0 ratings 0% found this document useful (0 votes) 57 views 126 pages MD 100
The document outlines a case study for an exam involving a distribution company, Fabrikam, Inc., which has various technical and operational challenges related to their IT infrastructure, including issues with Active Directory, VPN connections, and Windows activation. It details the existing environment, security policies, and specific problem statements, as well as the technical requirements needed to address these issues. Additionally, it includes a series of questions related to the case study that test the reader's understanding of the material presented.
AI-enhanced title and description
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, 
claim it here .
Available Formats
Download as PDF or read online on Scribd
Go to previous items Go to next items 
Testi +
Case Study
‘This is a case study. Case studies are not timed seperately. You can use as much exam times a3 you
‘would like to complete each case. However, there may be additonal studies and sections on this exam. You
‘must manage your time lo ensure that you are able i complete all questions included on thes exam in the time,
provided.
‘To answer ne questions included in a case study, you wl need 10 reference information thats provided in he
‘case study. Case studies might contain exhibts and other resources that provide more information about the
‘Scanano that described in the case stidy Each question is independent of tha Other questions in this case
study.
‘Atte end ofthis case study, a review screen wil appear. This screen allows you to review your answers and to
‘make changes before you move to the nex! section ofthe exam. After you begin & new secton, you cannot
totum tots section.
To start the case study
To display he fist question in this case study, click the Next button. Use the butions in the lft pane to explore
the content of te case study before you answer the questions. Clicking these buttons ctsplays information such
‘a3 business requirements, existing envionment. and problem statements, When you ere ready fo answer
‘question, cick the Question bution fo return to the question.
Overview
Existing Environment
Fabrkam, Inc. is a distibuton company that has 500 employees and 100 contractors.
‘Active Directory
“The network contains an Active Directory forest named fabrikamn com. The forest is synced to Microsoft Azure
‘ative Deectory (Azure AD), All the employees are assigned Microsoft 365 E3 licenses,
‘The domain contains a user account for an employee named Usert0.
Client Computers
Al the employees have computers that run Windows 10 Enterprise. Allthe computers are instatled without
‘Volume License Keys. Windows 10 icense keys are never issued.
‘Allthe employees register their computer to Azure AD when they first receive the computer.
Usert0 has a computer named Computert0.
‘Al contractors have ther own computer tat une Windows 10, None othe compen ae jned Ane
Operations! Procedures
Fabrkam has the following operational procedures:
+ Updates are deployed by using Windows Update for Business.
*+ When new contractors are hired, administrators must help the contactors configure the following settings on
their computer
- Veet caricane
= Browser securty and proxySecurity policies
The folowing security palicies are enforced on al the clent computers in the domain:
+ Ailthe computers are encrypted by using BitLocker Drive Encryption (BitLocker). BitLocker recovery
Information is stored in Active Directory and Azure AD.
+ The local Administrators group on each computer contains an enabled account named LocalAdmin.
+ The LocalAdmin account is managed by using Local Administrator Password Soluton (LAPS).
Problem Statements
Fabekam donthos the following 1su0s.
+ Employees inthe finance department use an application named Application. Appicatont frequently
crashes due to @ memory error. When Applicaton? crashes, an event is wnitien to te application log and an
‘administrator runs @ sort o delete the temporary fles and restart fre application.
+ When employees attempt to connect to the network from thew home computer, they often cannot establish
a VPN connection because of misconfigured VPN settings.
+ An employee has a computer named Computer. Computer! 1 has a hardware failure that prevents the
‘cemeuter from 1p the network.
+ Usert0 reports tht Computert0 is not activated.
Technical requirements,
Fabrikam identfies the folowing technical requirements for managing the client computers:
Provide employees with a configuration file to configure their VPN connection.
Use the minimum amount of admastranve efter to implement the techrwcal requirements.
dent which employees’ computers are noncompliant with the Windows Update baseline of the company
Ensure that the service desk uses Quick Assist to take remote control of an employee's desktop during
‘support cals.
* Automate the contiguratton of the contractors" computers. The soluton must provide @ configuration fie tat
‘the contractors con open from a Microsoft SharePoint sie to apply the required configurations.
QUESTION 1
HOTSPOT
‘You need to implement a sokuton to configure the contractors’ computers.
‘What should you do? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worh one point.
Hot Arwa:Tool to use: ¥
‘Microsoft Deployment Toolkit (MDT)
Windows AutoPilot
 
 
‘Section: {none}
Explanation
Explanation/Reterence:
 
QUESTION 2
‘You need to ensure that User10 can activate Computer 10.
‘What shoud you do?
‘A. Request that a Windows 10 Enterprise conse be assigned to User10, and then activate Computeri0.
8. From the Microsoft Deployment Toolkt (MDT), add a Volume License Keyto a task sequence, and then
‘edaploy Computer10.
C. From System Properties on Computer10, enter a Volume License Key, and then actvate Computert0.
D_ Request that User10 perform a local AutoPilot Reset on Computer'0, and then activate Computert0.
Answer: O
Sapo
ExplanationTostlet 2
Case Study
‘This is a case study. Case studies are not timed separately, You can use as much exam times as you
‘would like to complete each case. “However, theco may be additonal studies and sectons on this exam You
‘must manage your time io ensure that you are able fo complete all questions included on this exam in the time
provided.
‘To answer the questions included in a case study, you wil need 1D reference Information at's provided in the
case study. Case studies might contain exhibits and other resources that provide more information about the
‘scenario that's deserved in the case study. Each question is independent of the other questions inthis case
study.
‘At the end of this case study, a review screen wal appear. This screen allows you to review your answers and to
make changes belore you move foe next vecton of te exam. Afar you bap a new secon, yu cannot
‘retun to this section.
Tostart the case study
‘To display the frst question in this case study, cick the Next button. Use the butions in the lft pane to explore
the content of the case study before you answer the questions. Clicking these buttons displays information such
{85 business requirements, existing environment. and problem statements. When you are ready 10 answer &
‘question, cick the Question bution to retum to the question.
Overview
Cototo, Li. ea corauting company et hes a main oes in Monreal and wo branch ofices in Seale
 
CContoso has IT, human resources (HR), and finance departments.
‘Contoso recenty opened a new branch office in San Diego. Al the users in the San Diego office work from
Existing environment
Contoso uses Microsoft 365.
‘The on-premises network contains an Active Directory domain named contoso.com, The domain is synced 12
‘Microsoft Azure Active Directory (Azure AD).
‘All computers run Windows 10 Enterprise.
‘You have four computers named Computer’, Computer2, Computers, and ComputerA. ComputerA is in
workgroup on an isolated network segment and runs the Long Term Servicing Channel version of Windows 10.
Computer connects to 3 manufacturing system and is business ertical All the other computers are joined to
the domain and run the Semi-Annual Channel version of Windows 10.
Inthe domain, you create four groups named Group!, Group2, Groups, and Groups.
‘Computer? has the local Group Policy setings shown in the fllowing table.
_Security Setting.
| Growp!
: es
‘Groups
‘Deny log on through Remote Desktop Serviees ‘Groups‘The computers are updated by using Windows Update for Business.
‘The domain has the users shown in the folowing table.
 
 
 
 
 
 
Name Member of
User! Domain Admins, Domain Users
User2 Administrators, Domain Users
User3 Account Operators, Domain Users
User4 Domain Users
User5S Domain Users, Guests
User6 Group2, Group3, Domain Users
 
 
 
‘Computert has the local users shown in the following table.
 
 
Planned Changes
Contoso plans to purchase computers preinstalled with Windows 10 Pro forall the San Diego office users.
‘Technical requirements
Contoso identiies the following technical requirements:
+ The computers in the San Diego offce must be ungraded aulomaticaly to Windows 10 Enterpisa and must
‘be joined to Azure AD the frsl ine a user stats each new computer. End users must not be required to
‘accept he End User License Agreement
* Helpdesk users must be atte 0 Foutdeshoot Group Puy fet (GPO) procesing on tw Widows 10
j
|
i
i
i
Hi
Hi
i
ti
:
:
ut
in
I
ie
QUESTION 1
‘You need to meet the technical requirements for the San Diego office computers.
‘Which Windows 10 depioyment method should you use?‘A. wie and load refresh
B. inplace upgrade
C. provisioning packages
D. Windows Auton
Correct Answer: D
QUESTION 2
HOTSPOT
‘You need to meet the technical requirement for Computert
What should you 407 To answer, select the appropriate options inthe answer area.
NOTE: Each correct selection is wort one point.
Hot Area:
Answer Area
User who should corfiqure assigned access:
Configure assigned access for.
 
