Which two authentication methods should you choose?
A company has client computers that run Windows 8.
The company implements the following security requirements:
– All client computers must use two-factor authentication.
– At least one authentication method must include exactly four characters or gestures.
You need to choose authentication methods that comply with the security requirements.
Which two authentication methods should you choose?(Each correct answer presents part of the solution.
Choose two.)
You need to ensure that only the Intune Endpoint Protection application is running on all computers
You administer laptop and desktop computers that run Windows 8 Enterprise in an Active Directory domain.
Your company has purchased a subscription to Windows Intune.
You plan to install Intune Endpoint Protection on all computers. Some of the computers also have another
antimalware application installed.
You need to ensure that only the Intune Endpoint Protection application is running on all computers.
What should you do?
Which two authentication methods should you choose?
A company has client computers that run Windows 8.
The company implements the following security requirements:
– All client computers must use two-factor authentication.
– At least one authentication method must include more than four characters or gestures.
You need to choose authentication methods that comply with the security requirements.
Which two authentication methods should you choose?(Each correct answer presents part of the solution.
Choose two.)
You need to ensure that all previously existing updates are automatically approved
Your company has purchased a subscription to Windows Intune. You use Windows Intune to automatically
deploy Windows updates.
You create an automatic approval rule in Windows Intune but, notice that previously existing updates are not
deployed.
You need to ensure that all previously existing updates are automatically approved.
What should you do?
Which permissions should you set?
Your computer runs Windows 8 and is connected to anActive Directory Domain Services (AD DS) domain.
You create a folder and share the folder with everyone in your organization.
You need to modify the NTFS permissions of the folder to meet the following criteria:
– Users from the Supervisors AD security group must be able to open files, but not modify them.
– Users from the Marketing AD security group must be able to create, modify, and delete files.
– Users from both groups must not be able to delete the folder.
Which permissions should you set?
You need to minimize the time that is required for the user to start App-V applications on the computer
You administer computers that run Windows 8 Pro. The desktops have the Application Virtualization (App-V)
client installed. Multiple App-V applications are published on the network.
A user reports that it is taking a long time to launch App-V applications on his computer. You discover that the
user has a roaming profile on the computer.
You need to minimize the time that is required for the user to start App-V applications on the computer.
What should you do?
Which permission should you grant to the Sales group?
A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8.
A local printer is shared from a client computer. The client computer user is a member of the Sales ADsecurity
group.
You need to ensure that members of the Sales security group can print to the shared printer and modifyonly
their own print jobs.
Which permission should you grant to the Sales group?
You need to ensure that file and program activity is always monitored on this computer
You administer a company network that includes computers that run Windows 8 Enterprise in an Active
Directory domain. The company has purchased a subscription to Windows Intune.
Corporate security policy requires that computers in the accounting department have file and program activity
logged. A user in the accounting department uses a computer that is managed by Windows Intune.
You need to ensure that file and program activity is always monitored on this computer.
What should you do?
Which setting should you configure on the home computers?
A company has client computers that run Windows 8.
The client computers are connected to a corporate private network.
Users are currently unable to connect from their home computers to their work computers by using Remote
Desktop.
You need to ensure that users can remotely connect to their office computers by using Remote Desktop.
Users must not be able to access any other corporate network resource from their home computers.
Which setting should you configure on the home computers?
Which two actions should you perform?
You have computers that run Windows 8 Enterprise. Microsoft BitLocker Administration and Monitoring
(MBAM) is deployed on your network on a server named MBAM1.
Company policy requires that within 2 hours of being started, computers that have the MBAM client installed
prompt users to enable BitLocker.
You need to make changes to the Configure MBAM Services Group Policy settings.
Which two actions should you perform?
(Each correct answer presents part of the solution.Choose two.)