You need to ensure that Endpoint Protection automatically downloads the latest available malware definition
HOTSPOT
You have Windows 8.1 Enterprise client computers. All of the computers are managed by using Microsoft
System Center 2012 Configuration Manager.
You enable Microsoft System Center 2012 Endpoint Protection on the computers.
You need to ensure that Endpoint Protection automatically downloads the latest available malware definition
updates when unidentified malware is detected on the computers,
What should you configure? (To answer, select the appropriate option in the answer area.)
You need to make it possible for the employee to use Windows Mobility Center on the laptop
You support Windows 8.1 Pro laptops that are part of a workgroup.
An employee is unable to start Windows Mobility Center on his laptop.
You need to make it possible for the employee to use Windows Mobility Center on the laptop.
What should you do?
Which policy setting should you use?
HOTSPOT
You support Windows 8.1 Enterprise desktop computers. One computer is a member of a workgroup and is
used as a guest computer in a reception area.
You need to configure the Windows SmartScreen setting to require administrator approval before running
downloaded unknown software on the desktop computer.
Which policy setting should you use? (To answer, select the appropriate object in the answer area.)
Which three criteria should you identify?
Your network contains Windows 8.1 Enterprise client computers. The computers are members of an Active
Directory domain.
Your company purchases a subscription to Windows Intune.
Synchronization between Active Directory and Windows Intune is not configured.
You enroll all of the computers in Windows Intune.
You plan to create groups that contain the computers by using dynamic membership.
You need to identify which criteria you can use to populate the groups dynamically.
Which three criteria should you identify? (Each correct answer presents a complete solution. Choose three.)
What should you identify?
HOTSPOT
Your company has several Windows RT 8.1 devices. The devices connect to Exchange Online in Microsoft
Office 365 and to Windows Intune for device management.
The security policies of Office 365 and Windows Intune are configured as shown in the following table.
You need to identify the effective settings on the Windows RT devices.
What should you identify? (To answer, select the appropriate effective configuration for each setting in the
answer area.)
You need to uninstall a Microsoft update that was installed before the Windows Intune agent was installed
You have client Windows 8.1 Enterprise computers.
Your company purchases a subscription to Windows Intune.
You deploy the Windows Intune agent to all of the computers.
You need to uninstall a Microsoft update that was installed before the Windows Intune agent was installed.
The solution must minimize administrative effort.
What should you do?
You need to ensure that the settings are synchronized
You have a Windows 8.1 Pro desktop computer and a Windows RT 8.1 mobile device.
You sign in to the computer and the device by using the same Microsoft account.
You discover that the settings are not being synchronized between the Windows 8.1 computer and the
Windows RT 8.1 device,
You need to ensure that the settings are synchronized.
What should you do first?
You need to create an App-V package for Office 365 ProPlus
Your network contains an Active Directory domain and 100 Windows 8.1 client computers.
All software is deployed by using Microsoft Application Virtualization (App-V) 5.0.
Users are NOT configured as local administrators,
Your company purchases a subscription to Microsoft Office 365 that includes Office 365 ProPlus.
You need to create an App-V package for Office 365 ProPlus.
What should you do?
Which technology should you recommend for each application?
HOTSPOT
Your company has client computers that run either Windows XP or Windows 7.
You plan to deploy Windows 8.1 Enterprise to all of the computers.
You plan to deploy the applications shown in the following table.
You need to recommend the appropriate technology to deploy each application. Each solution must ensure
that the users can access all of the applications. The solution that uses the least amount of system resources
must be selected, whenever possible.
Which technology should you recommend for each application? (To answer, select the appropriate technology
for each application in the answer area.)
You need to recommend a solution that prevents this warning message from appearing, without compromising the s
You are a systems administrator for your company. The company has employees who work remotely by using
a virtual private network (VPN) connection from their computers, which run Windows 8 Pro. These employees
use an application to access the company intranet database servers. The company recently decided to
distribute the latest version of the application through using a public cloud.
Some users report that every time they try to download the application by using Internet Explorer, they
receive a warning message that indicates the application could harm their computer.
You need to recommend a solution that prevents this warning message from appearing, without
compromising the security protection of the computers.
What should you do?