\Usert2
lUsert3Answer Area
User who should confiqure assigned access | vQuestion Set 3
Seana mee greene et 2 rg ew Wrst
‘You discover that none of the computers are activated.
carte a ge
Scapa gaan oT
‘A. Volume Activation Management Tool (VAMT)
B. Key Management Service (KMS)
C. Active Directory.based activation
D. the Get.WindowsDeveloperticense cmdiot
Correct Answer: 8
Section: {none}
Explanation
bites. idocs.microsof com/en-us/windows/daployment/voh.zne-activaticn/activate-sting-key-managnment-
service-vamt
QUESTION 2
You plan to deploy Windows 10 to 100 secure computers.
‘You need to select a version of Windows 10 that meets the folowing requremerts:
Uses Microsoft Edge as the default browser
Minimizes the attack surface on the computor
‘Supports joining Microsoft Azure Active Directory (Azure AD)
(On allows the installation of applications trom the Microsoft Store
What isthe best version to achieve the goal? More than one answer choice may achieve the goal. Select the
BEST answer
A. Windows 10 Pro in S mode
B. Windows 10 Home in S mode
©. Windows 10 Pro
D. Windows 10 Enterprise
Correct Answer:
Section: [none]
Explanation
Explanation Reference:
References:
bites hme microsoft com'en-za/windows/compare
QUESTION 3
DRAG DROP
You have 8 computer named Computer! that runs Windows 7. Computer1 has a local user named User! who
has @ customized profile.‘On Computer , you perform a clean installation of Windows 10 without formatting the drives.
‘You need to migrate the settings of Usert from Windows7 to Windows 10.
‘Which two actions should you perform? To answer. drag the appropriate actions to the correct targots. Each
‘sco may be used once, more then once, or not at al. You may need ora te pl bar between pene cr
NOTE: Each correct selection Is wort one point
‘Select and Place:
Actions Ammer Anes
Ti veartabe veal weed theses] ist acion: al
wile,
a
Rin awake adel lec)
“Windows ald vabéoizer
‘an tocctate one and geste)
Winders 0:5 abtolscr
‘Rom certs exe ml epecly de @ Veer |
‘setfolter
‘Windows ol sebfe'ser
Correct Answer:
Actions Amowes Ares
Tin vacate read weciieCDen) — Tietacion: [Rex wana md pel Ge Care
sith waiter
‘Kas fatal exe a ypily Ue Cece Ram lene ce md aeclth a OI
wenteer peccad assem abfolde.
Ra memcinew alge lee |
“Wiedowy ald whfo4er
 
QUESTION 4
Note: This question Is part of a series of questions that present the same scenario. Each question inthe series contains a unique solution that might meet the stated goals. Some question sets might have
‘more than one correct solution, while others might not have a correct solution.
‘After you answer @ question in this section, you will NOT be able 10 return to R. As 8 result, these
questions will not appear in the review screen.
‘You have a computer named Computer! that runs Windows 10.
‘Aservice named Application’ Is configured as shown in the exnibit,
 
© bec Syme court
Nog eracets etaract win sakace
 
@Derconre Service!
 
 
 
 
 
 
 
 
‘You discover that a user used the Service’ account to sign into Computer! and deleted some fies.
‘You need to ensure thatthe identty used by Application! cannot be used by @ user to signin to sign into the
‘desktop on Computer. The soksion must use the principle of least priviege.
‘Sclution: On Computer’, you configure Application! to sign in as the LocalSystem account and select the Allow
‘service to interact wih desktop check box. You delete the Service! account.
‘Does this meet the goat?
A Yes
8. No
Correct Answer: B
‘Section: [none]
ExplanationExplanation/Roference:
QUESTION 5
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sats might have
‘more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to It. As a result, these
questions will not appear in the review screen,
‘You have a computer named Computer! that runs Windows 10.
‘Aservice named Application? is configured as shown in the exhibit.
 
‘You discover that a user used the Service? account to sign in to Computer! and deleted some fies.
‘You need to ensure thatthe kent wsed by Applicaton’ cannot be used by a user to sign into signin tothe
desktop on Computer. The sohuton must uae the principe offeast prope.
‘Solution: On Computer, you assign Servicet the deny log on locally user right.
‘000s this meet the goa?
A YesQUESTION 6
\Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might have
_more than one correct solution, while others might not have a correct solution.
‘After you answer a question in this section, you will NOT be able to return to it. As a result, these
‘questions will not appear in the review screen.
‘You have @ computer named Computer! that runs Windows 10.
‘A service named Application! is configured as shown in the exhibit.
 
Now eevee s tert wth descr |
@Dercart Senet (ee)
Bremer seeeeeee
 
(Corea)
‘You discover that a user used the Service? account to sign into Computer! and deleted some fies.
‘You need to ensure that the kdentty used by Application! cannot be used by 8 user to signin to sign in to the
desktop on Computer’. The soluton must use the principle of least privilege.You have a Microsoft Azure Active Drectory (Azure AD) tenant.
‘Some users signin to their computer by using Windows Hello for Business.
‘A.user named Usert purchases a new computer and joins the computer to Azure AD.
Usert attempts to configure the signin options and receives the error message shown in the exhibit
Sign-in options
“Some setings are hidgen or managed by your ergenization
YY
‘Sign into Wedows, apps and services by teaching
Wdows to recognize you.
Wrdows Hetp nt avaliable on tha dove
 
‘Som ho works and fed Comrie a
You open Device Manager and confirm that all the hardware works correctly
You need to ensure that User can use Windows Hello for Business facial recognition to sign into the
‘computer
What should you do frst?
‘A. Purchase an infrared (IR) camera.
8. Uporade the computer to Windows 10 Enterprise.
C. Enable UEF! Secure Boot.
D. Install a virtual TPM river.
Correct Answer: 8
Section: [none]
ExplanationExplanation/Reference:
References:
‘ntips//docs microsol. comion ss wincows!secunty/sentty-protectiorvheto-or-bysinessheto-planning quite
QUESTION s
‘Your company uses Microsoft Deployment Toolit (MOT) to deploy Windows 10 to new computers.
‘The company purchases 1,000 new computers.
‘You need to ensure that the Hyper-V feature 's enabled on the computers during the deployment,
‘What are two possible ways to achieve the goal? Each correct answer presents part of the soliton.
NOTE: Each correct selection is worth one point
A. Add a task sequence stop that adds a provisioning package.
B. Ina Group Policy object (GPO), from Computer Configuration, configure Application Control Policies.
C. Add a custom command to the Unatiend.xmi fie.
1D. Add a configuration sting to Windows Deployment Services (WDS).
E. Add a task sequence stop that runs dism.exe.
QUESTIONS
ae er concre on Ace Decay omen at i pec wo 0 Miron ae Are Dwyer
‘Your company purchases a Microsoft 365 subscription.
‘You need to migrate ine Documents folder of users to Microsoft OneOrive for Business.
‘What shoud you configure?
‘A. One Drive Group Policy stings
8. roaming user profes
C. Enterprise State Roaming
D. Folder Redirection Group Polcy setings.
 
QUESTION 10
‘Your network contains an Active Directory domain. The domain contains a user named User’.Usert creates a Microscft account.
User needs to sign into cloud resources by using the Microsoft account without being prompted for
‘credentials.
Which settings should Usert configure?
‘A. User Accounts in Control Panel
88. Emal & app accounts in the Settings aco
CC. Users in Computer Management
. Users in Active Drectory Users and Computers
Correct Answer: B
‘Section: [none]
Explanation
Exptanation/Reterence:
References
hitosu/suoport microsoft com/en-zafheln/402819Simerost-account-how-to-sian-n
QUESTION 11
HOTSPOT
‘Your network contains an Active Directory domain named adatur.com that uses Key Management Service
(KMS) for activation.
‘You deploy a computer that runs Windows 1010 ihe domain.
‘The computer falls to activate.
‘You suspect that the activation server has an issue.
‘You need to idently which server hosts KMS.
How should you comolete the command? To answer, select the aperogriale cotions inthe answer area.
NOTE: Each correct selection is wort one point.
Hot Area:
Answer Area
Vv -lype VY _vimes _tep Adatum com
Get-Host p
nslookup. 6x8
ae twAnswer Area
 
You deploy Windows 10 to @ new computer named Computer’,
You sign in to Computert and create a user named Usert.
defaultLayout: TaskbarLayout>
taskbar: TaskbarPinList>
 
‘Whats the effect of the configuration? To answer. select the appropriate options in the answer area.
NOTE: Each correct selection is wort one point.
Hot Aros:
“Answer Area
‘Winn you sage in io Compete, te taskbar wt corer
‘Yimen User! sages into Comte, tn tashbna w corcutr,
 
Correct Answer:
Answer Area
‘When you sign ino Computert, tataskbar valicortan = | 7
Deesut anos and Wicrosot Pat
[Nicrosot Part oniy
‘When User! signs into Computer, the tashbar wel cortuin
 
