lap using a local user account. You log in to Win8Tab using a Microsoft
account.
You use Internet Explorer to visit websites. Passwords required by the websites are saved when
you visit the websites on Win8Tab. When you visit the same websites on Win8Lap, you are
prompted to enter the passwords.
You want the saved passwords on Win8Tab to be synchronized to Win8Lap.
Which two of the following actions should you perform? (Choose two).
How can you replace the recovery partition in your Windows 8 Image with your DaRT Recovery Image?
You work as a desktop technician at ABC.com. The ABC.com network consists of an Active
Directory Domain Services (AD DS) domain named ABC.com. All servers run Windows Server
2012 and all client computers run Windows 8 Enterprise.
You are modifying a Windows 8 Enterprise image to deploy to 100 new computers.
You want to include a bootable recovery partition in the image that will enable you to connect to
the computer using a Remote Desktop connection when the computer is booted into the recovery
partition.
You plan to use Microsoft Diagnostics and Recovery Toolset (DaRT) to create a recovery image.
You run the DaRT Recovery Image Wizard and create a recovery image named Win8RecImg.ISO.
How can you replace the recovery partition in your Windows 8 Image with your DaRT Recovery
Image?
Which two policy settings must be configured to enable the MBAM Client BitLocker encryption management?
You work as a desktop technician at ABC.com. The ABC.com network consists of an Active
Directory Domain Services (AD DS) domain named ABC.com. All servers run Windows Server
2012 and all client computers run Windows 8 Enterprise.
You plan to deploy Microsoft BitLocker Administration and Monitoring (MBAM) to manage
Bitlocker on the client computers.
You configure MBAM on a server and deploy the MBAM Client software to all Windows 8
Enterprise computers.
You now need to configure the MBAM Services Group Policy settings.
Which two policy settings must be configured to enable the MBAM Client BitLocker encryption
management? (Choose two)
Which of the four Windows Intune policies should you configure to enforce the password settings?
You work as a desktop technician at ABC.com. The ABC.com network consists of an Active
Directory Domain Services (AD DS) domain named ABC.com. All servers run Windows Server
2012 and all client computers run Windows 8 Enterprise.
The company has a Microsoft Exchange email infrastructure. Users use the Mail app to access
their Microsoft Exchange mailboxes.
You will use a recently purchased Windows Intune subscription to manage the Windows 8 devices
and the Microsoft Exchange infrastructure.
You need to configure Windows Intune to enforce security settings on the Windows 8 devices that
include password length, password expiration and password history.
Which of the four Windows Intune policies should you configure to enforce the password settings?
What should you configure?
You work as a desktop technician at ABC.com. The ABC.com network consists of an Active
Directory Domain Services (AD DS) domain named ABC.com. All servers run Windows Server
2012 and all client computers run Windows 8 Enterprise.
You have recently configured an Application Virtualization (App-V) infrastructure. All client
computers have the App-V client installed.
You plan to deploy an App-V application to computers in the Sales department.
You need to configure the Application Virtualization (App-V) infrastructure to ensure that Sales
users can only run the App-V application when their computers are connected to the network.
What should you configure?