You need to prevent users from using Microsoft Store apps on their computer.
You have several computers that run Windows 10. The computers are in a workgroup. You need to prevent users from using Microsoft Store apps on their computer. What are two possible ways to achieve the goal? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point. A. From Security […]
Which settings should you modify?
You have a computer named Computer1 that runs Windows 10. You need to configure User Account Control (UAC) to prompt administrators for their credentials. Which settings should you modify? A. Administrators Properties in Local Users and Groups B. User Account Control Settings in Control Panel C. Security Options in Local Group Policy Editor D. User […]
You need to ensure that you can recover the BitLocker recovery key for the computers from Azure AD.
You have several computers that run Windows 10. The computers are in a workgroup and have BitLocker Drive Encryption (BitLocker) enabled. You join the computers to Microsoft Azure Active Directory (Azure AD). You need to ensure that you can recover the BitLocker recovery key for the computers from Azure AD. What should you do first? […]
You have 20 computers that run Windows 10. The computers are in a workgroup.
You have 20 computers that run Windows 10. The computers are in a workgroup. You need to create a local user named Admin1 on all the computers. Admin1 must be a member of the Remote Management Users group. What should you do? A. From Windows Configuration Designer, create a provisioning package, and then run the […]
Which three user profiles will persist after each user signs out? Each correct answer presents part of the sol
You have a computer named Computer1 that runs Windows 10. On Computer1, you create the local users shown in the following table. Which three user profiles will persist after each user signs out? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point. A. User1 B. User2 C. User3 […]
What is the effect of importing the file?
You have a file named Reg1.reg that contains the following content. What is the effect of importing the file? A. A key named command will be renamed as notepad.exe. B. In a key named Notepad, the command value will be set to @=”notepad.exe”. C. In a key named command, the default value will be set […]
Which Group Policy settings should you modify?
Your network contains an Active Directory domain. The domain contains 1,000 computers that run Windows 10. You discover that when users are on their lock screen, they see a different background image every day, along with tips for using different features in Windows 10. You need to disable the tips and the daily background image […]
You need to log which user reads the contents of the folder and modifies and deletes files in the folder.
You have a computer named Computer1 that runs Windows 10. The computer contains a folder. The folder contains sensitive data. You need to log which user reads the contents of the folder and modifies and deletes files in the folder. Solution: From the properties of the folder, you configure the Auditing settings and from the […]
You need to log which user reads the contents of the folder and modifies and deletes files in the folder.
You have a computer named Computer1 that runs Windows 10. The computer contains a folder. The folder contains sensitive data. You need to log which user reads the contents of the folder and modifies and deletes files in the folder. Solution: From the properties of the folder, you configure the Auditing settings and from Audit […]
You plan to deploy Windows 10 to 100 secure computers.
You plan to deploy Windows 10 to 100 secure computers. You need to select a version of Windows 10 that meets the following requirements: ⦁ Uses Microsoft Edge as the default browser ⦁ Minimizes the attack surface on the computer ⦁ Supports joining Microsoft Azure Active Directory (Azure AD) ⦁ Only allows the installation of […]