Section: (none)
Explanation
Explanation/Reference:Tostt +
Case Study
‘This is a case study. Case studies are not timed separately. You can use as much exam times as you
‘would like to complete each case. However, there may be additonal studies and sections on this exam. You
‘must manage you time to ensure that you are able fo complete all questions included on this exam in the time
provided.
‘To answer the questions included in a case study, you wil need 10 reference information thats provided in he
‘case stuty. Case studies might contain exhibits and other resources that provide more information about the
‘scanano that described in the case study Each question is independent ofthe Other questions in ths case
study.
‘Atte end ofthis case study, a review screen wil appear. This screen allows you to review your answers and 10
‘make changes before you move to the nex! section of the exam. After you begin @ new section, you cannot
totum totus section.
To start the case study
To display the fist question in this case study, click the Next button. Use the butions in the lft pane to explore
the content of tie case study before you answer ihe questions. Clicking these buttons displays information such
‘83 business requirements, existing envionment. and problem statements, When you are ready to answer &
‘question, cick the Question bution to retum to the question.
Overview
Existing Environment
Fabrkam, Ic. is a distrbuton company that has 500 employees and 100 contractors.
‘Active Directory
“The network contains an Active Directory forest named fabrikamn com. The forest is synced to Microsoft Azure
‘ative Diectory (Azure AD), All the employees are assigned Microsoft 366 E3 licenses,
‘The domain contains a user account for an employee named Usert0.
Client Computers
All the employees have computers that run Windows 10 Enterprise. Allthe computers are insted without
‘Volume License Keys. Windows 10 icense keys are never issued.
‘Ailthe employees register their computer to Azure AD when they first receive the computer.
Usert0 has a computer named Computort0.
‘Alt corrects have ther own computer tat une Windows 10. None othe comers ae jad o Aze
Operational Procedures
Fabrikam has the following operational procedures:
+ Updates are deployed by using Windows Update for Business.
+ When new contractors are hired, administrators must help the contactors configure the folowing settings on
their computer:
- User certificates
+ Browser securty and proxy settings:
Wireless network connection settings.‘Security policies
‘The folowing security policies are enforced on al the cent computers inthe domain:
+ Allthe computers are encrypted by using BitLocker Drive Encryption (BitLocker). BiLocker recovery
lnformaton is stored in Active Directory and Azure AD.
+ The focal Administrators group on each computer contains an enabled account named LocalAdmin.
*+ The LocalAdmin account is managed by using Local Administrator Password Soluton (LAPS).
Problem Statements
Fabrkam kdentties the folowing issues:
*+ Employees in the finance department use an apgiication named Applicaton’. Applicaton! trequanity
‘crashes due to a memory error. When Appication? crashes, on events writen to fhe application lg and an
_acmministator runs a serpt to delete he temporary fles and restart te apptcation.
+ When employees attempt to connect to the network from few home computer. they often cannot establish
.2.VPN connection because of misconfigured VPN settings.
+ Rrempoyes hea compat names Compusert. Computer! has a harwere faire tht preverts he
‘computer from connecting 10 the network.
+ Usert0 reports that Computer is nok activated.
Technical requirements
FFabrkam Kdenthes the folowing technical requrements for managing the chent computers:
+ Provide employees with a configuration fle to configure thelr VPN connection.
* Use the minimum arsount of administrative effort to implement the tachnical requirements.
+ Identify which employees’ computers are noncompliant withthe Windows Update baseline of the company.
+ Ensure tale serve desk uses Quick Assit take remoe contel of an employee's ceston ng
+ Automate the configuration of the contractors’ computers. The solution must provide a configuration fle thot
the contractors can open from a Microsoft SharePont ste to apply the required configurabons.
‘A. From the LAPS Ul tool, view the administrator account password forthe computer object of Computer! 1.
1B. From Windows Configuration Designer. create a configuration package that sets the password of the
[LocalAdmin account on Computer,
C. Use a Group Policy object (GPO) to set the local administrator password.
©. From Microsott Intune, sat the password of the LocalAdmin account on Computer
Correct Answer: A
‘Section: [none]
i
2
An employee reports that she must perform a BitLocker recovery on her laptop. The employee dows not have,
‘her BitLocker recovery key but does have & Windows 10 desktop computer.
"What should you instruct the employee to do trom the destton computer?‘A. Run ithe manage-bde.exe ~status command
[BL From BitLocker Recovery Password Viewer. view the computor abject ofthe laptop
C. Gotohtips:taccount actvedirectory windowsazure.com and view the user account profile
D. Run the Enuble-BitLeckerkutouniock emdet
Correct Answer: C
‘Section: (none)
Explanation
Explanation/Reference:
Reterences:
‘toa Jionledonsartners,com/bloa/stofing-recovering-billocker-keya-azure-active-directory‘Tostlot 2
Case Study
‘This is a case study. Case studies are not timed separately. You can use as much exam times as you
‘would like to complete each case. However, there may be addlional studies and sections on this exam. You
‘must manage you time to ensure that you are ate io complete al questions included on that exam inthe ime
provided.
‘To answer the questions inchuded in a case study, you will need to reference information that is provided in the
‘case study. Case studies might contain exhibits and other resources that provide more information about the
‘scenano that 1s described in the case stidy Each question 1 independent of the other questons in ths case
study,
‘Atthe end ofthis case study, @ review screen wal appear. This screen allows you to review your answers and to
‘make changes before you move 1 the next section of the exam. After you begin @ new secon, you cannot
retum to this section.
To start the case study
‘To display the first question in this case study, cick the Next button. Use the buttons inthe left pane to explore
the content of the case study before you answer the questions. Ciiching these buttons displays information such
_as business requirements, existing envrorment. and problem statements. When you are ready to answer 8
‘question, cick the Question button to return to the question.
Overview
(Gztowo, Lid a conauteg company Bates a main ofice Montes and wo branch ofices in Seat and
Contoso has IT, human resources (HR), and france departments.
Contoso recenty opened a new branch offce in San Diego. All the users in the San Diego office work from
Existing environment
Conteso uses Microsoft 365.
‘The on-premises network contains an Active Directory domain named contoso.com. The domain is synced 12
‘Microsoft Azure Active Directory (Azure AD).
‘Ailcomputers run Windows 10 Enterprise.
Jn the domain, you create four groups named Group! Group2, Group, and Groups.
Computer? has the local Group Policy satings shown inthe following table,
 
 
 
‘Allow log on through Remote Desktop Services ‘Groups
Deny log on through Remote Desktop Services Groups‘The computers are updated by using Windows Update for Business.
‘The domain has the users shown in the folowing table.
 
 
 
 
 
 
 
Name Member of
User! Domain Admins, Domain Users
User2 Administrators, Domain Users
User3 Account Operators, Domain Users
User4 Domain Users
Users Domain Users, Guests
User6 Group2, Group3, Domain Users
 
 
‘Computert has the local users shown in the following table.
 
 
Requirements
Planned Changes
Contoso plans to purchase computers preinstalled with Windows 10 Pro for all the San Diego office users.
‘Technical requirements
‘Contoso identsies the folowing technical requrements:
+ The computers in the San Diego office must be upgraded aulomaticaly to Windows 10 Enterprise and mast
bbe joined to Azure AD the first ime a user starts each new computer. End users must not be required to
scoop he End User License Agwoment (EULA).
. users must be ate io robleshoot Group Policy otject (GPO) processing onthe Windows 10
‘computers. The helpdesk users must be able to Kantiy which
: SEER ik parameter Bo etna aw mane apron
: Gand mnie coir on Grargtng Fue tam (FS) rear Som
+ Giaky peat natatrs moat be dlrs song os ‘on Computer,
> Ges ln tue capmronont ent ne ops: eat to Sas prery
+ User$ must be able to connect to by Desktop.
+ The principle of least prvlege must be used whenever
+ Adminisiratve effort must be minmized whenever
+ Assigned access must be coniigured on Computer.
QUESTION 1
HOTSPOT
‘You need to meet the technical requirements for the helpdesk users,
‘What should you 0? To answer, select the appropriate options in the answer area.NOTE: Each correct selection is worth one point.
Hot Area:
Answer Area
‘Adi the Reip desk wsers 10:QUESTION 3
‘You need to meet the technical requirements for EFS on ComputorA.
‘What should you 0?
A. Run cortutil.exe, and then add a certificate to the local computer certificate store.
B. Run cipher.exe, and then add a cariicate to the local computer certificate store.
CC. Run cipher.exe. and then add a certificate to the local Group Policy.
. Run cortutiLexe, and then add a cortificate tothe local Group Policy.‘Question Sot 3
QUESTION 1
Note: This question is part of a series of questions that present the same scenario, Each question in
‘the series contains a unique solution that might meet the stated goals. Some question sets might have
more than one correct solution, while others might not have a correct solution.
‘Attar you answer a question in this section, you will NOT be able to return to it. As a result, these
{questions will not appear in the review scrven.
‘You have @ computer named Computer! that runs Windows 10. The computer contains a fokder. The folder
“contains sensitve data
‘You need to log which user reads the contents ofthe folder and modifies and delates thes in the folder.
‘Solution: From the properties of te folder, you configure the Auditing settings and from Aud Potcy in the
local Group Policy, you configure Audit object access.
‘Does this meet the goal?‘hitosuteww neterix.comMhow to detect who changed fle or folder owner him!
QUESTION 3
HOTSPOT
‘You have a computer named Computer 1 that runs Windows 10.
‘You turn on System Protection and create a restore point named Point.
‘You perform the following changes:
+ Add four files named Fae. nt, Fed, Fie. sys, and Flot axe to the desktop.
“ype ote Counc
‘You restore Point’.
Which fies and regisiry keys are removed? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is wort one point.
Hot Area:
Answer Ares
Removed files ¥
File2 dil only
File2 dll and File3 sys only
File2 dll, File3 sys, and Filed exe
1 tet, File? dil, File3 svs, and Filed eve)ee
‘dil only
and File3 sys o
File2 «
File2 dil,
File! txt, File2.dil, inestoca Govp Pee Eater
Ble action View Help:
++ 2miaiGalr
[i Turn off auto-restart notfications for update istallatons
al capers ss reer veped bolicecn for pis
Acs ven orn ea teQUESTION 5
“Your network contains an Active Directory domain. The doman contains 1,000 computers that run Windows,
10,
‘You discover that when users are on thei lock screen, they see a citferent background image every day, along
wit tps for using different features in Windows 10.
‘You reed to disable the bos and the dally background image for all he Windows 10 computers.
1D. Tum off all Windows spotight features
‘Correct Answer:
Section: [none]‘Fer addtional intormation, deuble-chck a permission enty. To mody » permassion entry, select the erry and cick Ect (if avndabie).
Permasion entries:
 
 
 
Type Piindpal hecess Inberted ho ‘Apples to
$B Alon Adminicnatrs (COMPUTER! Full contol None The flder subtler and thes
Mf stow syst Fut conte Neos Thi fede cubes and et
ME stow Ure (CONPUTER: rer) Rand Annet None ‘Theta ude anc et
| a aT
| Disable hertance:
CoPepace al cha yee pemasuen ere wth nbertable pemaiion etnies Hem th eect
Ca) [ove]
‘You share C:\Data as shown inthe folowing table.Usert is a member of the Users group.
_Aaministrators are assigned Full control NTFS permissions to C:\Data.
For each of the folowing statements, select Yes the statement is tue. Onverwise, select No.
NOTE: Each correct selection is wort one point.
Hot Area:
Answer Area
Statements Yes No
User] can read and write files when connected to () oe
\\Compater Data.
User] can read and write files in C:\Data locally.  C) Oo
Administrators can change the NTFS permissions (_) (®;
of files and folders when connected to
\\Compater!\Data.
Correct Answer:
Ansiver Area
Statements Yes No
‘Userl can read and write files when comectedto = (-)
\\Computer1\Data.
Userl can read and write files in C:\Data locally. () [S]
Administrators can change the NTFS permissions) )
of files and folders
\\Computer! Data.
Section: none]
Soplenaon
Explanation/Reterence:
Exptanaton
‘0 \Compster\Oat becouna Uners rou cry hes Rad &
Shecule NTFS pericion ote C\Dala Yer wd ere ar no enghea NTFS permanione fr
eat ceneot wet te neat because te User group ony has Reed & Execute NTFS pemieion oC:
\Data folter and there are no explicit NTFS permissions for
‘Administrators cannot chenge the NTFS permissions of fies and fokders when connected to WComputerf\Data
because they only have Change shave permission The would need Full Control ahare permission. They could
‘doit locally because they have Full Control NTFS permission.‘QUESTION?
‘You have a fhe named Reg! req that contains the folowing content.
Windows Registry Editor Version 5.00
[WKEY_CLASSES_ROOT\Directory\Sackground\ shel 1\Notepad)
[WxEy_cLass£s_Root\ Directory\Sackground\ shel 1\sotepad\ command)
@="notepad. exe”
‘What isthe effect of importing the fie?
‘A. Akey named command wil be renamed as notepad.exe.
8B. Ina key named Notepad, the command value wil be set to @s"notepad.exe”.
C. Ina key named command, the default valve willbe set io notepad.exe.
Correct Answer: 8
Section: [none]
Explanation
Explanation/Roference:
QUESTIONS
‘You have @ computer named Computer! that runs Windows 10,
On Computert, you create the local users shown in the following table.
 
 
 
Name Member of
User! Users
User2 Users, Guests
User3 Power Users,
Guest
User4 Guests, Users,
Administrators
UserS Users, Distributed
COM Users
 
 
‘Which three user profiles wil persist after each user signs out? Each correct answer presents part of the
NOTE: Each correct selection is wort one pont.QUESTIONS
HOTSPOT
‘You have a computer that runs Windows 10. The computer is in a workgroup. The computer is used to provide
“visions with accoss tothe Intemet
‘You need to configure the computer io meet the following requirements:
‘+ Aways sign in automatically as Usert.
+ ‘Start an application named App .exe at sign-in.
‘What should you use to meet each requirement? To answer. select the appropriate options in the answer area.
NOTE: Each correct selection is wort one point.
Hot Ares:
Amswer Area
Always sign in automatically as User!
(Group Policy prefereaces
BCDEdit
Registry Editor
MSConfis
Start an application named App .exe at sign-in:
icy preferences
Group Policy pret
Resistry Editor
[MSConfiC. Create a Group Policy cbject (GPO) that contains the Local User Group Policy preference.
D. Create a script that runs the New-MsolUser cmalot and the Adé-ADComputerServiceAccount cmdet.
Correct Answer: C
Section: {none}
Explanation
Explanation/Reterence:
References
‘htiosfplogs techret microsoft convaskteplal’2017/1 1/06iuse-aroup-pokicy-creferences-to-manage-the-focal-
‘acministator-croun!
QUESTION 11
‘You have several computers that run Windows 10. The computers are in a workgroup and have BkLocker
Deve Encryption (BitLocker) enabled.
‘You join the computers to Microsoft Azure Active Directory (Azure AD).
‘You need to ensure that you can recover the BALocker recovery key for the computers from Azure AD.
‘What should you do frst?All the local users on Computer! have Read access
to\\Compater!\Sharet
All the users in the corp.contoso.com domain have
Read access to \\Computer! 'Share1.
All the users in the contoso.com domain have Read
access to \Computer!'Sharet
Correct Answer:
OO
No
oOAnswer Area
Statements
Al the local users on Computer! have Read access
to \\Computer! Share
‘All the users in the corp.contoso.com domain hive
Read access to \\Computer!'Sharel.
©O 8 GO:
Boos
All the users in the contoso.com domain have Read.
‘access to \\Computerl Share
‘Section: {none}
Explanation
Explanation/Roference.
References:
 
QUESTION 13
HOTSPOT
‘You have a computer named Computer! that runs Windows 10. Computert is in a workgroup.
‘Computer’ contains te folders shown in the folowing table.
 
 
 
 
 
 
 
Usert encrypts a fle named Fie! txt that isin a folder named C:Foldet.
What is the effect of the configuration? To answer, select the approgriate options in the answer area.
NOTE: Each correct selection is wort one point.
Hot Area:Answer Area
‘Users who can move File!.txt to C:\Folder2:
Users who can move File1.txt to D\Folder3:
Correct Answer:
Answer Area
Users who can move File1 txt to C:\Folder2:
Users who can move File! txt to D:\Folder3:
     
 
   
Usert
User and User2 only
User, Une and Use = oy
User2, User3, and!
 
 
 
 
   
Useri only
User! and User2 only
User, User?, and User3 only
 
 
User Estate aCommand Prompt - o x
\Users\adnint>whoami /user /groups /priv -
User Name ‘SID
adatum\adminl — S-1-5-21-4534338-1127018997 -2609994386-4602
   
     
   
    
   
  
   
   
  
GROUP INFORMATION
Group Name
 
BUI Yin users
BUILTIN\Adm nistrators
Rg. AUTHORE TY MINTERACTIVE
‘CONSOLE LOGON
NT AUTHORITY \Authenticated Users
NT AUTHORITY\This Organization
LOCAL
ADATUM\Domain Admins
none ty
  
 
 
 
o =
futhentication authority asserted identity YelTeknown sro
Denied RODC Passo ‘cat a
meniatocy Lapel vacitn Rancatory Level Chup Capel =
Privilege Name Description
Sechangenotifyerse11 Bypass traverse checkd
Neri s traverse
Seundockeivitege Remove computer from docking statio
Seincrestucekiogwatecivilege eerease a process working Sat
SeTimeZonePrivilege Change the time zone
‘¢: \users\admin1> .
 
Use the drop-down menus to select the answer choice that completes each statement based on the informaton
[Presented in the graphic.
NOTE: Each correct selection 's wort one pont.
Hot Area:Amower Ares
Oa Compe), it Admia stents te opes Device
‘Meneg=r, answer chotce),
(Ora Campa if Alani atenapls era: the omen
Prengr as wi adm muster [amewer chobced
 
 
QUESTION 15,
‘You have a computer named Computer that runs Windows 10.
‘You need to configure User Account Contral (UAC) to prompt administrators for ther credentials.
‘Which settings shouts you moxity?
A. Aéministrators Properties in Local Users and Groups:
B, User Account Contrel Settings in Contret Panel
C. Security Options in Local Group Policy Edtior
D. User Rights Assignment in Local Group Pobcy Eiitor
Correct Answer: C
‘Section: {none}
Explanation
Explanation/Roterence:
References:
QUESTION 16
‘You have several computers that run Windows 10. The computers are in a workgroup.‘You need to prevent users from using Microsoft Store apps on their computer.
‘What are two possible ways to achieve the goal? Each correct answer presents part ofthe sokuton.
NOTE: Each correct seloction is wort one point.
‘A. From Securty Settings in the local Group Policy, configure Security Options.
8. From Administrative Templates in the local Group Policy. configure the Store settings.
C. From Security Settings in the local Group Policy. configure Software Restriction Policies.
1D. From Security Settings inthe local Group Policy, configure Application Control Policies.
Correct Answer: BD
Section: (none)
 
QUESTION 17
‘You have a computer named Computer that runs Windows 10.
‘You need to prevent standard users from changing the wireless network sattings on Computert. The solution
must allow administrators to modiy the wireless network satings.
‘Wat shou you use?
A. Windows Configuraton Designer
8. MSContg
C. Local Group Policy Editor
1D. an MMC console that has the Group Policy Object Editor snap-in
Correct Answer: ©
‘Section: [none]
‘Explanation
Explanation/Reterence:
QUESTION 18
HOTSPOT
‘You have trree computers hat run Windows 10 a8 shown in te folowing table.
Name Operating system
‘Computer! Windows 10 Pnierprise
A we _
‘Computers ‘Windows 10 Enterprise
Ailthe computers have C and D volumes. The Require additional authentication at startup Group Policy
‘satings 1 disabled on all the computers.
‘Which volumes can you encrypt by using BitLocker Drive Encryption (BitLocker)? To answer, select the
appropriate options in the answer area.NOTE: Each correct selection is worth one point‘On Computer’, you create an NTFS folder and assign Full control permissions to Everyone.
‘You share the foloer as Share! and assign the permissions shown inthe following tabi.
 
 
‘When accessing Share’, which two actons can be performed by User! but not by User2? Each correct answer
resents part of the solution.
NOTE: Each correct selection is wort one point.
‘You have a computer that runs Windows 10. The computer contains a folder named C\NSOs that is shared in,
‘You run several commands on the computer 28 shown in the folowing exhibitUso the érop-cown manus lo select the answer choice that completes each statement based on the information
[presented in the graphic.
NOTE: Each correct selection is worth one point.
Hot AresAnswer Area
Ianswer chotce) can delete files in the ISOs share.
[answer choice] can read the files in the ISOs share.
Correct Answer:
Answer Area
[answer choice) can delete files in the ISOs share.
{amswer choice) can read the files in the ISOs share.
 
!QUESTION 21
Note: This question is part of a series of questions that present the same scenario. Each question in
{the series contains a unique solution that might meet the stated goals. Some question sets might have
more than one correct solution, while others might not have a correct solution.
‘Ahier you answer a question in this section, you will NOT be able to return to It. As 2 result, these
questions will not appear in the review screen.
‘Avser named User' has computer named Computert that runs Windows 10. Computert is joined to an
‘Azure Active Deectory (Azure AD) tenart named contoso.com. Usert joins Computer’ to contoso com by using
‘user |@contoso.com.
‘Computert contains a foider named Foliert. Folder! is in drive C and is shared as Share1. Share1 has te
Permission shown in the folowing tthe
 
‘A.ser named User2 has a computer named Computer? that runs Windows 10. User2 joins Computer to
‘contoso.com by using user2@Brontoso.com, La!
User? attempts to access Sharet and receives the following error message: “The username or password is
incorrect”
‘You need to ensure that User2 can connect to Share.
‘Solution: In Azure AD, you create @ group named Group! that contains User! and User?. You grant Group!
Change access to Sharet.
‘Does this meet the goal?
AYes
B. No
Correct Answer:
Section: (none)
Explanation
 
QUESTION 22
‘Note: This question is part of a series of questions that present the same scenario. Each question in
{the series contains a unique solution that might meet the stated goals. Some question sets might have
‘more than one correct solution, while others might not have a correct solution.
‘After you answer a question in this section, you will NOT be able to return to It. As a result, these
‘questions will not appear in the review screen.
‘A.ser named User2 has a computer named Computer? that runs Windows 10. User2joins Computer? to
‘@ontoso.com by using user2@contoso.com.CComputert contains a folder named Foldert. Folder is in drive C and is shared as Sharet. Sharet has the
Bermission shown in the folowing tate.
 
  
Full control
Ovener
 
 
 
 
 
 
 
‘A.user named User2 has a computer named Computer? that runs Windows 10. User2 joins Computer? to
‘contoso.com by using user? @eontose com.
User? attempts to access Share! and receives the following error message: “The usemame or password is
‘You need to ensure that User2 can connect to Share.
Sotiton: You create a local user sccourton Computer! and int User? o use the lca account to connect
‘Does this meet the goal?
A Yes
8. No
‘Correct Answer: B
Section: (none)
Explanation
Explanation/Roference:
QUESTION 23
‘Note: This question is part of a series of questions that present the same scenario. Each question in
‘the series contains a unique solution that might meet the stated goals. Some question sets might have
‘more than one correct solution, while others might not have a correct solution.
‘After you answer a question in this section, you will NOT be able to return to it. As a result, these
‘questions will not appear in the review screen.
‘A.ser named User! has a computer named Compytert that runs Windows 10. Computert is joined to an
‘Azure Active Directory (Azure AD) tenant named contoso.com. Usert joins Computert to contoso.com by using
user @eantoso com
‘Computer’ contains a folder named Foliert. Folder! is in drive C and is shaved as Sharet. Sharet has the
permission shown in the folowing tatie.
[| Group ‘Share permission
Everyone Fall control
‘AzureAD/userl @contoso com | Owner
 
 
 
 
 
 
 
‘A.ser named User2 has a computer named Computer? that runs Windows 10. User? joins Computer? to
_contoso.com by using user2@rontoso com.
‘User? atiempts to access Share1 and receives the folowing error message: “The username oF password is
tncorrect™‘You need to ensure that User2 can connect to Share1.
‘Solution: in Azure AD, you create a group named Group? tat contains User! and User?. You grant Group
Modity access to Foldert.
‘Does this meet the goal?
 
‘You have a computer named Computer! that runs Windows 10. Computert contains a folder named Foldert.
‘You need to og any users who take ownership ofthe files in Foldert.
Which two sctions should you perform? Each comect answer presents part ofthe solution.
NOTE: Each correct selection is worth one point.
‘A. Madly the folder attrbutes of Folder.
8. Modity the Advanced Securty Settings for Foldert.
C. From a Group Policy object (GPO), configure the Aust Sensitive Privilege Use setting.
1D. From a Group Policy object (GPO), configure the AucSt File System setting.
E. Install the Remote Server Administration Tools (RSAT).
Correct Answer: BO
‘Section: {none}
Explanation
Explanation/Reference:
References.
‘biiositmwe.netera.commow to detect who changed fie folder owner him
QUESTION 25,
HOTSPOT
‘Your network contains an Active Directory domain. The domain contains the users shown inthe folowing table.+ User2: Deny Write
+ Group!: Alow Read
+ Group2: Allow Modify
Foldert is shored as Share$. Shoret$ has the following configurations:
* Everyone: Allow Full control
+ Access-based enumeration: Enabled
For each of the following statements, select Yos f the statement is tue. Otherwise, seloct No.
NOTE: Each correct selection is worth one point
Hot Area:
Statemens|
Yes
(User! on tt es Comte T'Share tS °
Use? cam et es in Comet Sets °
°
oo°oF
1 User cones Corgntart hom Fe Expr, Shara wl be vie
Correct Answer:
Statemens
Yes No
ar cam at a orga hats a)
Us can it tes to WCcmeuser Starts @o
1 Use canoe to Coren tem F¥e Enh, Shr lb ibe Mo
‘Auser cannot open the application.
You sa sg coed bem Ses sonata Sf bs ee nA va ie ay, TO
'ping request from your computer and the server replies.
‘You need to ensure that the ping request works from the user's computer.‘Which Windows Defender frewall rule is a possitie cause of the issue?
‘A. Fie and Printer Sharing (NB-Datagram-in)
8B. Fie and Printer Sharing (Echo request ICMPY6-Out)
CC, File and Printer Sharing (NB-Datagram-Out)
. File and Printer Sharing (Echo Request ICMPY6-In)
Correct Answer: D
‘Section: {none}
Explanation
Explanation/Reference:
References:
Tis fe ntpen osr haat noma aban ema ecp ecta cee Mot sm 8,
QUESTION 27
HOTSPOT
Use the drop-down menus to select the answer choice that completes each statement based on the information
[resented on the graphic.NOTE: Each correct selection is worth one pc
Hot AreaAnema: Aree
seemed a ae ety ee
Tt ei arene an
ne comma ant cmon
nr Wr ym | are Cangean Se
to an cn premews Actes Orecay a
Correct Answer:
Anema Aree
cnet ap sare prey er mmr ee) =
neonate = tana ema
 
Section: (none)
Explanation
Explanation/Reference:
i
‘You have a computer named Computers that runs Windows 10 thats used to share documents in a
‘You create three users named User-a, User-b, User-c. The users plan to access ComputerS from the network| ance Sect Stenger Dats
Nore: Come
Owner Agmnitators OESKTOP-SAQBHS3AdrINratons) Change
D) Rectae ouner on suontaners and tess
Premisions Shave Aucting — Mlectne Access
For edtiemal information dovble-ch 9 garmunon entry, To mody spermainen entry, tlact the ante and cick ($84 asada)
 
 
 
 
Penison ian
Tre Principat acces inherited trom: Aootesto
ML Allow User-a(DESKTOP-Siq@HsU Read Beemecute Rone ‘Thee ter, suliers and few
MR Akow Usee-b(DESKTOPSoghits 3 Mody hone hen toner, satiers and tes,
ML Akow Adminitrstors (DESKTOP. at contos ene The fone stokes and fe
ik Atow SYSTEM Fa cont one Thee foto, totter aad fw
[Mi Allow Users DESKTOP-S90RHSTUs Ful contot Nene ‘Then fotcer, escere an es
Me) i
Ll) Rectece ot chad copeet sarmanion eras wim mhertabie cermeason entree or the tweet
Ce] oe | ee
 
‘You share the Data folder. The permission for User-a are shown in the User-a exhibit (Click the User-a tab.)‘The permissions for user-b are shown in the User-b exhibit (Click the User-b tab.)‘The permissions for user-c are shown in the User-c exhibit (Click the Userse tab.)For each of the folowing statements, select Yes # the statements is rus. Otherwise, select No.
NOTE: Reach correct selection is worth one point.
Hot Area:
‘Statements
User-a can modify files in the Date share.
User-b can delete files in the Dete share.
User-c can read files in the Data share,
Correct Answer:
ooo ¥#
ooo &Statements
Yes No
User-a can modify files in the Date share, ° oO
Usor-b can delete fies in the Dota share @ o
Usor-c can read files in the Date shore @o
Explanation
Explanation/Reterence:
QUESTION 29
forseor
‘You have a computer that runs Windows 10 and contains the follers shown inthe following table.
 
For each of the folowing statements, select Yes # the statement is tue. Otherwise, selact No.
NOTE: Each correct selection is wort one point,
Hot Area:Usort can road and write ail files in FolcerC.
User2 can delete ail tiles in Folders.
Userd can delete ail tes in Foiderc,
000 §
ooo €
Correct Answer:
Statements
Usert can read and write ail files in FolderC.
User2 can delete all tiles in Folder’,
User3 can delete ail tiles in Folder.
oom 7
BBo fF
‘Section: (none)
Explanation
Explanation/Reference:
References:
QUESTION 30
‘Your network contains an Active Directory domain. The doman contains 9 computer named Computer! that
‘uns Windows 10.
‘You need to view the settings to Computer’ by Group Policy objects (GPOs) in the domain and local Group
Which command should you run?
A gpresult
B. secedit
C. gpupdate
D. gpfixup
Correct Answer: A
Section: {none}
Explanation
Explanation/Reterence:
Reterences:
‘https docs. microsoft com/en-us/windows-serveriagminstratior/windows-commands/aoresut
QUESTION 31
‘Your network contains an Active Directory domain. The domain contains computers that run Windows 10.‘You need to provide 3 user withthe abily to remotely create and modity shares on the computers. The soluton
‘must use the principle of least prévlege.
‘Towhich group should you adi the user?
A. Power Users
B. Remote Management Users
C. Administrators
D. Network Configuration Operators
Correct Answer: C
‘Section: [none]
Explanation
Explanation/Reference:
QUESTION 32
‘You have a computer named Computer! that runs Windows 10, Computer1 belongs to a workgroup.
‘You run the folowing commands on Computer?
New-LocalUser ~Name User! -NoPassword
‘Add-LocalGroupMenber User -Menber User}‘You need to be able to access Controt Panel
What should you mossy?
‘A. the PowerShell execution policy
8. the Local Group Policy
. te Settngs app
. a Group policy preterence
‘nips /wndows Oki com/ns-operaton-has tec-dve-ty-restnctons-ineflect-on ths.
QUESTION 34
HOTSPOT
‘Your domain contains named Computer named Compytert that runs Windows 10, Computer does not have a
TPN
‘You need to be atie fo encrypt the C drive by using Bitocker Drive Encryption (BitLocker). The solution must
‘ensure that the recovery kay is stored in Active Directory.
Which two Group Poicy settings should you configure? To answer, select the approprate sattngs in he
NOTE: Each correct selection is worth one point
Hot AreaConsole? - [ConsoleRoofiLocal Computer Policy\Computer Configu...
See
ih InsaxkGo OF HST oct cut Of ore-boot|QUESTION 35
You have a pubic compute named Computer? mat une Windows 10/ Comper contains a flser named
‘You need to provide 9 user named Usert with the abilty io modi the permissions of Foldert, The sohition
must use the principle of least privilege.
Which NTFS permission should you assign to Usert?”
A. Full contrat
8. Mody
C. Write
D. Read & executeQUESTION 36
‘You have 10 computers that run Windows 10 and have BitLocker Drive Encryption (BitLocker) enabled.
‘You plan to update the firmware of the computers.
‘You need to ensure that you are not prompted for the BitLocker recovery hey on the next restart. The drive
‘must be protecied by BiLocker on subsequent restarts.
 
C. Add-BitLockerkeyProtector
D. Suspend-BitLocker
 
QUESTION 37
‘You have a computer named Computert that runs Windows 10.
‘You are iroubleshootng Group Policy objects (POs) on Computer'.
You run gpresuit /user userl /v and receive the output shown in the following exhibitSaar
Last tune Group Polcy was applied: 11/11/2018 at 8:20:07
Group Policy was applied from: N/A
Cede eed tie met cn
Peete ed eet a:a]
Peni eee
Pee kert Tae ges:
Local Group Policyusert
eter tae)
The user is a part of the following security
Dee ted er
een ee rte
Eine
Ermine
Performance Log User
eine enact:
CONSOLE LOGON
Ue hance)
eter
een bese
res
eset eee
 
Use the drop-down menus Io select the answer choice thal complates each statement based on the information
presented inthe graphic
NOTE: Each correct selection is wort one point.
Hot Area:To configure GFO settings
that affect only User, you
must fest [answer choice]
 
 
‘You create a folder named Foléert that has the permissions shown in the following table.‘You create a fe named Filet txt in Folder and alow Group? Full control permissions to Fie.
For each of the folowing statements, select Yes the statement is tue. Otverwise, select No.
NOTE: Each correct selection is wort one point
Hot Arwa:
‘Statements
User can create a new file in Folder1.
User can save changes to File1.txt
User2 can view the content of File1.txt
‘Statements:
User can create a new file in Folder1
User1 can save changes to File1.txt
User2 can view the content of File1.txt
Section: (none)
Yes
°
°
°
a oe
Oo 0 0
Oo} |O| | &‘Computer’ has the local Group Policy shown in the following table.
 
‘Startup script ScnptAL
Shutdown ScriptA2
Logon seript SeniptA3
Logotf script Script
‘You create the Local Computer Administrators pobicy shown inthe folowing table
a
[Lorca seript | SenptBE |
‘You create the Local Computer‘Non-Admiristrators policy shown in the folowing table.
[Setting [Value
a
[Logott script [SenpCz
For each ofthe folowing statements, solct Yes f the statement is tue. Otherwise, selact No.
Hot Area:Statements Yes No
1 User shuts down Computert, seri SeriptA2 will run. Oo Oo
if User? signs in to Computert, scripts Seripta3, ScriptB1, and =
SerigtC3 will run, o °
if User3 signs out of Computer. scripts SeriotC2 and Scriptad Oo Oo
wil run,
Correct Answer:
‘Statements Yes No
If User shuts cown Computers, script Scripta? will run. Oj oO
WF User2 signs in to Computer! scripts Seripta3, ScriptBt, and
Script will run, Oo oO
if User3 slans out of Computer, serintsSeriotC2 and Scripta oO
will run.
‘Section: [none]
Explanation
 
QUESTION 40
‘Note: This question Is part of a series of questions that present the same scenario. Each question in
the series contains # unique solution that might meet the stated goals. Some question sets might have
‘more than one correct solution, while others might not have a correct solution.
‘After you answer a question in this section, you will NOT be able to return to It. AS 2 result, these
‘questions will not appear in the review screen.
‘A user named User? has a computer named Compxter? that runs Windows 10. User2 johns Computer? to
‘contoto.com by using user2@conto%o.com.
Computer’ contains a fokder named Foldert. Folder! is in drive C and is shared as Sharet. Sharet has the
permission shown in the folowing tate.
| Group ______|Sharepermission |
Everyone Full control
| AzureAD user! @contoso.com | Owner‘A.user named User2 has a computer named Computer? that runs Windows 10. User? joins Computer? to
‘contoso.com by using user2@contoso.com.
User2 attempts to access Share and receives the following error message: “The username or password is
‘You need to ensure that User2 can connect to Share!
‘Sovuton: You create a local group on Computer! and add he Guest account te group. You gant he group
Modity access to Snaret =
‘Does this meet the goal?
A Yes
B. No
Correct Answer: 8
‘Section: (none)
Explanation
Explanation/Roference:
QUESTION 41
Your retort contain an Act Oretary domain, The domain contains 1000 compre tet Windows
1
‘You need to prevent the computers of the research department trom appearing in Network in File Explorer.
What should you do?
‘A. Configure DNS to use an external provider
B. Modity he *usystemrooti\systom3Zdriversiatc\Networks fe,
C. Tum off network discovery.
D. Disable the Network List Service
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
‘QUESTION 42
HOTSPOT
‘You have two computers named Computer! and Computer? that run Windows 10, The computers arein @
workgroup.
‘You perform the following configurations on Computer!
+ Create a user named User.
+ Add Usert to the Remote Desktop Users group,
‘You perform the following configurations on Computer2:
+ Create a user named User! and specty the same user password as the one seton Gomputert.
+ Create @ share named Share? and grant Usert Ful control access to Share2.+ Enable Remote Desktop.
What are the effects of the configurations? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is wort one point.
Hot Area:
‘Answer Arca.
{Use gs bo a Share? 1s
dale Rima andar pare
 
se ters bo access Share? amy
(Comput, Pe ur we
czar arenas an wo Rene Osim
—
 
+ Alldomain users must be able to open the files in the Templates foldor
* Only the members of Group! must be allowed to edt the fies in the Templates folder.
‘How should you configure ihe NTFS setings on ihe Templates fokder? To answer, select ine appropriate‘options ia the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
Answer AreaAnswer Area
 
‘Section: [none]
Explanation
Explanation/Reference:
QUESTION 44
‘You deploy Windows 10 1020 new laptops.
‘The laptops wil be used by users who work at customer stes. Each user willbe assigned one laptop and one
Android device.
‘You need to recommend a solution to lock the laptop when the users leave their laptop for an extended perio.
"Which two actons should you include in he recommendation? Each correct answer presents part of me
sauton
NOTE: Each correct selection is worth one point
‘A. Enable Bivetooth discovery.
B. From the Settings app, configure the Dynamic lock settings.
C. From Sign-in options, configure the Windows Hello settings.
D. From the Settings app. configure the Lock sereen settings.
E. Phir he Android device and the laptop.
F. From the Settings app. configure the Screen timecut sotings.
‘Correct Answer: OF
Section: [none]‘Testiot 1
Case Study
‘This is a case study. Case studies are not timed seperately. You can use as much exam times as you
‘would like to complete each case. However, thera may be addtional studies and sections on this exam. You
sous menage yur ao conee Bt yous ste a compleo ol qumebenalnceioden Wh exam bia Ene
To answor fe questions incuded in a case study, you wil need \0 reference information that's provkied nthe
‘case study. Case studies might contain exhibts and other resources that provide more information about the
‘scenario that described in the case stidy Each question is independent ofthe Other questions i this case
study,
‘Atte end ofthis case study, 8 review screen wil appesr. This screen allows you to review your answers and to
‘make changes before you move to the next section of the exam. After you begin a new section, you cannot
‘otum to ths secton.
To start the case study
To display he first question in this case study, cick the Next button. Use the butions in the lft pane to explore
the content of te case study before you answer the questions. Clicking these butions displays information such
‘03 business requirements, existing envronment. and problem statements, When you are ready to answer
‘question, cick the Question bution to return to the question.
Overview
Existing Environment
Fabrikam, nc. is 2 distribution company that has 500 employees and 100 contractors.
‘Active Directory
‘The network contains an Active Directory forest named fabrikan.com. The forest is synced to Microsoft Azure
‘ative Diectory (Azure AD), All the employees are assigned Microsoft 366 E3 licenses,
‘The domain contains a user account for an employee named User0.
Client Computers
Al the employees have computers that run Windows 10 Enterprise. Allthe computers are insted without
‘Volume License Keys. Windows 10 lcense keys are never issised.
‘Ailthe employees register thei computer to Azure AD when they frst receive the computer.
Usert0 has @ computer named Computert0.
‘Alte contractors have ther con comeuter at una Windows 10. Nona of the comer ae jned Ane
Operations! Procedures
Fabrkam has the following operational procedures:
+ Updates are deployed by using Windows Update for Business.
‘+ When new contractors are hired, administrators must help the contactors configure the folowing settings on
their computer.
= User certificates
= Browser security and proxy settings
= Wireless network connection settingsSecurity policies
“The following secunty policies are enforced on ail the cent computers in the domain:
‘+ Allthe computers are encrypted by using BitLocker Drive Encryption (BitLocker). Blacker recovery
__Rformaton i stored in Active Directory and Ante AD.
‘Tha local Administrators group on each computer contains an enabled account named LocalAdmin.
+The CocalAamn account maraped by use Lact Aamnsratr Password Sounon (CAPS)
Problem Statements
Fabrkam identtios the folowing issues:
+ Employees in the finance department use an apgiication named Application’. Applicaton! frequently
‘crashes due to a memory error. When Application! crashes. an event is written to the application log and on
‘administrator runs a script lo delete the temporary files and restart he apglication.
* Wms engine etemplb comect toe naar ir ek home camper, Bay cen coat ethieh
a VPN connection because of misconfigured VPN.
+ ‘Avempioyes bes 8 computer named Computer! Compdertt hes aherdsore talus tht provers he
‘computer from to the network,
+ Usort0 reports that Computer'0 is not activated.
Technical requirements
Fabrkam Ktentfies the following technical requirements for managing the client computers:
+ Provide employees with a configuration fie to configure their VPN connection.
* Use the micimum arsount of administrative effort to implement the technical requirements.
+ Igenty which employees’ computers are noncomplant wit the Windows Update baseline of the company.
+ Ensure that the service desk uses Quick Assist to take remote control of an employee's desktop during
‘support cals.
‘+ Automate the configuration of the contractors” computers. The solution must provide a configuration fie that
‘the contractors can cpen from a Microsoft SharePonnt site to apply the required configurations,
 
2
‘You need to take remote control of an employee's computer fo troubleshoot an issue,
‘What should you send to the employee to initiate @ remote session?‘Testiet 2
Case Study
‘This is a case study. Case studies are not timed seperately. You con use as much exam times as you
‘would like to complete each case. However, there may be addtional studies and sections on this exam. You
‘must manage you time to ensure that you are able to complete all questions included on this exam in the time
To answor te questions incuded in 2 case study, you wll need to reference information that's proved nthe
‘case stuty. Case studies might contain exhibits and other resources that provide more information about the
‘scanano that « described in the case stidy Each question is independent ofthe Other questions in this case
study,
‘Atthe end ofthis case study, a review screen wil appear. This screen allows you to review your answers and to
‘make changes before you move to the nex! section of the exam. After you begin @ new section, you cannot
retum to tes section.
To start the case study
‘To display the fist question in this case study, click the Next button. Use the butions in the lft pane to explore
the content of fie case study before you answer ihe questions. Clicking these buttons dksplays information such
‘83 business requirements, existing environment. and problem statements, When you ere ready io answer &
‘question, cick the Question bution to retum to the queson.
Overview
(Geoeo, Lid a conauteg company Bat nas a main oftce n Morte and wo branch ofc in Seat and
fork.
‘Contoso has IT. human resources (HR), and france departments.
Contoso recently opened a new branch office in San Diego. Al the users in the San Diego office work from
Existing environment
‘Contoso uses Microsoft 365.
‘The on-premises network contains an Active Directory domain named contoso.com. The domain is synced 10
‘Microsoft Azure Active Directory (Azure AD).
‘Ail computers run Windows 10 Enterprise.
‘You have four computers named Computer, Computer2, Computer3, and ComputerA. Computer is in
‘workgroup on an isolated network segenent and runs the Long Term Servicing Channel version of Windows 10.
Computer connects to a manufacturing system and is business criical. Al the other computers are joined to.
the domain and run the Semi-Annual Chanel version of Windows. 10.
In the domain, you create four groups named Group! Group2, Group, and Groups.
‘Computer? has the local Group Policy settings shown inthe following table,
 
 
      
  
 
 
 
 
 
 
 
 
Polley
Access this computer from the network Grouph
Deny oceess to this computer from the network Group
‘Allow log on through Remote Desktop Services Groups,
‘Deny log on through Remote Deskiop Services Groupt‘The computers are undated by using Windows Update for Business.
‘The domain has the users shown in the folowing table.
Name
User!
User2
User3
User4
User5S | Domain Users, Guests
User6 | Group2, Group3, Domain Users
     
| Administrators, Domain Users
   
    
 
‘Computert has the local users shown in the following table.
 
 
Contoso plans to purchase computers preinstalied with Windows 10 Pro forall the San Diego office users.
‘Technical requirements
‘Contoso identities the following technical requirements:
* The comouters inthe San Diego oie must be uooraded avomacalyo Wodows 10 Externe and must
befoned to azure AD the fra tre wer stats boch new compu. nd users must no be required 10
‘accept the End User License Agroement
+ Helpdesk users must be athe 10 voubteshoot Group Policy otject (GPO) processing on the Windows 10
‘users must Be able to ently which Group Polives are applied to the computers.
‘DiReports on |
HH
iH
My
i
i
i
i
Hin
i
i
QUESTION +
‘You need to meet the technical requirement for User6.
‘What should you 60?A. Add User6 to the Remote Desktop Users group in the domain.
B. Remove User$ from Groug2 in the domain.Question Set 3
QUESTION 1
‘Your company has a wireless access point that uses WPAZ-Enterprise,
‘You need te configure a computer to connect to the wireless access point.
‘What should you do frst?
‘A. Create a provisioning package in Windows Configuration Designer.
B. Request a passphrase.
C. Request and install a ceritcate.
©. Create 2 Connection Manager Administration Kit (CMAK) package.
Correct Answer: B
‘Section: [none]
Explanation
Explanation/Reterence:
References:
‘les /sup0n microsof, con/en-za/neip/17137/windows-settne up-wireiess- network,
QUESTION 2
‘Auser named User! has a computer named Computert that runs Windows 10.
User connects to a Microsoft Azure virtual machine named VMI by using Remote Desktop.
\Usert croates a VPN connection named VPN1 to connect to @ partner organization.
When the VPN1 connection is established, User! cannot connect to VM. When Usert disconnects from the
‘VPN, the user can connect to VM.
‘You need to ensure that User’ cen connect to VA1 while connected tothe VPN1.
(What should you do?
A. From the proxy settings, add the IP address of VA to the bypass ist to bypass the proxy.
'B. From the properties of VPN'., clear he Lise default gateway on remote network check box.
C. From the propertis of the Remote Desktop connection to VA, specity a Remote Desktop Gateway (RD
Gateway).
©. From the properties of VPN. configure a static default gateway address.
Correct Answer: 8
 
‘Your network contains an Active Directory domain. The domein contains # user named Admint. Al computers:
fun Windows 10.
‘You enable Windows PowerShell remoting on the computers.
‘You need to ensure that Admint can establish remote PowerShell connections to the computers. The solution
must use the principle of least prvlege.Towtich group should you add Admint?
‘A. Access Control Assistance Operators
8. Power Users
GC. Remote Desktop Users.
D. Remote Management Users
Correct Answer: O
Section: (none)
Explanation
Explanation/Reference:
References:
‘QUESTION 4
‘You have 200 computers that run Windows 10 and are joined to an Actwe Directory domain.
‘You need to enable Windows Remote Management (WinkM) on all he computers by using Group Policy.
Which three actions should you perform? Each correct answer presents part of the solution.
NOTE: Each correct selection is wort one point.
A. Set the Startup Type of the Windows Remote Management (WS-Management) service to Automatic,
B. Enable the Windows Firewal: Alow inbound remote administration exception setting.
CC. Enable the Allow remote server management through WinRM setting.
1. Enable the Windows Firewal: Allow inbound Remote Desktop exceptions setting.
E. Enable the Allow Remote Shell access seting.
F. Set the Startup Type of he Remote Registy service to Automatic.
Correct Answer: ACD
‘Section: (none)
Explanation
Explanation/Roference:
References:
Ito /www mustbegeek, com/now-to-enable-winrm-va-grovp-pokicy!
QUESTIONS
A.user has 9 computer that runs Windows 10.
When the user connects the computer fo the corporate network, the user cannot access the internal corporate
‘servers. The user can access servers on the Internet.
‘You run the ipconfig command and receive the following output.Connect ton spect te Ome su
Dereription 2.
Prysical Address. oS
ONCE Enabled.
Autoconf iguration tnabled
Link-Local 1Pv6 Address
Teva Address.
Subnet Mask.
Aease obtained.
Leone expires «
Default Ontewey
ch Server -
Omceve TaID |
DHCP ChLent OUI,
O88 Servers...
 
 
    
   
NetmtOs over eplpe vee ee eet
kthonnet a
00-0 te P ea ad
ves
ves
fe80: 5496: 2419: 0830: 3¢40KI7 (Preferred)
192. 168.0121 (Prefered)
255.255.255.
ednesday, October 92, 2018 8:07
Medinesdiay, October $1, 2028 #)
 
 
 
 
-PRAC-5F- 44-00-5086 -78 4-08
 
‘You send a ping request and successfuly ping the default gateway, the ONS servers, and the DHCP server.
Which configuration on the computer causes the issue?
A. the DNS servers
B. the IPv4 acsress
CC. the subnet mask
©. the dotautt gateway address
Correct Answer: A
Explanation
Explanation/Reference:
QUESTION 6
HOTSPOT
‘You have a computer that runs Windows 10.
From the Settings apo. you view the connection properties shown in the following exhibitNetwork profile
Onn
‘Your PC is hidden fram other devices cn the network and ct be
‘Wie Yor piter and ie shan.
O Pinte
For a netwr you test such a8 at home oF wort. Your PC ie
‘dacovene and can be wed for printer nd fe sharing if you sat
cry
Contagure trewnl and secuty sets
Metered connection
you have 1 betes data plan and want more control over Sata
‘age. make ths connection « metered network. Some aps might
work dierenty to educe data wiege when youre connected to
ic retort.
‘Set a metered comection
BD om
{you set a data lent, Windows wl et he metered connection
‘settng for you to ne YOU Stay UNE your AM.
‘Set a data ert to help control deta usage on ths network
‘Use the drop-down menus to select the answer choice that completes each statement based on the informaton
presented a the graphic,
NOTE: Each correct selection is wort one point.
Hot Area:
Answer Area
To enable Winters Remote
(WinRM), yourrwst first [answer choice].
To enave that Microsoft One Prive syncs yor
‘must first [amswer choice).Answer Area
Toenshie Winton Remote Management| | [—__________~¥
(WinRN), you rust first [answer choice}.
  
To emunre that Microsoft One" rive syncs, yon
must first [answer choice).
 
‘Your network contains an Active Directory domain. The domain contains 10 compxaers that run Windows 10,
Users inthe finance department use the computers.
‘You have @ computer named Computer! that runs Windows 10.
From Computer’. you plan to run a script that executes Windows PowerShell commands on the finance
‘department computers.
‘You need to ensure that you can run the PowerShell commands on the finance department from Computert,‘What should you do on the finance departmert computers?
‘A. From the local Group Policy, enable the Allow Remote Shell Access setting.
'B. From the local Group Policy, enable the Turn on Script Execution setting.
C. From the Windows PowerShell run the Enable-MMAgent cmdlet.
1. From the Windows PowerShell, run the Enable-PSRemoting cmdiet
Correct Answer:
Section: {none}
Explanation
 
‘A. In Azure AD. assign user1@contoso.com the Cloud device administrator role.
'B. From the local Group Policy. modly the Allow log on through Remote Desktop Services user right.
C. In Azure AD. assign user! @contoso.com the Security administrator role.
1D. On Computer, create a local user and add the new user to the Remote Desktop Users group.
 
‘You enable Windows PowerShell remoting on a computer that runs Windows 10.
‘You need to limit which PowerShell cmciets can be used in a remote session.
Which three actions should you perform in sequence? To answer, move the appropriale actions from the list of
‘actions to the answer area and arrange them in the correct order.
‘Select and Place:Comata PR fn coma at eter
  
 
Rent tote reteset on ened
 
Section: [none]
Explanation
(bios hme etn corn/powershet-remotng-restritine-user-commands
QUESTION 14
HOTSPOT
‘You have a computer named Computert that runs Windows 10. Computert has an IP address of 10.10.1.200
and a subnet mask of 255.255.255.0.
‘You conigure the praxy settings on Computert as shown inthe following exhibitManual proxy setup
Use a proxy server for Ethernet or Wi-Fi connections. These settings
don't apply to VPN connections.
Use @ prony server
=o
Address Port
freeones] [owe
Use the proxy server except for addresses that start with the
following entries. Use semicolons () to separate entries.
contoso.come
+ smicrosoft.com;192.168.1.25;".
 
[i Dont use the proxy server for local (intranet) addresses
 
‘Use the érop-cown menus to select the answer choice that completes each statement based on the information,
[presented in the graphic.
NOTE: Each correct selection is worth one point.
Hot Area:
Answer Area
Conction attempt to
  
 
 
[over the cenay only whan wing Microwah Fage
ute the proxy aly when uting Microcah Face
loypess the crony fer all apctications
Jute the proxy for all anpications
 
  
ps://48.10,0.100
heros /store mierorort. com
epi/392.168.1.10
 
   
Correct Answer:Der
end ee a gd
etd
LoL Coe)
fae) Oa
Sees) i)
Seas
Cee TET
eee Microsoft Hyper'V Network Adapter
ead Cemrecne ny
Deas cc
antl ad
eee aera Cea RAL al]
ie ae era! Pee eee)
vom ltd 255 255.00
eet eee
eet at arn
Deedee) CE RE e arate teen
PSs Cag
eee]
Pee eet)
Enabled
 
‘What can the computer connect to?
‘A. all the local computers end the remcte computers within your corporate network only
8, all the focal computers and the remote computers, including Inte hosts
CC. only other computers on the same network segment that have automatic private IP addressing (APIPA)
1. only otner computers on the same network segment thet have an address from # class A network ID
Correct Answer:
Section: {none}
Explanation
Explanation/Reterence:
 
QUESTION 13
‘Your network contains an Active Directory domain named contoso.com.
‘A.user named User! has a personal computer named Computer! that runs Windows 10 Pro. User! has a VPN‘connection to the corporate network
‘You need to ensure that when User! connects to the VPN, network traific uses a proxy server localed in the
‘corporate network. The solution must ensure thal User! can access the Internet when disconnected from the
VPN.
‘What should you do?
‘A. From Control Panel, modity the Windows Defender Firewall setings
8. From the Setting app, modi the Proxy setings for he local computer
CC. From Control Panel, modi the properties of the VPN connection
D. From the Settings app, mosity the properties of the VPN connection
Correct Answer: 8
‘Section: (none)
Explanation
Explanation/Roference:
QUESTION 14
‘You deploy 100 computers that run Windows 10. Each computer has a colular conection and @ Wi-Fi
“connector
‘You naed to prevent the computers from using the cellular connection unless a user manually connects to the
‘celular network.
‘What should you do?
A. Set the Use callular instead of Wi-Fi setting forthe cellular connection to Never
B. Runthenersh wlan set hostednetuork modendisallow command
C. Clear the Let Windows manage this connection check box forthe cellular connection
1. Select the Let Windows manage this connection check bos for the WF: connection
Correct Answer: C
Section: (none)
Explanation
Explanation/Roference:
References
htiosunoort microsoft comlen.za/haln/107:Sahwincows:10-coltar-sattings
QUESTION 15
Note: This question is part of a series of questions that present the same scenario. Each question in
{the series contains a unique solution that might meet the stated goals. Some question sets might have
‘more than one correct solution, while others might not have @ correct solution.
‘After you answer a question in this section, you will NOT be able to return to it. As a result, these
‘questions will not appear in the review screen.
‘You have a apiop named Computer! that uns Windows 10.
‘When in range, Camputert connects automatcaly a WiFi network named Wireless
‘You need to prevent Computert from automaticaly connecting to Wireless.
‘Solution: From a command promgt, yourun netsh wlan delete profile nase="Wireless!*.